Cited By
View all- Shuvo MHoq MMajumdar SShirani P(2023)On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoTSecurity Standardisation Research10.1007/978-3-031-30731-7_5(103-128)Online publication date: 22-Apr-2023
- Majumdar SChawla GAlimohammadifar AMadi TJarraya YPourzandi MWang LDebbabi M(2022) ProSAS : Proactive Security Auditing System for Clouds IEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.306220419:4(2517-2534)Online publication date: 1-Jul-2022
- S KGupta R(2022)An Investigation on Fat Tree Topology ARP Spoof Detection Using Software Defined Networking2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)10.1109/ICERECT56837.2022.10060657(1-5)Online publication date: 26-Dec-2022
- Show More Cited By