Number of items: 5
|Hameed, K and Garg, S and Amin, MB and Kang, B and Khan, A, A context-aware information-based clone node attack detection scheme in Internet of Things, Journal of Network and Computer Applications, 197 Article 103271. ISSN 1084-8045 (2022) [Refereed Article]|
|Hameed, K and Barika, M and Garg, S and Amin, MB and Kang, B, A taxonomy study on securing Blockchain-based Industrial applications: an overview, application perspectives, requirements, attacks, countermeasures, and open issues, Journal of Industrial Information Integration, 26 Article 100312. ISSN 2467-964X (2022) [Refereed Article]|
|Hameed, K and Garg, S and Amin, MB and Kang, B, Towards a formal modelling, analysis and verification of a clone node attack detection scheme in the internet of things, Computer Networks, 204 Article 108702. ISSN 1389-1286 (2022) [Refereed Article]|
|Hameed, K and Garg, S and Amin, MB and Kang, B, A formally verified blockchain-based decentralised authentication scheme for the internet of things, Journal of Supercomputing pp. 1-41. ISSN 0920-8542 (2021) [Refereed Article]|
|Chapter in Book|
|Naha, RK and Battula, SK and Hameed, K and Ujjwal, KC and Patwary, MAK and Garg, S and Kang, B, Towards Secure Internet of Things: Blockchain Solutions, Challenges, and Open Issues, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications, Taylor & Francis Group, Y Maleh, M Shojafar, M Alazab & I Romdhani (ed), United Kingdom, pp. 85-116. ISBN 9780367343101 (2020) [Research Book Chapter]|
This list was generated on Mon Jul 4 15:15:44 2022.