关注
Daniel Gerbi Duguma
Daniel Gerbi Duguma
在 uio.no 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Drone secure communication protocol for future sensitive applications in military zone
Y Ko, J Kim, DG Duguma, PV Astillo, I You, G Pau
Sensors 21 (6), 2057, 2021
872021
Blockchain-based privacy preservation scheme for misbehavior detection in lightweight IoMT devices
S Rahmadika, PV Astillo, G Choudhary, DG Duguma, V Sharma, I You
IEEE Journal of Biomedical and Health Informatics 27 (2), 710-721, 2022
432022
Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System
PV Astillo, DG Duguma, H Park, J Kim, B Kim, I You
Future Generation Computer Systems 128, 395-405, 2022
372022
TrMAps: Trust management in specification-based misbehavior detection system for IMD-enabled artificial pancreas system
PV Astillo, G Choudhary, DG Duguma, J Kim, I You
IEEE Journal of Biomedical and Health Informatics 25 (10), 3763-3775, 2021
172021
A formally verified security scheme for inter-gNB-DU handover in 5G vehicle-to-everything
J Kim, DG Duguma, PV Astillo, HY Park, B Kim, I You, V Sharma
IEEE Access 9, 119100-119117, 2021
132021
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks
DG Duguma, J Kim, S Lee, NS Jho, V Sharma, I You
Connection Science 34 (1), 362-386, 2022
92022
5G wireless P2MP backhaul security protocol: An adaptive approach
J Kim, G Choudhary, J Heo, DG Duguma, I You
EURASIP Journal on Wireless Communications and Networking 2019 (1), 265, 2019
92019
Scrutinizing the vulnerability of ephemeral Diffie–Hellman over COSE (EDHOC) for IoT environment using formal approaches
J Kim, DG Duguma, S Lee, B Kim, JD Lim, I You
Mobile Information Systems 2021 (1), 7314508, 2021
62021
Fingerprint defender: defense against browser-based user tracking
D Moad, V Sihag, G Choudhary, DG Duguma, I You
International Symposium on Mobile Internet Security, 236-247, 2021
42021
Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols
DG Duguma, I You, YE Gebremariam, J Kim
Sensors 21 (24), 8383, 2021
32021
5G and beyond telco cloud: architecture and cybersecurity challenges
YE Gebremariam, DG Duguma, HY Park, YN Kim, B Kim, I You
2021 World Automation Congress (WAC), 1-6, 2021
22021
An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS.
H Park, TG Kim, DG Duguma, J Kim, I You, W Susilo
Computer Systems Science & Engineering 45 (2), 2023
12023
Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System
DG Duguma, PV Astillo, YE Gebremariam, B Kim, I You
International Symposium on Mobile Internet Security, 30-43, 2021
12021
lwEPSep: A Lightweight End-to-end Privacy-preserving Security Protocol for CTI Sharing in IoT Environments
H Park, J Kim, S Lee, DG Duguma, I You
Journal of Internet Technology 22 (5), 1069-1081, 2021
12021
A Formal Security Verification on He and Zeadally's Authentication Protocol for IMD-Enabled Ambient Assisted Living System
DG Duguma, J Kim, B Kim, I You
Proceedings of the 2020 ACM International Conference on Intelligent …, 2020
12020
Comments on" Securing implantable cardiac medical devices" Use of radio frequency energy harvesting
J Kim, S Lee, DG Duguma, B Kim, I You
Proceedings of the 2020 ACM International Conference on Intelligent …, 2020
12020
Aggregate authentication for massive Internet of Things in 5G networks
A Syalim, B Anggorojati, J Baek, D Gerbi, I You
Mobile Internet Security: 4th International Symposium, MobiSec 2019 …, 2020
12020
Poster: Specification-based Misbehavior Detection and Deep Learning-based Anomaly Detection System to Enhance Insulin Pump Security
PV Astillo, YE Gebremariam, DG Duguma, B Kim, I You
系统目前无法执行此操作,请稍后再试。
文章 1–18