Select Publications
Journal articles
2024, 'A Comprehensive Threat Modelling Analysis for Distributed Energy Resources', ACM Transactions on Cyber-Physical Systems, 8, pp. 1 - 32, http://dx.doi.org/10.1145/3678260
,2024, 'Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics', IEEE Internet of Things Journal, 11, pp. 27303 - 27321, http://dx.doi.org/10.1109/JIOT.2024.3401101
,2023, 'Don't Be a Victim during a Pandemic! Analysing Security and Privacy Threats in Twitter during COVID-19', IEEE Access, 11, pp. 29769 - 29789, http://dx.doi.org/10.1109/ACCESS.2023.3260643
,2021, 'A review of computer vision methods in network security', IEEE Communications Surveys and Tutorials, 23, pp. 1838 - 1878, http://dx.doi.org/10.1109/COMST.2021.3086475
,2020, 'Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading', ACM Transactions on Privacy and Security, 23, http://dx.doi.org/10.1145/3380466
,2018, 'CRESCENT+: a self-protecting framework for reliable composite web service delivery', Iran Journal of Computer Science, 1, pp. 65 - 87, http://dx.doi.org/10.1007/s42044-018-0008-3
,2018, 'Touch and You’re Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking', Proceedings on Privacy Enhancing Technologies, 2018, pp. 122 - 142, http://dx.doi.org/10.1515/popets-2018-0016
,2017, 'EACF: extensible access control framework for cloud environments', Annales des Telecommunications/Annals of Telecommunications, 72, pp. 307 - 323, http://dx.doi.org/10.1007/s12243-016-0548-1
,2016, 'DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases', Eurasip Journal on Information Security, 2016, http://dx.doi.org/10.1186/s13635-016-0040-5
,2015, 'Taxonomy for trust models in cloud computing', Computer Journal, 58, pp. 601 - 626, http://dx.doi.org/10.1093/comjnl/bxu138
,2015, 'MagicNET: Mobile agents data protection system', Transactions on Emerging Telecommunications Technologies, 26, pp. 813 - 835, http://dx.doi.org/10.1002/ett.2742
,2015, 'Cloud authorization: exploring techniques and approach towards effective access control framework', Frontiers of Computer Science, 9, pp. 297 - 321, http://dx.doi.org/10.1007/s11704-014-3160-4
,2014, 'Cloud identity management security issues & solutions: a taxonomy', Complex Adaptive Systems Modeling, 2, http://dx.doi.org/10.1186/s40294-014-0005-9
,