Follow
Robin Doss
Robin Doss
Deakin Cyber Research & Innovation Centre (Deakin Cyber), Deakin University
Verified email at deakin.edu.au
Title
Cited by
Cited by
Year
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010
2672010
Security analysis methods on ethereum smart contract vulnerabilities: a survey
P Praitheeshan, L Pan, J Yu, J Liu, R Doss
arXiv preprint arXiv:1908.08605, 2019
1872019
Information theory based detection against network behavior mimicking DDoS attacks
S Yu, W Zhou, R Doss
IEEE Communications Letters 12 (4), 318-321, 2008
1252008
An improved authentication scheme for internet of vehicles based on blockchain technology
X Wang, P Zeng, N Patterson, F Jiang, R Doss
IEEE access 7, 45061-45072, 2019
1232019
Zero trust architecture (zta): A comprehensive survey
NF Syed, SW Shah, A Shaghaghi, A Anwar, Z Baig, R Doss
IEEE access 10, 57143-57179, 2022
1012022
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
R Doss, S Sundaresan, W Zhou
Ad Hoc Networks 11 (1), 383-396, 2013
932013
Secure RFID tag ownership transfer based on quadratic residues
R Doss, W Zhou, S Yu
IEEE Transactions on Information Forensics and Security 8 (2), 390-401, 2012
702012
A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network
S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss
Journal of Parallel and Distributed Computing 120, 23-31, 2018
632018
Protean authentication scheme–a time-bound dynamic keygen authentication technique for iot edge nodes in outdoor deployments
S Sathyadevan, K Achuthan, R Doss, L Pan
IEEE access 7, 92419-92435, 2019
552019
Secure tag search in RFID systems using mobile readers
S Sundaresan, R Doss, S Piramuthu, W Zhou
IEEE Transactions on Dependable and Secure Computing 12 (2), 230-242, 2014
552014
The importance of selecting clustering parameters in VANETs: A survey
R Kaur, RK Ramachandran, R Doss, L Pan
Computer Science Review 40, 100392, 2021
542021
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy
S Sundaresan, R Doss, W Zhou, S Piramuthu
Computer Communications 55, 112-124, 2015
532015
A scalable and efficient PKI based authentication protocol for VANETs
M Asghar, RRM Doss, L Pan
2018 28th International Telecommunication Networks and Applications …, 2018
522018
Differential privacy for IoT-enabled critical infrastructure: A comprehensive survey
MA Husnoo, A Anwar, RK Chakrabortty, R Doss, MJ Ryan
IEEE Access 9, 153276-153304, 2021
502021
Routing protocols in opportunistic networks–a survey
M Alajeely, R Doss, A Ahmad
IETE Technical Review 35 (4), 369-387, 2018
502018
SEPN: a sequential engagement based academic performance prediction model
X Song, J Li, S Sun, H Yin, P Dawson, RRM Doss
IEEE Intelligent Systems 36 (1), 46-53, 2020
482020
A comparative study of mobility prediction in fixed wireless networks and mobile ad hoc networks
R Chellapa, A Jennings, N Shenoy
IEEE International Conference on Communications, 2003. ICC'03. 2, 891-895, 2003
442003
A minimum disclosure approach to authentication and privacy in RFID systems
R Doss, W Zhou, S Sundaresan, S Yu, L Gao
Computer Networks 56 (15), 3401-3416, 2012
432012
Traceability in supply chains: A Cyber security analysis
NF Syed, SW Shah, R Trujillo-Rasua, R Doss
Computers & Security 112, 102536, 2022
412022
LCDA: lightweight continuous device-to-device authentication for a zero trust architecture (ZTA)
SW Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
Computers & Security 108, 102351, 2021
402021
The system can't perform the operation now. Try again later.
Articles 1–20