default search action
Robin Doss
Person information
- affiliation: Deakin University, Burwood, Victoria, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j73]Ashish Nanda, Syed Wajid Ali Shah, Jongkil Jay Jeong, Robin Doss, Jeb Webb:
Toward Higher Levels of Assurance in Remote Identity Proofing. IEEE Consumer Electron. Mag. 13(1): 62-71 (2024) - [j72]Mingcan Cen, Frank Jiang, Xingsheng Qin, Qinghong Jiang, Robin Doss:
Ransomware early detection: A survey. Comput. Networks 239: 110138 (2024) - [j71]Kerry Anne Farrea, Zubair A. Baig, Robin Ram Mohan Doss, Dongxi Liu:
Provably secure optimal homomorphic signcryption for satellite-based internet of things. Comput. Networks 250: 110516 (2024) - [j70]Xingsheng Qin, Frank Jiang, Xingguo Qin, Lina Ge, Meiqu Lu, Robin Doss:
CGAN-based cyber deception framework against reconnaissance attacks in ICS. Comput. Networks 251: 110655 (2024) - [j69]Xingsheng Qin, Frank Jiang, Chengzu Dong, Robin Doss:
A hybrid cyber defense framework for reconnaissance attack in industrial control systems. Comput. Secur. 136: 103506 (2024) - [j68]Ashish Nanda, Jongkil Jay Jeong, Syed Wajid Ali Shah, Mohammad Reza Nosouhi, Robin Doss:
Examining usable security features and user perceptions of Physical Authentication Devices. Comput. Secur. 139: 103664 (2024) - [j67]Mingcan Cen, Xizhen Deng, Frank Jiang, Robin Doss:
Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning. Comput. Secur. 142: 103849 (2024) - [j66]Mohamed Ahzam Amanullah, Seng W. Loke, Mohan Baruwal Chhetri, Robin Doss:
A Taxonomy and Analysis of Misbehaviour Detection in Cooperative Intelligent Transport Systems: A Systematic Review. ACM Comput. Surv. 56(1): 3:1-3:38 (2024) - [j65]Yang Cao, Shiva Raj Pokhrel, Ye Zhu, Robin Doss, Gang Li:
Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges. Mach. Intell. Res. 21(2): 294-317 (2024) - [j64]Jongkil Jay Jeong, Syed Wajid Ali Shah, Ashish Nanda, Robin Doss, Mohammad Reza Nosouhi, Jeb Webb:
User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices. IEEE Trans. Hum. Mach. Syst. 54(5): 554-564 (2024) - [j63]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
A Secure Federated Learning Framework for Residential Short-Term Load Forecasting. IEEE Trans. Smart Grid 15(2): 2044-2055 (2024) - [j62]Sheraz Mazhar, Abdur Rakib, Lei Pan, Frank Jiang, Adnan Anwar, Robin Doss, Jeremy W. Bryans:
State-of-the-art authentication and verification schemes in VANETs: A survey. Veh. Commun. 49: 100804 (2024) - [c92]Mohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Divyans Mahansaria, Debi Prasad Pati, Praveen Gauravaram, Lei Pan, Keshav Sood:
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments. ARES 2024: 145:1-145:11 - [c91]Anuj Nepal, Mohamed Ahzam Amanullah, Robin Doss, Frank Jiang:
Secure Data Provenance in Internet of Vehicles with Data Plausibility for Security and Trust. AIIoT 2024: 612-618 - [c90]Jongkil Jay Jeong, Lu-Xing Yang, Robin Doss, Praveen Gauravaram, Zoe Wang, Mohamed Abdelrazek, Ashish Nanda, Keerthivasan Viswanathan:
POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets. AsiaCCS 2024 - [c89]Mohamed Ahzam Amanullah, Mohan Baruwal Chhetri, Seng W. Loke, Robin Doss:
IntelliMD: A Hybrid Approach for Local Misbehaviour Detection in Cooperative Intelligent Transport Systems. CPSIOTSEC@CCS 2024: 2-13 - [c88]Sai Gautam Mandapati, Chathurika Ranaweera, Robin Doss:
Advancing NDN Security for IoT: Harnessing Machine Learning to Detect Attacks. DSN-S 2024: 53-55 - [c87]Manu Jo Varghese, Adnan Anwar, Frank Jiang, Robin Doss:
Novel CAN Bus Fuzzing Framework for Finding Vulnerabilities in Automotive Systems. DSN-S 2024: 56-58 - [c86]Anuj Nepal, Robin Doss, Frank Jiang:
Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy. DSN-S 2024: 59-61 - [c85]Fuyi Wang, Jinzhi Ouyang, Lei Pan, Leo Yu Zhang, Xiaoning Liu, Yanping Wang, Robin Doss:
