A graph-based security framework for securing industrial IoT networks from vulnerability exploitations G George, SM Thampi IEEE Access 6, 43586-43601, 2018 | 114 | 2018 |
Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things G George, SM Thampi Pervasive and Mobile Computing 59, 101068, 2019 | 38 | 2019 |
Combinatorial analysis for securing IoT-assisted industry 4.0 applications from vulnerability-based attacks G George, SM Thampi IEEE Transactions on Industrial Informatics 18 (1), 3-15, 2020 | 15 | 2020 |
A graph-based decision support model for vulnerability analysis in IoT networks G George, SM Thampi Security in Computing and Communications: 6th International Symposium, SSCC …, 2019 | 9 | 2019 |
Securing smart healthcare systems from vulnerability exploitation G George, SM Thampi Smart City and Informatization: 7th International Conference, iSCI 2019 …, 2019 | 5 | 2019 |
Deploy—Web Hosting Using Docker Container M Sunny, S Shaji, S Sabu, U Uthaman, G George Advances in Computing and Network Communications: Proceedings of CoCoNet …, 2021 | 2 | 2021 |
An Android-Based Smart Home Automation System in Native Language NT Prakash, M Santhosh, MP Sneha Raj, G Gokul, G George Advances in Computing and Network Communications: Proceedings of CoCoNet …, 2021 | 1 | 2021 |
Vulnerability analysis and risk mitigation strategies for IoT networks G George Cochin, 0 | | |
SOA PAPER G George, SM Thampi, K Ye, Y Yan, H Wu, R Zhou, ZH Zhu, L Kong, ... | | |