Currently viewing:
-
EH-HL: Effective communication model by integrated EH-WSN and hybrid LiFi/WiFi for IoT
Sharma, P. K., Jeong, Y. S., Park, J. H.
IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1719-1726
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1109/JIOT.2018.2791999
- Additional Links
-
View publication in Scopus
-
OpCloudSec: Open cloud software defined wireless network security for the Internet of Things
Sharma, P. K., Singh, S., Park, J. H.
Computer Communications, vol. 122, pp. 1-8
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1016/j.comcom.2018.03.008
- Additional Links
-
View publication in Scopus
-
Security, privacy and trust of user-centric solutions
Akram, R. N., Chen, H., Lopez, J., Sauveron, D., Yang, L.
Future Generation Computer Systems, vol. 80, pp. 417-420
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1016/j.future.2017.11.026
- Additional Links
-
Royal Holloway University of London Repository
-
A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT
Sharma, P. K., Chen, M. Y., Park, J. H.
IEEE Access, vol. 6, pp. 115-124
Contributions to Journals: Articles
- Digital Object Identifier
-
https://doi.org/10.1109/ACCESS.2017.2757955
- Additional Links
-
View publication in Scopus
-
May the Force Be with You: Force-Based Relay Attack Detection
Gurulian, I., Hancke, G., Markantonakis, K., Akram, R. N.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1007/978-3-319-75208-2_9
-
Caught by phishing emails? How can argumentation schemes be used to protect users?
Thomas, R. J., Collinson, M., Masthoff, J.
Contributions to Conferences: Papers
- Additional Links
-
View publication in Scopus
-
DSS-SL: Dynamic signage system based on SDN with LiFi communication for smart buildings
Sharma, P. K., Kwon, B. W., Park, J. H.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1007/978-981-10-7605-3_128
- Additional Links
-
View publication in Scopus
-
Good Vibrations: artificial ambience-based relay attack detection
Gurulian, I., Markantonakis, K., Frank, E., Akram, R. N.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Digital Object Identifier
-
https://doi.org/10.1109/TrustCom/BigDataSE.2018.00075
-
How can persuasion reduce user cyber security vulnerabilities?
Vargheese, J. P., Collinson, M., Masthoff, J.
Contributions to Conferences: Papers
- Additional Links
-
View publication in Scopus