TrustMIS: Trust-Enhanced Inference Framework for Medical Image Segmentation. ECAI 2024: 105-112 - [c84]Ronald Svondo Nyathi, Sophie McKenzie, Jack Li, Radhika Gorur, Robin Ram Mohan Doss:
User perceptions of algorithmic persuasion in OTT platforms: A scoping review. ISTAS 2024: 1-7 - [c83]Maxim Chernyshev, Zubair A. Baig, Robin Ram Mohan Doss:
Towards Large Language Model (LLM) Forensics Using LLM-based Invocation Log Analysis. LAMPS@CCS 2024: 89-96 - [c82]Sai Gautam Mandapati, Chathurika Ranaweera, Robin Doss:
Data-Driven Scalable Mechanisms and Architectures for Secure IoT Connectivity. PerCom Workshops 2024: 253-254 - [c81]Manu Jo Varghese, Frank Jiang, Robin Doss, Adnan Anwar, Abdur Rakib:
DEMO: Adaptive Fuzz Testing for Automotive ECUs: A Modular Testbed Approach for Enhanced Vulnerability Detection. SIGCOMM (Posters and Demos) 2024: 110-112 - 2023
- [j61]Mohammad Reza Nosouhi, Syed Wajid Ali Shah, Lei Pan, Robin Doss:
Bit Flipping Key Encapsulation for the Post-Quantum Era. IEEE Access 11: 56181-56195 (2023) - [j60]Xingsheng Qin, Frank Jiang, Mingcan Cen, Robin Doss:
Hybrid cyber defense strategies using Honey-X: A survey. Comput. Networks 230: 109776 (2023) - [j59]Jongkil Jay Jeong, Yevhen Zolotavkin, Robin Doss:
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis. ACM Comput. Surv. 55(6): 122:1-122:31 (2023) - [j58]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
False data injection threats in active distribution systems: A comprehensive survey. Future Gener. Comput. Syst. 140: 344-364 (2023) - [j57]Keshav Sood, Mohammad Reza Nosouhi, Dinh Duc Nha Nguyen, Frank Jiang, Morshed Chowdhury, Robin Doss:
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks. IEEE Trans. Inf. Forensics Secur. 18: 965-979 (2023) - [j56]Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss:
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism. IEEE Trans. Inf. Forensics Secur. 18: 2160-2174 (2023) - [j55]Keshav Sood, Dinh Duc Nha Nguyen, Mohammad Reza Nosouhi, Neeraj Kumar, Frank Jiang, Morshed Chowdhury, Robin Doss:
Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks. IEEE Trans. Netw. Serv. Manag. 20(3): 3831-3847 (2023) - [c80]Fuyi Wang, Yanping Wang, Leo Yu Zhang, Yuval Hertzog, Michael Loewy, Dominique Valladolid, Julio Medeiros, Muna Al-Hawawreh, Robin Doss:
WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM. ACNS Workshops 2023: 336-354 - [c79]Muhammad Akbar Husnoo, Adnan Anwar, Robin Doss, Nasser Hosseinzadeh:
Towards Robust Misbehavior Detection in Power Control Systems: A Gradient Quantization Approach. ARTMAN@CCS 2023: 29-36 - [c78]Syed Wajid Ali Shah, Mohammad Reza Nosouhi, Lei Pan, Robin Doss:
SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems. APKC@AsiaCCS 2023: 2-9 - [c77]Fokke Heikamp, Lei Pan, Robin Doss, Rolando Trujillo-Rasua, Sushmita Ruj:
ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness. BSCI 2023: 1-10 - [c76]Cynthia Yi Min Chee, Shantanu Pal, Lei Pan, Robin Doss:
An Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools. BSCI 2023: 105-113 - [c75]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Robin Doss, Biplab Sikdar:
Misbehaviour Detection for Smart Grids using a Privacy-centric and Computationally Efficient Federated Learning Approach. GLOBECOM 2023: 2269-2274 - [c74]Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination. INFOCOM Workshops 2023: 1-6 - [c73]Muna Al-Hawawreh, Robin Doss:
Enhancing Security in Industrial IoT: A Taxonomy-driven Approach to Risk Assessment. TrustCom 2023: 434-443 - [c72]Anuj Nepal, Robin Doss, Frank Jiang:
Secure Data Provenance for Internet of Vehicles with Verifiable Credentials. UEMCON 2023: 210-218 - [i14]Baobao Song, Mengyue Deng, Shiva Raj Pokhrel, Qiujun Lan, Robin Doss, Gang Li:
Digital Privacy Under Attack: Challenges and Enablers. CoRR abs/2302.09258 (2023) - [i13]Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination. CoRR abs/2303.16956 (2023) - [i12]Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination. CoRR abs/2304.03640 (2023) - 2022
