Author of the publication

Spatiotemporal diversification by moving-target defense through benign employment of false-data injection for dynamic, secure cognitive radio network.

, , and . J. Network and Computer Applications, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ChameleonSoft: Software Behavior Encryption for Moving Target Defense., and . MONET, 18 (2): 271-292 (2013)ChameleonSoft: A moving target defense system., , and . CollaborateCom, page 241-250. ICST / IEEE, (2011)System-Aware Smart Network Management for Nano-Enriched Water Quality Monitoring., , , and . J. Sensors, (2016)PYGRID: A software development and assessment framework for grid-aware software defined networking., , , and . Int. Journal of Network Management, (2018)CyPhyMASC: Evolutionary monitoring, analysis, sharing and control platform for SmartGrid defense., and . IRI, page 639-645. IEEE, (2014)MIGRATE: Towards a Lightweight Moving-Target Defense Against Cloud Side-Channels., and . IEEE Symposium on Security and Privacy Workshops, page 96-103. IEEE Computer Society, (2016)Reliable Collaborative Semi-infrastructure Vehicle-to-Vehicle Communication for Local File Sharing., , , , , and . CollaborateCom, volume 292 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 698-711. Springer, (2019)Resilient hybrid Mobile Ad-hoc Cloud over collaborating heterogeneous nodes., , and . CollaborateCom, page 134-143. ICST / IEEE, (2014)A Novel Approach to Enhance the Physical Layer Channel Security of Wireless Cooperative Vehicular Communication Using Decode-and-Forward Best Relaying Selection., , , and . Wireless Communications and Mobile Computing, (2018)Repoxy: Replication Proxy for Trustworthy SDN Controller Operation., , and . TrustCom/BigDataSE, page 55-60. IEEE, (2018)