Citation Impact
Citing Papers
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness1
2010 Standout
Multiple aberrations in shared inflammatory and oxidative & nitrosative stress (IO&NS) pathways explain the co-association of depression and cardiovascular disorder (CVD), and the increased risk for CVD and due mortality in depressed patients
2010
Extracellular superoxide dismutase (ecSOD) in vascular biology: an update on exogenous gene transfer and endogenous regulators of ecSOD
2007
Reskilling and Upskilling the Future-ready Workforce for Industry 4.0 and Beyond
2022 Standout
A review on the oxidative and nitrosative stress (O&NS) pathways in major depression and their possible contribution to the (neuro)degenerative processes in that illness
2010 Standout
Superoxide Dismutases: Role in Redox Signaling, Vascular Function, and Diseases
2011 Standout
An Overview of Industrial Alarm Systems: Main Causes for Alarm Overloading, Research Status, and Open Problems
2015 Standout
Future Intelligent and Secure Vehicular Network Toward 6G: Machine-Learning Approaches
2019 Standout
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
2008
Secure routing in wireless sensor networks: attacks and countermeasures
2003 Standout
Internet of Things (IoT): A vision, architectural elements, and future directions
2013 Standout
Taxonomy and analysis of security protocols for Internet of Things
2018
The Internet of Things for Health Care: A Comprehensive Survey
2015 Standout
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
2018 Standout
Wireless sensor networks: a survey on recent developments and potential synergies
2013 Standout
Wireless sensor network key management survey and taxonomy
2009
Wireless Body Area Networks: A Survey
2014 Standout
IoT security: Review, blockchain solutions, and open challenges
2017 Standout
False alarm minimization techniques in signature-based intrusion detection systems: A survey
2014
A Survey of 5G Network: Architecture and Emerging Technologies
2015 Standout
A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks
2008
Market basket analysis in a multiple store environment
2004
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
2012 Standout
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
2017 Standout
Exclusive Use Spectrum Access Trading Models in Cognitive Radio Networks: A Survey
2017
A systematic literature review of blockchain-based applications: Current status, classification and open issues
2018 Standout
Security, privacy and trust in Internet of Things: The road ahead
2014 Standout
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
2016 Standout
Securing wireless sensor networks: a survey
2008
Channel-Based Detection of Sybil Attacks in Wireless Networks
2009
Application of data mining techniques in customer relationship management: A literature review and classification
2008 Standout
Ranging With Ultrawide Bandwidth Signals in Multipath Environments
2009 Standout
Cyber-physical systems and their security issues
2018 Standout
Survey of intrusion detection systems: techniques, datasets and challenges
2019 Standout
Scalable and efficient key management for heterogeneous sensor networks
2008
Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview
2013
Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics
2018
Industrial Internet-of-Things Security Enhanced With Deep Learning Approaches for Smart Cities
2020 Standout
Alert correlation in collaborative intelligent intrusion detection systems—A survey
2011
Routing techniques in wireless sensor networks: a survey
2004 Standout
Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols
2014
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT
2019
Approaches to Secure Inference in the Internet of Things: Performance Bounds, Algorithms, and Effective Attacks on IoT Sensor Networks
2018
Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems
2017 Standout
A survey on security control and attack detection for industrial cyber-physical systems
2017 Standout
Security in wireless sensor networks
2008
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
2015 Standout
Securing body sensor networks: Sensor association and key management
2009
Application of SVM and ANN for intrusion detection
2004
LEAP+
2006
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
2011
A survey of security issues in wireless sensor networks
2006
Zinc and Oxidative Stress: Current Mechanisms
2017
On the features and challenges of security and privacy in distributed internet of things
2013 Standout
The Internet of Things: Review and theoretical framework
2019 Standout
Satellite Communications in the New Space Era: A Survey and Future Challenges
2020 Standout
Towards Quantifying the Possible Risk in e-commerce Interactions for RDSS
2007
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
2020 Standout
TRM-IoT: A trust management model based on fuzzy reputation for internet of things
2011
A framework for a distributed key management scheme in heterogeneous wireless sensor networks
2008
Data provenance assurance in the cloud using blockchain
2017
Reactive Oxygen Species-Induced Lipid Peroxidation in Apoptosis, Autophagy, and Ferroptosis
2019 Standout
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
2009
Secure Data Aggregation in Wireless Sensor Networks: A Survey
2006
Detection of Temporal Dependencies in Alarm Time Series of Industrial Plants
2014
Key management systems for sensor networks in the context of the Internet of Things
2011
Asymptotically Optimum Distributed Estimation in the Presence of Attacks
2014
An Overview of Internet of Things (IoT) and Data Analytics in Agriculture: Benefits and Challenges
2018 Standout
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues
2020 Standout
Location-based compromise-tolerant security mechanisms for wireless sensor networks
2006
Security of the Internet of Things: perspectives and challenges
2014 Standout
Internet of Things security: A survey
2017 Standout
Intrusion detection system: A comprehensive review
2012 Standout
Security in grid computing: A review and synthesis
2007
An analysis of fatal gas accidents in Chinese coal mines
2013 Standout
Random key predistribution schemes for sensor networks
2004 Standout
Robust and Secure Wireless Communications via Intelligent Reflecting Surfaces
2020 Standout
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
2020 Standout
Security in wireless sensor networks
2004 Standout
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
2015 Standout
Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey
2015
A survey of key management schemes in wireless sensor networks
2007
Cyber-Physical Systems Security—A Survey
2017 Standout
A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
2017
OCP: A protocol for secure communication in federated content networks
2015
Two-factor user authentication in wireless sensor networks
2009 Standout
SPINS: Security Protocols for Sensor Networks
2002 Standout
A Survey on Mobile Edge Computing: The Communication Perspective
2017 Standout
Sensor network security: a survey
2009
The internet of things: a survey
2014 Standout
Cloud computing — The business perspective
2010 Standout
Works of Peng Ning being referenced
Building Attack Scenarios through Integration of Complementary Alert Correlation Method.
2004
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks
2002
Zinc supplementation inhibits lipid peroxidation and the development of atherosclerosis in rabbits fed a high cholesterol diet
2006
Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks
2003
A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check
2013
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols*1
2004
BAF and FI-BAF
2012
Computer Security – ESORICS 2009
2009
Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation
2002
Improving key predistribution with deployment knowledge in static sensor networks
2005
Design and implementation of a decentralized prototype system for detecting distributed attacks
2002
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
2004
Hypothesizing and reasoning about attacks missed by intrusion detection systems
2004
Establishing pairwise keys in distributed sensor networks
2005
Discovering calendar-based temporal association rules
2002
Techniques and tools for analyzing intrusion alerts
2004
HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing
2013
Abstraction-based intrusion detection in distributed environments
2001