Volgen
Robin Doss
Robin Doss
Deakin Cyber Research & Innovation Centre (Deakin Cyber), Deakin University
Geverifieerd e-mailadres voor deakin.edu.au
Titel
Geciteerd door
Geciteerd door
Jaar
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010
2702010
Security analysis methods on ethereum smart contract vulnerabilities: a survey
P Praitheeshan, L Pan, J Yu, J Liu, R Doss
arXiv preprint arXiv:1908.08605, 2019
2272019
Zero trust architecture (zta): A comprehensive survey
NF Syed, SW Shah, A Shaghaghi, A Anwar, Z Baig, R Doss
IEEE access 10, 57143-57179, 2022
2192022
An improved authentication scheme for internet of vehicles based on blockchain technology
X Wang, P Zeng, N Patterson, F Jiang, R Doss
IEEE access 7, 45061-45072, 2019
1422019
Information theory based detection against network behavior mimicking DDoS attacks
S Yu, W Zhou, R Doss
IEEE Communications Letters 12 (4), 318-321, 2008
1312008
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
R Doss, S Sundaresan, W Zhou
Ad Hoc Networks 11 (1), 383-396, 2013
912013
Secure RFID tag ownership transfer based on quadratic residues
R Doss, W Zhou, S Yu
IEEE Transactions on Information Forensics and Security 8 (2), 390-401, 2012
702012
A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network
S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss
Journal of Parallel and Distributed Computing 120, 23-31, 2018
682018
The importance of selecting clustering parameters in VANETs: A survey
R Kaur, RK Ramachandran, R Doss, L Pan
Computer Science Review 40, 100392, 2021
672021
Traceability in supply chains: A Cyber security analysis
NF Syed, SW Shah, R Trujillo-Rasua, R Doss
Computers & Security 112, 102536, 2022
632022
A scalable and efficient PKI based authentication protocol for VANETs
M Asghar, RRM Doss, L Pan
2018 28th International Telecommunication Networks and Applications …, 2018
632018
Differential privacy for IoT-enabled critical infrastructure: A comprehensive survey
MA Husnoo, A Anwar, RK Chakrabortty, R Doss, MJ Ryan
IEEE access 9, 153276-153304, 2021
602021
Protean authentication scheme–a time-bound dynamic keygen authentication technique for iot edge nodes in outdoor deployments
S Sathyadevan, K Achuthan, R Doss, L Pan
IEEE access 7, 92419-92435, 2019
602019
Routing protocols in opportunistic networks–a survey
M Alajeely, R Doss, A Ahmad
IETE Technical Review 35 (4), 369-387, 2018
592018
Secure tag search in RFID systems using mobile readers
S Sundaresan, R Doss, S Piramuthu, W Zhou
IEEE Transactions on Dependable and Secure Computing 12 (2), 230-242, 2014
562014
A comparison survey study on RFID based anti-counterfeiting systems
G Khalil, R Doss, M Chowdhury
Journal of Sensor and Actuator Networks 8 (3), 37, 2019
542019
LCDA: Lightweight continuous device-to-device authentication for a zero trust architecture (ZTA)
SW Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
Computers & Security 108, 102351, 2021
532021
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy
S Sundaresan, R Doss, W Zhou, S Piramuthu
Computer Communications 55, 112-124, 2015
522015
SEPN: a sequential engagement based academic performance prediction model
X Song, J Li, S Sun, H Yin, P Dawson, RRM Doss
IEEE Intelligent Systems 36 (1), 46-53, 2020
512020
Intrusion detection scheme with dimensionality reduction in next generation networks
K Sood, MR Nosouhi, DDN Nguyen, F Jiang, M Chowdhury, R Doss
IEEE Transactions on Information Forensics and Security 18, 965-979, 2023
472023
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20