Latest News

[May 2014] Invited to the TPC of  prestigious security conferences ACM Wisec 2014 and ACM CCS 2014.

[April 2014] Our paper entitled Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks has been accepted as a Regular Paper in an upcoming issue of the Transactions on Dependable and Secure Computing.

[November 2013] Our paper entitled Provenance-Aware Security Risk Analysis for Hosts and Network Flows has been accepted to the regular Technical track of the IFIP/IEEE Network Operations and Management Symposium (NOMS 2014).

[August 2013] Our paper entitled A Robust Iterative Filtering Technique for Wireless Sensor Networks in the Presence of Malicious Attacks was accepted at ACM SenSys 2013.

[August 2013] Our paper entitled DEMO Abstract: Securing Data Provenance in Body Area Networks using Lightweight Wireless Link Fingerprints was accepted at ACM SenSys 2013.