Citation Impact
Citing Papers
ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors
2014
Secure, privacy-preserving and federated machine learning in medical imaging
2020 Standout
Wireless sensor networks: a survey on recent developments and potential synergies
2013 Standout
A Survey of SIP Authentication and Key Agreement Schemes
2013 Standout
The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators
2013
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
2008
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
2012 Standout
Mobile Unmanned Aerial Vehicles (UAVs) for Energy-Efficient Internet of Things Communications
2017 Standout
Machine-to-machine communications: Technologies and challenges
2013
A Survey on Security and Privacy Issues in Internet-of-Things
2017 Standout
Scalable and efficient key management for heterogeneous sensor networks
2008
A survey on cloud computing security: Issues, threats, and solutions
2016
Latent Dirichlet allocation (LDA) and topic modeling: models, applications, a survey
2018 Standout
An Edge Traffic Flow Detection Scheme Based on Deep Learning in an Intelligent Transportation System
2020 Standout
Secure Multi-Party Computation: Theory, practice and applications
2018
Android Security: A Survey of Issues, Malware Penetration, and Defenses
2014 Standout
Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city
2020 Standout
Federated Machine Learning
2019 Standout
LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation
2016
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
2020 Standout
A Survey on Internet of Things and Cloud Computing for Healthcare
2019 Standout
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues
2020 Standout
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
2019
A Survey on Homomorphic Encryption Schemes
2018
A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It
2018
Works of Patrick Traynor being referenced
Proxychain: developing a robust and efficient authentication infrastructure for carrier-scale VoIP networks
2010
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
2013
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks
2008
One-time cookies
2012
Secure attribute-based systems
2010
Outsourcing secure two‐party computation as a black box
2016
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
2007
Secure outsourced garbled circuit evaluation for mobile devices
2015
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
2008