- [j54]Naeem Firdous Syed, Syed W. Shah, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
Zero Trust Architecture (ZTA): A Comprehensive Survey. IEEE Access 10: 57143-57179 (2022) - [j53]Naeem Firdous Syed, Syed W. Shah, Rolando Trujillo-Rasua, Robin Doss:
Traceability in supply chains: A Cyber security analysis. Comput. Secur. 112: 102536 (2022) - [j52]Tan Duy Le, Mengmeng Ge, Adnan Anwar, Seng W. Loke, Razvan Beuran, Robin Doss, Yasuo Tan:
GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids. Sensors 22(13): 4795 (2022) - [j51]Mohammad Reza Nosouhi, Keshav Sood, Marthie Grobler, Robin Doss:
Towards Spoofing Resistant Next Generation IoT Networks. IEEE Trans. Inf. Forensics Secur. 17: 1669-1683 (2022) - [j50]Yevhen Zolotavkin, Jongkil Jay Jeong, Veronika Kuchta, Maksym Slavnenko, Robin Doss:
Improving Unlinkability of Attribute-based Authentication through Game Theory. ACM Trans. Priv. Secur. 25(2): 12:1-12:36 (2022) - [c71]Venkata Abhishek Kanthuru, Sutharshan Rajasegarar, Punit Rathore, Robin Ram Mohan Doss, Lei Pan, Biplob Ray, Morshed Chowdhury, Chandrasekaran Srimathi, M. A. Saleem Durai:
Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis. ADMA (1) 2022: 118-130 - [c70]Jia Liang, Di Xiao, Yong Xiang, Robin Doss:
A Compressed Sensing Based Image Compression-Encryption Coding Scheme without Auxiliary Information Transmission. ICC 2022: 5573-5578 - [c69]Bilal Hussain Abbasi, Qi Zhong, Leo Yu Zhang, Shang Gao, Antonio Robles-Kelly, Robin Doss:
A Generic Enhancer for Backdoor Attacks on Deep Neural Networks. ICONIP (7) 2022: 296-307 - [c68]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. ISCC 2022: 1-6 - [c67]Xiaoliang Wang, Frank Jiang, Robin Doss:
The First International Workshop on Cryptographic Security and Information Hiding Technology for IoT System (CSIHTIS 2022): Preface. MSN 2022: 1 - [c66]Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu, Leo Yu Zhang, Robin Doss:
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks. NSS 2022: 406-425 - [c65]Fokke Heikamp, Lei Pan, Rolando Trujillo-Rasua, Sushmita Ruj, Robin Doss:
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. NSS 2022: 514-523 - [c64]Mohamed Ahzam Amanullah, Mohan Baruwal Chhetri, Seng W. Loke, Robin Doss:
BurST-ADMA: Towards an Australian Dataset for Misbehaviour Detection in the Internet of Vehicles. PerCom Workshops 2022: 624-629 - [c63]Yangxu Song, Frank Jiang, Syed Wajid Ali Shah, Robin Doss:
A New Zero-Trust Aided Smart Key Authentication Scheme in IoV. PerCom Workshops 2022: 630-636 - [c62]Chaochen Shi, Yong Xiang, Jiangshan Yu, Longxiang Gao, Keshav Sood, Robin Ram Mohan Doss:
A Bytecode-based Approach for Smart Contract Classification. SANER 2022: 1046-1054 - [i11]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
FedREP: Towards Horizontal Federated Load Forecasting for Retail Energy Providers. CoRR abs/2203.00219 (2022) - [i10]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. CoRR abs/2204.10958 (2022) - [i9]Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss:
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism. CoRR abs/2204.13885 (2022) - [i8]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
A Secure Federated Learning Framework for Residential Short Term Load Forecasting. CoRR abs/2209.14547 (2022) - 2021
- [j49]Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, Mike Ryan:
Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey. IEEE Access 9: 153276-153304 (2021) - [j48]Ben Stephens, Arash Shaghaghi, Robin Doss, Salil S. Kanhere:
Detecting Internet of Things Bots: A Comparative Study. IEEE Access 9: 160391-160401 (2021) - [j47]Lina Deng, Xiaoliang Wang, Frank Jiang, Robin Doss:
EEG-based emotion recognition via capsule network with channel-wise attention and LSTM models. CCF Trans. Pervasive Comput. Interact. 3(4): 425-435 (2021) - [j46]Samaneh Rashidibajgan, Thomas Hupperich, Robin Doss, Anna Förster:
