Hani Alzaid

According to our database1, Hani Alzaid authored at least 19 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A systematic evaluation of cybersecurity metrics for dynamic networks.
Comput. Networks, 2018

Automated security investment analysis of dynamic networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Evaluating the Effectiveness of Security Metrics for Dynamic Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Security Modeling and Analysis of Cross-Protocol IoT Devices.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2013
Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Secure data aggregation in wireless sensor networks.
Proceedings of the 12th Annual Mediterranean Ad Hoc Networking Workshop, 2013

An efficient secure data aggregation scheme for wireless sensor networks.
Proceedings of the 4th International Conference on Information, 2013

Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

2012
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks.
Secur. Commun. Networks, 2012

A taxonomy of secure data aggregation in wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2012

LNT: A logical neighbor tree secure group communication scheme for wireless sensor networks.
Ad Hoc Networks, 2012

Performance Evaluation of EC-ElGamal Encryption Algorithm for Wireless Sensor Networks.
Proceedings of the Wireless Mobile Communication and Healthcare, 2012

2011
LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

2010
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
A Wireless Sensor Networks Test-bed for the Wormhole Attack.
J. Digit. Content Technol. its Appl., 2009

A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the Sensor Systems and Software, 2009

2008
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches.
Proceedings of the NTMS 2008, 2008

Secure Data Aggregation in Wireless Sensor Network: a survey.
Proceedings of the Sixth Australasian Information Security Conference, 2008


  Loading...