Author of the publication

Design Diversity for Mitigating Monoculture Induced Threats.

, , and . HASE, page 17-18. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusted Online Social Network (OSN) services with optimal data management., , , , and . Computers & Security, (2014)A Deep Recurrent Neural Network Based Predictive Control Framework for Reliable Distributed Stream Data Processing., , , , , and . IPDPS, page 262-272. IEEE, (2019)Cloud security certifications: a comparison to improve cloud service provider security., , , , , and . ICC, page 120:1-120:12. ACM, (2017)Game theoretic modeling of cyber deception in the Internet of Battlefield Things.. Allerton, page 862. IEEE, (2018)ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability., , , , , and . CCGrid, page 468-477. IEEE Computer Society / ACM, (2017)Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 639-644. IEEE Computer Society, (2017)Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems., , , , , and . ICC, page 1-7. IEEE, (2019)QOI: Assessing Participation in Threat Information Sharing., , , , , , and . ICASSP, page 6951-6955. IEEE, (2018)A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory., , , and . MWSCAS, page 853-856. IEEE, (2018)Countering Selfish Mining in Blockchains., , , and . ICNC, page 360-364. IEEE, (2019)