1. Threat defense: Cyber deception approach and education for resilience in hybrid threats model;Steingartner;Symmetry,2021
2. Securing meetings in D2D IoT systems;Szymoniak,2022
3. Access control and authentication in IoT;Egala,2022
4. Perspectives on the internet of everything;Kiesler,2023
5. Protocol design for earthquake alert and evacuation in smart buildings;Sivakumar,2022