Secure and privacy-preserving structure in opportunistic networks. Comput. Secur. 104: 102208 (2021) - [j45]Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA). Comput. Secur. 108: 102351 (2021) - [j44]Ravneet Kaur, Ramkumar Ketti Ramachandran, Robin Doss, Lei Pan:
The importance of selecting clustering parameters in VANETs: A survey. Comput. Sci. Rev. 40: 100392 (2021) - [j43]Xiangyu Song, Jianxin Li, ShiJie Sun, Hui Yin, Phillip Dawson, Robin Ram Mohan Doss:
SEPN: A Sequential Engagement Based Academic Performance Prediction Model. IEEE Intell. Syst. 36(1): 46-53 (2021) - [j42]Shiva Raj Pokhrel, Lei Pan, Neeraj Kumar, Robin Doss, Hai Le Vu:
Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT. IEEE Internet Things J. 8(13): 10299-10307 (2021) - [j41]Purathani Praitheeshan, Lei Pan, Xi Zheng, Alireza Jolfaei, Robin Doss:
SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems. Inf. Sci. 579: 150-166 (2021) - [j40]Ghaith Khalil, Robin Doss, Morshed U. Chowdhury:
An Extended Reselling Protocol for Existing Anti-Counterfeiting Schemes. J. Sens. Actuator Networks 10(1): 12 (2021) - [j39]Manjunath Hegde, Adnan Anwar, A. Kotegar Karunakar, Zubair A. Baig, Robin Doss:
A novel multi-stage distributed authentication scheme for smart meter communication. PeerJ Comput. Sci. 7: e643 (2021) - [j38]Purathani Praitheeshan, Lei Pan, Robin Doss:
Private and Trustworthy Distributed Lending Model Using Hyperledger Besu. SN Comput. Sci. 2(2): 115 (2021) - [j37]Tarandeep Kaur Bhatia, Ramkumar Ketti Ramachandran, Robin Doss, Lei Pan:
Data congestion in VANETs: research directions and new trends through a bibliometric analysis. J. Supercomput. 77(7): 6586-6628 (2021) - [c61]Rajiv Faleiro, Lei Pan, Shiva Raj Pokhrel, Robin Doss:
Digital Twin for Cybersecurity: Towards Enhancing Cyber Resilience. BROADNETS 2021: 57-76 - [c60]Tarandeep Kaur Bhatia, Ramkumar Ketti Ramachandran, Robin Doss, Lei Pan:
Detecting and Controlling the Occurrence of Data Congestion in a High-density VANETs Environment. FRUCT 2021: 42-48 - [c59]Iram Jawad, Jawad Ahmed, Imran Razzak, Robin Doss:
Identifying DNS Exfiltration based on Lexical Attributes of Query Name. IJCNN 2021: 1-7 - [c58]Saheed A. Tijani, Xingjun Ma, Ran Zhang, Frank Jiang, Robin Doss:
Federated Learning with Extreme Label Skew: A Data Extension Approach. IJCNN 2021: 1-8 - [c57]Xichen Tang, Jinlong Wang, Ye Zhu, Robin Doss, Xin Han:
Systematic evaluation of abnormal detection methods on gas well sensor data. ISCC 2021: 1-6 - [c56]Nikesh Lalchandani, Frank Jiang, Jongkil Jay Jeong, Yevhen Zolotavkin, Robin Doss:
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials. PST 2021: 1-7 - [c55]Maksym Slavnenko, Yevhen Zolotavkin, Jongkil Jay Jeong, Veronika Kuchta, Robin Doss:
Enhancing Privacy Through DMMA: Decision-Making Method for Authentication. TrustCom 2021: 297-308 - [i7]Chaochen Shi, Yong Xiang, Robin Ram Mohan Doss, Jiangshan Yu, Keshav Sood, Longxiang Gao:
A Bytecode-based Approach for Smart Contract Classification. CoRR abs/2106.15497 (2021) - [i6]Agustinus Andriyanto, Robin Doss, Suhardi:
X-Driven Methodologies for SOA System Development - A Survey. CoRR abs/2109.01805 (2021) - [i5]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
False Data Injection Threats in Active Distribution Systems: A Comprehensive Survey. CoRR abs/2111.14251 (2021) - 2020
- [j36]Pengjie Zeng, Xiaoliang Wang, Hao Li, Frank Jiang, Robin Doss:
A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology. IEEE Access 8: 33644-33657 (2020) - [j35]Ghaith Khalil, Robin Doss, Morshed U. Chowdhury:
A Novel RFID-Based Anti-Counterfeiting Scheme for Retail Environments. IEEE Access 8: 47952-47962 (2020) - [j34]Syed Wajid Ali Shah, Arash Shaghaghi, Salil S. Kanhere, Jin Zhang, Adnan Anwar, Robin Doss:
Echo-ID: Smart User Identification Leveraging Inaudible Sound Signals. IEEE Access 8: 194508-194522 (2020) - [j33]Miraj Asghar, Lei Pan, Robin Doss:
