Issue Date | Title | Author(s) |
2022-01-01 | Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios | Sood, K; Nosouhi, MR; Kumar, N; Gaddam, A; Feng, B; Yu, S |
2023-01-01 | Bit Flipping Key Encapsulation for the Post-Quantum Era | Nosouhi, MR; Shah, SWA; Pan, L; Doss, R |
2020-02-01 | Blockchain for secure location verification | Nosouhi, MR; Yu, S; Zhou, W; Grobler, M; Keshtiar, H |
2022-01-01 | Bushfire Risk Detection Using Internet of Things: An Application Scenario | Nosouhi, MR; Sood, K; Kumar, N; Wevill, T; Thapa, C |
2019-08-01 | HSDC-Net: Secure anonymous messaging in online social networks | Nosouhi, MR; Yu, S; Sood, K; Grobler, M |
2019-03-01 | Improving Data Utility Through Game Theory in Personalized Differential Privacy | Cui, L; Qu, Y; Nosouhi, MR; Yu, S; Niu, JW; Xie, G |
2023-01-01 | Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks | Sood, K; Nosouhi, MR; Nguyen, DDN; Jiang, F; Chowdhury, M; Doss, R |
2020-04-01 | PASPORT: A Secure and Private Location Proof Generation and Verification Framework | Nosouhi, MR; Sood, K; Yu, S; Grobler, M; Zhang, J |
2023-09-01 | Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks | Sood, K; Nguyen, DDN; Nosouhi, MR; Kumar, N; Jiang, F; Chowdhury, M; Doss, R |
2021 | Personalized Privacy Protection in Big Data | Qu, Y; Nosouhi, MR; Cui, L; Yu, S |
2019-01-01 | Privacy preservation in smart cities | Qu, Y; Nosouhi, MR; Cui, L; Yu, S |
2023-07-10 | SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems | Shah, SWA; Nosouhi, MR; Pan, L; Doss, R |
2023-01-01 | Towards quantum-secure software defined networks | Nosouhi, MR; Sood, K; Chamola, V; Jeong, JJ; Gaddam, A |
2022-01-01 | Towards Spoofing Resistant Next Generation IoT Networks | Nosouhi, MR; Sood, K; Grobler, M; Doss, R |
2022-01-01 | UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies | Nosouhi, MR; Yu, S; Sood, K; Grobler, M; Jurdak, R; Dorri, A; Shen, S |
2023-01-01 | Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism | Nosouhi, MR; Shah, SW; Pan, L; Zolotavkin, Y; Nanda, A; Gauravaram, P; Doss, R |