Follow
Ikram Ullah
Title
Cited by
Cited by
Year
Comparing Apples and Oranges in IoT context: A deep dive into methods for comparing IoT platforms
A Mijuskovic, I Ullah, R Bemthuis, N Meratnia, P Havinga
IEEE Internet of Things Journal, 2020
142020
How to break IOTA heart by replaying?
G De Roode, I Ullah, PJM Havinga
2018 IEEE Globecom Workshops (GC Wkshps), 1-7, 2018
132018
Detecting Lateral Movement Attacks through SMB using BRO
I Ullah
University of Twente, 2016
102016
Threat modeling—how to visualize attacks on IoTA?
I Ullah, G De Roode, N Meratnia, P Havinga
Sensors 21 (5), 1834, 2021
72021
Entropy as a Service: A Lightweight Random Number Generator for Decentralized IoT Applications
I Ullah, N Meratnia, PJM Havinga
2020 IEEE International Conference on Pervasive Computing and Communications …, 2020
62020
DOSing distributed ledger technology: IOTA
MA Brady, I Ullah, PJM Havinga
2021 IEEE 5th International Conference on Cryptography, Security and Privacy …, 2021
42021
iMAC: Implicit Message Authentication Code for IoT Devices
I Ullah, N Meratnia, PJM Havinga
2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 1-6, 2020
22020
Sensor-Based PUF: A Lightweight Random Number Generator for Resource Constrained IoT Devices
M Hillerström, I Ullah, PJM Havinga
IFIP International Internet of Things Conference, 89-105, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–8