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks. Digit. Commun. Networks 6(4): 422-432 (2020) - [j32]Robin Doss, Rolando Trujillo-Rasua, Selwyn Piramuthu:
Secure attribute-based search in RFID-based inventory control systems. Decis. Support Syst. 132: 113270 (2020) - [j31]Ghaith Khalil, Robin Doss, Morshed U. Chowdhury:
A New Secure RFID Anti-Counterfeiting and Anti-Theft Scheme for Merchandise. J. Sens. Actuator Networks 9(1): 16 (2020) - [c54]Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil S. Kanhere:
Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs. NCA 2020: 1-10 - [c53]Purathani Praitheeshan, Lei Pan, Robin Doss:
Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets. NSS 2020: 22-41 - [c52]Matthew J. Ryan, Morshed U. Chowdhury, Frank Jiang, Robin Doss:
Avoiding Geographic Regions in Tor. TrustCom 2020: 802-809 - [c51]Rohan Dahiya, Frank Jiang, Robin Doss:
A Feedback-Driven Lightweight Reputation Scheme for IoV. TrustCom 2020: 1060-1068 - [c50]Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication. TrustCom 2020: 1119-1126 - [c49]Samaneh Rashidibajgan, Thomas Hupperich, Robin Doss, Lei Pan:
Opportunistic Tracking in Cyber-Physical Systems. TrustCom 2020: 1672-1679 - [c48]Madhur Dixit, C. Srimathi, Robin Doss, Seng W. Loke, M. A. Saleemdurai:
Smart Parking with Computer Vision and IoT Technology. TSP 2020: 170-174 - [i4]Agustinus Andriyanto, Robin Doss:
Problems and Solutions of Service Architecture in Small and Medium Enterprise Communities. CoRR abs/2004.10660 (2020) - [i3]Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication. CoRR abs/2010.05144 (2020) - [i2]Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil S. Kanhere:
Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs. CoRR abs/2010.12134 (2020)
2010 – 2019
- 2019
- [j30]Xiaoliang Wang, Pengjie Zeng, Nicholas Charles Patterson, Frank Jiang, Robin Doss:
An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology. IEEE Access 7: 45061-45072 (2019) - [j29]Shiju Sathyadevan, Krishnashree Achuthan, Robin Doss, Lei Pan:
Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments. IEEE Access 7: 92419-92435 (2019) - [j28]Samaneh Rashidibajgan, Robin Doss:
Privacy-preserving history-based routing in Opportunistic Networks. Comput. Secur. 84: 244-255 (2019) - [j27]Ghaith Khalil, Robin Doss, Morshed U. Chowdhury:
A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems. J. Sens. Actuator Networks 8(3): 37 (2019) - [c47]Waqas Ahmad Piracha, Morshed U. Chowdhury, Biplob Ray, Sutharshan Rajasegarar, Robin Doss:
Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands. ATIS 2019: 77-91 - [c46]Ayoob Ayoob, Ghaith Khalil, Morshed U. Chowdhury, Robin Doss:
Intrusion Detection System Classifier for VANET Based on Pre-processing Feature Extraction. FNSS 2019: 3-22 - [c45]Liming Jiang, Yan Wang, Jiajun Tian, Frank Jiang, Nicholas Charles Patterson, Robin Doss:
An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks. FNSS 2019: 52-64 - [c44]Purathani Praitheeshan, Yi Wei Xin, Lei Pan, Robin Doss:
Attainable Hacks on Keystore Files in Ethereum Wallets - A Systematic Analysis. FNSS 2019: 99-117 - [c43]Fei Gao, Frank Jiang, Yuping Zhang, Robin Doss:
Quorum Chain-Based Malware Detection in Android Smart Devices. FNSS 2019: 212-224 - [c42]Morshed U. Chowdhury, Robin Doss, Biplob Ray, Sutharshan Rajasegarar, Sujan Chowdhury:
IoT Insider Attack - Survey. SGIoT 2019: 28-41 - [e6]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27-29, 2019, Proceedings. Communications in Computer and Information Science 1113, Springer 2019, ISBN 978-3-030-34352-1 [contents] - [i1]Purathani Praitheeshan, Lei Pan, Jiangshan Yu, Joseph K. Liu, Robin Doss:
Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey. CoRR abs/1908.08605 (2019) - 2018
- [j26]Haiying Xia, Frank Jiang, Shuaifei Deng, Jing Xin, Robin Doss:
