selected publications
-
academic article
- Interactions between artificial intelligence and cybersecurity to protect future networks. Annals of Telecommunications. 77:727-729. 2022
- Practical Cross-Layer Radio Frequency-Based Authentication Scheme for Internet of Things. Sensors. 21:4034-4034. 2021
- On Achieving Trustworthy Service Function Chaining. IEEE Transactions on Network and Service Management. 18:3140-3153. 2021
- Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds. IEEE Transactions on Dependable and Secure Computing. 18:372-383. 2018
- Securing Named Data Networking: Attribute-Based Encryption and Beyond. IEEE Communications Magazine. 56:76-81. 2018
- NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures. IEEE Communications Surveys & Tutorials. 20:3330-3368. 2018
- Editorial: Special Issue on Security and Privacy of IoT. World Wide Web. 21:1-6. 2017
- ArOMA: An SDN based autonomic DDoS mitigation framework. Computers & Security. 70:482-499. 2017
- An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps. World Wide Web. 21:127-150. 2017
- PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications. 10:1204-1218. 2016
- TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs. Sensors. 16:803-803. 2016
- Dynamic Secure Interconnection for Security Enhancement in Cloud Computing. International Journal of Computers Communications & Control. 11:348-348. 2016
- Next Road Rerouting: A Multiagent System for Mitigating Unexpected Urban Traffic Congestion. IEEE Transactions on Intelligent Transportation Systems. 17:2888-2899. 2016
- A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP). Security and Communication Networks. 8:4436-4451. 2015
- Enabling security functions with SDN: A feasibility study. Computer Networks. 85:19-35. 2015
- Towards cross‐layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems. Security and Communication Networks. 8:232-244. 2014
- Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks. IEEE Transactions on Parallel and Distributed Systems. 25:332-342. 2013
- Exploring attack graph for cost-benefit security hardening: A probabilistic approach. Computers & Security. 32:158-169. 2012
- Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs. IEEE Wireless Communications Letters. 1:540-543. 2012
- HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity. Journal of Network and Computer Applications. 35:1818-1830. 2012
- Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks. Computers & Security. 30:525-537. 2011
- Discrete logarithm based additively homomorphic encryption and secure data aggregation. Information Sciences. 181:3308-3322. 2011
- Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges. IEEE Communications Surveys & Tutorials. 13:658-672. 2010
- RADAR: A reputation-driven anomaly detection system for wireless mesh networks. Wireless Networks. 16:2221-2236. 2010
-
book
-
chapter
- Machine Learning for Network Intrusion Detection. Springer eBooks. 1-4. 2021
- Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV. Security and Privacy in Communication Networks. 287-301. 2019
- SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems. Lecture notes in computer science. 570-581. 2018
-
conference paper
- Disaster-Resilient Service Function Chain Embedding Based on Multi-Path Routing. IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 1-7. 2021
- Message from the Program Chairs CSCloud 2020 CSCloud-EdgeCom 2020. . 1-1. 2020
- Lightweight Authentication Scheme for Internet of Things. . 1-2. 2020
- Machine learning for IoT network monitoring. HAL (Le Centre pour la Communication Scientifique Directe). 2019
- IoT Devices Recognition Through Network Traffic Analysis. 2021 IEEE International Conference on Big Data (Big Data). 2018
- Adaptive Policy-driven Attack Mitigation in SDN. . 1-6. 2017
- A First Step Towards Security Extension for NFV Orchestrator. . 2017
- ControllerSEPA: A Security-Enhancing SDN Controller Plug-in for OpenFlow Applications. . 268-273. 2016
- SRV: Switch-based rules verification in software defined networking. . 477-482. 2016
- VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications. 2015 IEEE Global Communications Conference (GLOBECOM). 1-6. 2015
- VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications. 2015 IEEE Global Communications Conference (GLOBECOM). 1-6. 2014
- Achieving Probabilistic Anonymity Against One-to-Multiple Linkage Attacks. . 176-183. 2013
- An efficient certificateless remote anonymous authentication scheme for wireless body area networks. . 2012
- Certificateless Partially Blind Signature. . 128-133. 2012
- Practical network traffic analysis in P2P environment. . 1801-1807. 2011
-
edited book
-
proceedings