Currently viewing:
-
Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks
Gupta, S., Garg, R., Gupta, N., Alnumay, W. S., Ghosh, U., Sharma, P. K.
Journal of Information Security and Applications, vol. 58, 102768
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1016/j.jisa.2021.102768
- Additional Links
-
View publication in Scopus
-
Distributed probabilistic offloading in edge computing for 6g-enabled massive internet of things
Liao, Z., Peng, J., Huang, J., Wang, J., Wang, J., Sharma, P. K., Ghosh, U.
IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5298-5308
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1109/JIOT.2020.3033298
- Additional Links
-
View publication in Scopus
-
Modelling Security Risk Scenarios Using Subjective Attack Trees
Al-Hadhrami, N., Collinson, M., Oren, N.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1007/978-3-030-68887-5_12
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/15920/1/Al_Hadharami_et_al_LNCS_ModellingSecurityRisk_AAM.pdf
- Additional Links
-
View publication in Scopus
-
Security Analysis Using Subjective Attack Trees
Al-Hadhrami, N., Collinson, M., Oren, N.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1007/978-3-030-69255-1_19
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/15921/1/Al_Hadhrami_et_al_LNCS_SecurityAnalysisUsing_AAM.pdf
- Additional Links
-
View publication in Scopus
-
Multiple cloud storage mechanism based on blockchain in smart homes
Ren, Y., Leng, Y., Qi, J., Sharma, P. K., Wang, J., Almakhadmeh, Z., Tolba, A.
Future Generation Computer Systems, vol. 115, pp. 304-313
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1016/j.future.2020.09.019
- Additional Links
-
View publication in Scopus
-
P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time
Kalbantner, J., Markantonakis, K., Hurley-Smit, D., Akram, R. N., Semal, B.
Energies, vol. 14, no. 3, 606
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.3390/en14030606
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/16068/1/Kalbantner_etal_P2PEdge_VOR.pdf
-
Blockchain-Based Secure Mist Computing Network Architecture for Intelligent Transportation Systems
Sharma, P. K., Park, J. H.
IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 8, pp. 5168 - 5177
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1109/TITS.2020.3040989
- Additional Links
-
View publication in Scopus
-
A Language-based Approach to Analysing Flow Security Properties in Virtualised Computing Systems
Mu, C.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1109/TASE49443.2020.00033
- Open Access
-
http://aura.abdn.ac.uk/bitstream/2164/19956/1/main.pdf
-
Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city
Singh, S., Sharma, P. K., Yoon, B., Shojafar, M., Cho, G. H., Ra, I. H.
Sustainable Cities and Society, vol. 63, 102364
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1016/j.scs.2020.102364
- Additional Links
-
View publication in Scopus
-
A Subjective Network Approach for Cybersecurity Risk Assessment
Al-Hadhrami, N., Collinson, M., Oren, N.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1145/3433174.3433175