Mapping Functions Driven Robust Retinal Vessel Segmentation via Training Patches. IEEE Access 6: 61973-61982 (2018) - [j25]Asma'a Ahmad, Robin Doss, Majeed Alajeely, Sarab F. Al Rubeaai, Dua'a Ahmad:
Packet integrity defense mechanism in OppNets. Comput. Secur. 74: 71-93 (2018) - [j24]Asma'a Ahmad, Robin Doss, Majeed Alajeely, Sarab F. Al Rubeaai:
Trust strategy implementation in OppNets. Computing 100(2): 151-181 (2018) - [j23]Menik Tissera, Robin Doss, Gang Li, Vicky H. Mak-Hau, Lynn Batten:
A Novel Approach for Information Discovery in Wireless Sensor Grids. J. Netw. Syst. Manag. 26(3): 640-662 (2018) - [j22]Md. Shamsul Huda, Md. Suruz Miah, John Yearwood, Sultan Alyahya, Hmood Al-Dossari, Robin Doss:
A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network. J. Parallel Distributed Comput. 120: 23-31 (2018) - [c41]Ahmed Falah, Lei Pan, Mohamed Abdelrazek, Robin Doss:
Identifying Drawbacks in Malicious PDF Detectors. FNSS 2018: 128-139 - [c40]Samaneh Rashidibajgan, Robin Doss:
A New Method for Sharing the Public Keys in Opportunistic Networks. FNSS 2018: 147-161 - [c39]Miraj Asghar, Robin Ram Mohan Doss, Lei Pan:
A Scalable and Efficient PKI Based Authentication Protocol for VANETs. ITNAC 2018: 1-3 - [e5]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - 4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018, Proceedings. Communications in Computer and Information Science 878, Springer 2018, ISBN 978-3-319-94420-3 [contents] - 2017
- [j21]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
A secure search protocol for low cost passive RFID tags. Comput. Networks 122: 70-82 (2017) - [j20]Majeed Alajeely, Robin Doss, Asma'a Ahmad, Vicky H. Mak-Hau:
Defense against packet collusion attacks in opportunistic networks. Comput. Secur. 65: 269-282 (2017) - [j19]Selwyn Piramuthu, Robin Doss:
On sensor-based solutions for simultaneous presence of multiple RFID tags. Decis. Support Syst. 95: 102-109 (2017) - [j18]Sabu M. Thampi, Jaime Lloret Mauri, Robin Doss:
Special issue on Underwater Acoustic Sensor Networks: Emerging trends and current perspectives. J. Netw. Comput. Appl. 92: 1-2 (2017) - [j17]Xiuqing Chen, Tianjie Cao, Robin Doss, Jingxuan Zhai:
Attacks on and Countermeasures for Two RFID Protocols. Wirel. Pers. Commun. 96(4): 5825-5848 (2017) - [c38]Asma'a Ahmad, Robin Doss, Majeed Alajeely, Khlood Ahmad:
Securing OppNets from Packet Integrity Attacks Using Trust and Reputation. AINA Workshops 2017: 7-12 - [c37]Gaith K. D. Al., Robin Doss, Morshed U. Chowdhury:
Adjusting Matryoshka Protocol to Address the Scalability Issue in IoT Environment. FNSS 2017: 84-94 - [c36]Shiju Sathyadevan, V. Vejesh, Robin Doss, Lei Pan:
Portguard - an authentication tool for securing ports in an IoT gateway. PerCom Workshops 2017: 624-629 - [e4]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings. Communications in Computer and Information Science 759, Springer 2017, ISBN 978-3-319-65547-5 [contents] - 2016
- [j16]Tianjie Cao, Xiuqing Chen, Robin Doss, Jingxuan Zhai, Lucas J. Wise, Qiang Zhao:
RFID ownership transfer protocol based on cloud. Comput. Networks 105: 47-59 (2016) - [j15]Faizal Riaz-ud-Din, Wanlei Zhou, Robin Doss:
Query verification schemes for cloud-hosted databases: a brief survey. Int. J. Parallel Emergent Distributed Syst. 31(6): 543-561 (2016) - [c35]Asma'a Ahmad, Majeed Alajeely, Robin Doss:
Establishing trust relationships in OppNets using Merkle trees. COMSNETS 2016: 1-6 - [c34]Gaith K. D. Al., Robin Doss, Morshed U. Chowdhury, Biplob R. Ray:
Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept. FNSS 2016: 126-141 - [c33]Faizal Riaz-ud-Din, Robin Doss, Wanlei Zhou:
String matching query verification on cloud-hosted databases. ICDCN 2016: 17:1-17:10 - [e3]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings. Communications in Computer and Information Science 670, 2016, ISBN 978-3-319-48020-6 [contents] - [e2]Peter Müller, Sabu M. Thampi, Md. Zakirul Alam Bhuiyan, Ryan Kok Leong Ko, Robin Doss, José M. Alcaraz Calero:
