Kalis—A system for knowledge-driven adaptable intrusion detection for the Internet of Things D Midi, A Rullo, A Mudgerikar, E Bertino 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 231 | 2017 |
Heimdall: Mitigating the internet of insecure things J Habibi, D Midi, A Mudgerikar, E Bertino IEEE Internet of Things Journal 4 (4), 968-978, 2017 | 107 | 2017 |
Memory safety for embedded devices with nescheck D Midi, M Payer, E Bertino Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 50 | 2017 |
Identidroid: Android can finally wear its anonymous suit B Shebaro, O Oluwatimi, D Midi, E Bertino | 48 | 2014 |
Kinesis: a security incident response and prevention system for wireless sensor networks S Sultana, D Midi, E Bertino Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014 | 34 | 2014 |
Pareto optimal security resource allocation for Internet of Things A Rullo, D Midi, E Serra, E Bertino ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-30, 2017 | 31 | 2017 |
Fine-grained analysis of packet loss in MANETs MS Khan, D Midi, MI Khan, E Bertino IEEE Access 5, 7798-7807, 2017 | 28 | 2017 |
Fine-grained analysis of packet losses in wireless sensor networks B Shebaro, D Midi, E Bertino 2014 Eleventh Annual IEEE International Conference on Sensing, Communication …, 2014 | 20 | 2014 |
Isolating misbehaving nodes in MANETs with an adaptive trust threshold strategy MS Khan, D Midi, SUR Malik, M I. Khan, N Javaid, E Bertino Mobile Networks and Applications 22, 493-509, 2017 | 19 | 2017 |
Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation MS Khan, D Midi, MI Khan, E Bertino TrustCom, 2015 | 17 | 2015 |
A game of things: Strategic allocation of security resources for iot A Rullo, D Midi, E Serra, E Bertino Proceedings of the Second International Conference on Internet-of-Things …, 2017 | 16 | 2017 |
Node or link? Fine-grained analysis of packet-loss attacks in wireless sensor networks D Midi, E Bertino ACM Transactions on Sensor Networks (TOSN) 12 (2), 1-30, 2016 | 14 | 2016 |
A system for response and prevention of security incidents in wireless sensor networks D Midi, S Sultana, E Bertino ACM Transactions on Sensor Networks (TOSN) 13 (1), 1-38, 2016 | 13 | 2016 |
Overview of mobile containerization approaches and open research directions O Oluwatimi, D Midi, E Bertino IEEE Security & Privacy 15 (1), 22-31, 2017 | 12 | 2017 |
Strategic security resource allocation for internet of things A Rullo, D Midi, E Serra, E Bertino 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 11 | 2016 |
A context-aware system to secure enterprise content O Oluwatimi, D Midi, E Bertino Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016 | 8 | 2016 |
Demo overview: privacy-enhancing features of identidroid D Midi, O Oluwatimi, B Shebaro, E Bertino Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 7 | 2014 |
Fine-grained analysis of packet loss symptoms in wireless sensor networks B Shebaro, D Midi, E Bertino Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, 1-2, 2013 | 7 | 2013 |
Statistically-enhancing the diagnosis of packet losses in WSNs A Tedeschi, D Midi, F Benedetto, E Bertino International Journal of Mobile Network Design and Innovation 7 (1), 3-14, 2017 | 6 | 2017 |
Statistically-enhanced fine-grained diagnosis of packet losses D Midi, A Tedeschi, F Benedetto, E Bertino 2015 3rd International Conference on Future Internet of Things and Cloud …, 2015 | 4 | 2015 |