• Publications
  • Influence
Security and Privacy in Fog Computing: Challenges
Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing serviceExpand
  • 209
  • 9
Authentication Protocols for Internet of Things: A Comprehensive Survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in theExpand
  • 85
  • 7
Internet of Cloud: Security and Privacy issues
The synergy between Cloud and IoT has emerged largely due to the Cloud having attributes which directly benefit IoT and enable its continued growth. IoT adopting Cloud services has brought newExpand
  • 20
  • 5
Blockchain Technologies for the Internet of Things: Research Issues and Challenges
This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveysExpand
  • 107
  • 4
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that dealExpand
  • 73
  • 4
Vulnerability Assessment of Cyber Security for SCADA Systems
Supervisory control and data acquisition (SCADA) systems use programmable logic controllers (PLC) or other intelligent electronic devices (IED), remote terminal units (RTU) and input/output (I/O)Expand
  • 19
  • 2
Cyber security of critical infrastructures
Abstract Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the InternetExpand
  • 44
  • 1
A systematic review of data protection and privacy preservation schemes for smart grid communications
Abstract In this paper, we present a comprehensive survey of privacy-preserving schemes for smart grid communications. Specifically, we select and in-detail examine thirty-two privacy preservingExpand
  • 27
  • 1
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security
The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with theseExpand
  • 12
  • 1
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
Abstract In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review ofExpand
  • 17
  • 1