Security in Computing and Communications - 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings. Communications in Computer and Information Science 625, Springer 2016, ISBN 978-981-10-2737-6 [contents] - 2015
- [j14]Saravanan Sundaresan, Robin Doss, Wanlei Zhou, Selwyn Piramuthu:
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy. Comput. Commun. 55: 112-124 (2015) - [j13]Majeed Alajeely, Robin Doss, Asma'a Ahmad, Vicky H. Mak-Hau:
Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks. Comput. Commun. 71: 111-118 (2015) - [j12]Saravanan Sundaresan, Robin Doss, Wanlei Zhou:
Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags. IEEE Trans. Computers 64(10): 2994-3008 (2015) - [j11]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
Secure Tag Search in RFID Systems Using Mobile Readers. IEEE Trans. Dependable Secur. Comput. 12(2): 230-242 (2015) - [c32]Majeed Alajeely, Asma'a Ahmad, Robin Doss:
Malicious Node Traceback in Opportunistic Networks Using Merkle Trees. DSDIS 2015: 147-152 - [c31]Menik Tissera, Robin Doss, Gang Li, Lynn Margaret Batten:
Novel Approach for Information Discovery in Autonomous Wireless Sensor Networks. FNSS 2015: 47-60 - [c30]Majeed Alajeely, Asma'a Ahmad, Robin Doss, Vicky H. Mak-Hau:
An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks. FNSS 2015: 84-100 - [c29]Menik Tissera, Robin Doss, Gang Li, Lynn Batten:
Fast and energy efficient data storage for information discovery in multi-dimensional WSNs. ITNAC 2015: 88-93 - [e1]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings. Communications in Computer and Information Science 523, Springer 2015, ISBN 978-3-319-19209-3 [contents] - 2014
- [j10]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags. IEEE Trans. Inf. Forensics Secur. 9(6): 961-975 (2014) - [c28]Majeed Alajeely, Asma'a Ahmad, Robin Doss, Vicky H. Mak-Hau:
Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNets. CIS 2014: 638-642 - [c27]Saravanan Sundaresan, Robin Doss:
Secure yoking proof protocol for RFID systems. ICACCI 2014: 1585-1591 - [c26]Asma'a Ahmad, Majeed Alajeely, Robin Doss:
Defense against packet dropping attacks in opportunistic networks. ICACCI 2014: 1608-1613 - 2013
- [j9]Robin Doss, Saravanan Sundaresan, Wanlei Zhou:
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks 11(1): 383-396 (2013) - [j8]Robin Doss, Wanlei Zhou, Shui Yu:
Secure RFID Tag Ownership Transfer Based on Quadratic Residues. IEEE Trans. Inf. Forensics Secur. 8(2): 390-401 (2013) - [c25]Saravanan Sundaresan, Robin Doss, Wanlei Zhou:
Secure ownership transfer in multi-tag/multi-owner passive RFID systems. GLOBECOM 2013: 2891-2896 - [c24]Shui Yu, Robin Doss, Wanlei Zhou, Song Guo:
A general cloud firewall framework with dynamic resource allocation. ICC 2013: 1941-1945 - [c23]Menik Tissera, Robin Doss, Gang Li, Lynn Margaret Batten:
Information discovery in multidimensional wireless sensor networks. ICOIN 2013: 54-59 - [c22]Menik Tissera, Robin Doss, Gang Li, Lynn Batten:
An adaptive approach to information discovery in multi-dimensional wireless sensor networks. ICST 2013: 203-208 - [c21]Majeed Alajeely, Asma'a Ahmad, Robin Doss:
Comparative study of routing protocols for opportunistic networks. ICST 2013: 209-214 - [c20]Saravanan Sundaresan, Robin Doss, Wanlei Zhou:
RFID tags - Grouping proof with forward security. RFID-TA 2013: 1-6 - [c19]Saravanan Sundaresan, Robin Doss, Wanlei Zhou:
Offline grouping proof protocol for RFID systems. WiMob 2013: 247-252 - 2012
- [j7]Robin Doss, Wanlei Zhou, Saravanan Sundaresan, Shui Yu, Longxiang Gao:
A minimum disclosure approach to authentication and privacy in RFID systems. Comput. Networks 56(15): 3401-3416 (2012) - [c18]Saravanan Sundaresan, Robin Doss, Wanlei Zhou:
A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags. PIMRC 2012: 30-35 - [c17]Robin Doss, Wanlei Zhou:
A secure tag ownership transfer scheme in a closed loop RFID system. WCNC Workshops 2012: 164-169 - 2011
