Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2107.01678
Cited By
A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement
4 July 2021
Md Morshed Alam
Weichao Wang
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement"
4 / 4 papers shown
Title
RESTRAIN: Reinforcement Learning-Based Secure Framework for Trigger-Action IoT Environment
Md Morshed Alam
Lokesh Chandra Das
Sandip Roy
Sachin Shetty
Weichao Wang
AAML
OffRL
163
0
0
12 Mar 2025
Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review
Omair Faraj
David Megías
Joaquin Garcia-Alfaro
27
0
0
03 Jul 2024
IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks
Md Morshed Alam
Israt Jahan
Charlotte
AAML
108
2
0
16 Jan 2024
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms
Md Morshed Alam
Md Sajidul Islam Sajid
Weichao Wang
Jinpeng Wei
35
6
0
09 Feb 2022
1