Name
Affiliation
Papers
MUHAMMAD AMAN
Department of ECSE, Rensselaer Polytechnic Institute, Troy, NY
36
Collaborators
Citations 
PageRank 
47
62
13.40
Referers 
Referees 
References 
189
272
99
Search Limit
100272
Title
Citations
PageRank
Year
PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices10.352022
MaDe: Malicious Aerial Vehicle Detection using Generalized Likelihood Ratio Test00.342022
DRiVe: Detecting Malicious Roadside Units in the Internet of Vehicles With Low Latency Data Integrity00.342022
Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces00.342022
IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks00.342022
PIC: Preserving Data Integrity in UAV Assisted Communication00.342022
Autonomous Mobility Of A Fleet Of Vehicles For Precision Pesticide Application00.342021
A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles50.432021
Security Function Virtualization for IoT Applications in 6G Networks00.342021
A Lightweight Protocol For Secure Data Provenance In The Internet Of Things Using Wireless Fingerprints10.352021
A Model Predictive Controller For Precision Irrigation Using Discrete Lagurre Networks00.342021
A Greedy Approach To Improve Pesticide Application For Precision Agriculture Using Model Predictive Control00.342021
HAtt: Hybrid Remote Attestation for the Internet of Things With High Availability40.392020
Defining trust in IoT environments via distributed remote attestation using blockchain10.352020
A Graph-Theoretic Approach To Capacity Benefit Margin Calculation For Large Multiarea Power Systems00.342020
A Scalable Protocol for Driving Trust Management in Internet of Vehicles With Blockchain60.412020
Data Provenance for IoT using Wireless Channel Characteristics and Physically Unclonable Functions00.342019
Predicting Down syndrome and neural tube defects using basic risk factors.00.342019
Token-Based Security For The Internet Of Things With Dynamic Energy-Quality Tradeoff00.342019
Data Provenance For Iot With Light Weight Authentication And Privacy Preservation30.392019
Two-Factor Authentication For Iot With Location Information30.362019
Low Power Data Integrity in IoT Systems.30.392018
Mitigating loT Device based DDoS Attacks using Blockchain.20.442018
BlockPro - Blockchain based Data Provenance and Integrity for Secure IoT Environments.20.382018
ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication.40.402018
Mutual Authentication in IoT Systems Using Physical Unclonable Functions.180.732017
A Light-Weight Mutual Authentication Protocol for IoT Systems.00.342017
Secure Data Provenance for the Internet of Things.20.442017
Detecting Data Tampering Attacks In Synchrophasor Networks Using Time Hopping00.342016
Position Paper: Physical Unclonable Functions for IoT Security.30.412016
Design, implementation, and thermal modeling of embedded reconfigurable magnetorquer system for nanosatellites00.342015
Efficient packet recovery in wireless networks10.362014
A wireless MAC protocol with efficient packet recovery00.342014
Distinguishing between channel errors and collisions in IEEE 802.1120.412012
Collision detection in IEEE 802.11 networks by error vector magnitude analysis00.342012
Scalable peer-to-peer video streaming in WiMAX networks10.352009