- [j6]Shui Yu, Wanlei Zhou, Robin Doss, Weijia Jia:
Traceback of DDoS Attacks Using Entropy Variations. IEEE Trans. Parallel Distributed Syst. 22(3): 412-425 (2011) - [c16]Lynn Margaret Batten, Jemal H. Abawajy, Robin Doss:
Prevention of Information Harvesting in a Cloud Services Environment. CLOSER 2011: 66-72 - 2010
- [j5]Robin Doss, Gang Li, Vicky Mak, Menik Tissera:
Information discovery in mission-critical wireless sensor networks. Comput. Networks 54(14): 2383-2399 (2010) - [j4]Robin Chellappa Doss, Deddy Chandra, Lei Pan, Wanlei Zhou, Morshed U. Chowdhury:
Dynamic Addressing in Wireless Sensor Networks without Location Awareness. J. Inf. Sci. Eng. 26(2): 443-460 (2010) - [c15]Bai Li, Lynn Margaret Batten, Robin Doss:
Network Resilience in Low-Resource Mobile Wireless Sensor Networks. MobiSec 2010: 127-138
2000 – 2009
- 2009
- [j3]Robin Doss, Gang Li, Vicky Mak, Shui Yu, Morshed U. Chowdhury:
Improving the QoS for information discovery in autonomic wireless sensor networks. Pervasive Mob. Comput. 5(4): 334-349 (2009) - [c14]Bai Li, Lynn Margaret Batten, Robin Doss:
Lightweight Authentication for Recovery in Wireless Sensor Networks. MSN 2009: 465-471 - [c13]Bai Li, Robin Doss, Lynn Margaret Batten, Wolfgang Schott:
Fast Recovery from Node Compromise in Wireless Sensor Networks. NTMS 2009: 1-6 - [p2]Robin Doss, Wolfgang Schott:
Cooperative Relaying in Wireless Sensor Networks. Guide to Wireless Sensor Networks 2009: 159-181 - [p1]Gang Li, Robin Doss:
Energy-Efficient Medium Access Control in Wireless Sensor Networks. Guide to Wireless Sensor Networks 2009: 419-438 - 2008
- [j2]Shui Yu, Wanlei Zhou, Robin Doss:
Information theory based detection against network behavior mimicking DDoS attacks. IEEE Commun. Lett. 12(4): 318-321 (2008) - [c12]Robin Doss, Gang Li:
Exploiting Affinity Propagation for Energy-Efficient Information Discovery in Sensor Networks. GLOBECOM 2008: 735-740 - [c11]Shui Yu, Robin Doss, Theerasak Thapngam, David Qian:
A Transformation Model for Heterogeneous Servers. HPCC 2008: 665-671 - [c10]Robin Doss, Gang Li, Shui Yu, Vicky Mak, Morshed U. Chowdhury:
The Crossroads Approach to Information Discovery in Wireless Sensor Networks. ICDCN 2008: 310-321 - 2007
- [c9]Atef Z. Ghalwash, Aliaa A. A. Youssif, Sherif M. Hashad, Robin Doss:
Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs). ACIS-ICIS 2007: 682-687 - [c8]Pedro Coronel, Robin Doss, Wolfgang Schott:
Location-Based Cooperative Relaying in Wireless Sensor Networks. COMSWARE 2007 - [c7]Pedro Coronel, Robin Doss, Wolfgang Schott:
Geographic Routing with Cooperative Relaying and Leapfrogging in Wireless Sensor Networks. GLOBECOM 2007: 646-651 - 2006
- [j1]R. Chellappa Doss, Andrew Jennings, Nirmala Shenoy:
Prediction based location aided routing for mobile ad hoc networks. Int. J. Pervasive Comput. Commun. 2(2): 91-102 (2006) - [c6]Robin Chellappa Doss, Deddy Chandra, Lei Pan, Wanlei Zhou, Morshed U. Chowdhury:
Lease Based Addressing for Event-Driven Wireless Sensor Networks. ISCC 2006: 251-256 - 2005
- [c5]B. Hansolt Sathyaraj, Robin Chellappa Doss:
Route maintenance using mobility prediction for mobile ad hoc networks. MASS 2005 - [c4]R. Chellappa Doss, D. Chandra:
Reliable Event Transfer in Wireless Sensor Networks Deployed for Emergency Response. IASTED PDCS 2005: 208-213 - 2004
- [c3]R. Chellappa Doss, Andrew Jennings, Nirmala Shenoy:
Mobility Prediction Based Routing for Minimizing Control Overhead in Mobile Ad Hoc Networks. International Conference on Wireless Networks 2004: 27-31 - 2003
- [c2]Robin Chellappa Doss, Andrew Jennings, Nirmala Shenoy:
A comparative study of mobility prediction in fixed wireless networks and mobile ad hoc networks. ICC 2003: 891-895 - [c1]Robin Chellappa Doss, Andrew Jennings, Nirmala Shenoy:
Route discovery and reconstruction in mobile ad hoe networks. ICON 2003: 549-554
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint