Toward the Conception of a Multichain to Meet Users’ Future Needs: A Design Science Research Approach to Digital Servitization in the Automotive Industry

_ Available on IEEE Xplore and Zenodo

Accelerating Blockchain Applications on IoT Architecture Models – Solutions and Drawbacks_Available on AMC Journal and Zenodo

Threat intelligence using Digital Twin honeypots in Cybersecurity_IEEE Explore and Zenodo

Analysing Adversarial Threats to Rule-Based Local-Planning Algorithms for Autonomous Driving_ Available on NDSS and Zenodo

User-centric design and validation of a DLT/Blockchain-based auditing tool for incident response traceability and accountability_RISE 2023 online proceedings 

FLVoogd: Robust And Privacy Preserving Federated Learning _ Available on Proceedings of Machine Learning Research and Zenodo

More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks_ACM Digital Library and Zenodo.

  • ID-based self-encryption via Hyperledger Fabric based smart contract _ Available on Springer
  • Combining ID’s, Attributes, and Policies in Hyperledger Fabric_ Available on Springer
  • Passtrans: An Improved Password Reuse Model Based on Transformer_ Available on IEEE and Zenodo
  • WordMarkov: A New Password Probability Model of Semantics_ Available on IEEE and Zenodo
  • DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay_ Available on Springer and Zenodo
  • No-directional and Backward-leak Uni-directional Updatable Encryption are Equivalent_ Available on Springer and Zenodo
  • VAL: Volume and Access Pattern Leakage-abuse Attack with Leaked Documents_ Available on Springer and Zenodo
  • Lighter is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption_ Available on Springer and Zenodo

IRIS Advanced Threat Intelligence Orchestrator- A way to manage cyber security challenges of IoT ecosystems in Smart Cities_ Available on Springer and Zenodo

Fine-Grained Coverage-Based Fuzzing _ Available on NDSS and Zenodo