Author of the publication

ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures.

, , , , and . SP (Workshops), page 126. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Retransmission-Based Access Class Barring for Machine Type Communications., , and . IoTaaS, volume 246 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-154. Springer, (2017)Duality on timing alignment and radio resources orthogonality toward 5G heterogeneous networks., , and . VITAE, page 1-5. IEEE, (2014)Modeling Key Caching for Mobile IP Authentication, Authorization, and Accounting (AAA) Services., , and . IEEE Trans. Vehicular Technology, 58 (7): 3596-3608 (2009)Power-efficient routing mechanism for ODMA systems., , and . IEEE Trans. Vehicular Technology, 55 (4): 1311-1319 (2006)On exploiting SDN to facilitate IPv4/IPv6 coexistence and transition., , , and . DSC, page 473-474. IEEE, (2017)Security Threats to xApps Access Control and E2 Interface in O-RAN., , , and . IEEE Open J. Commun. Soc., (2024)Joint Beamforming and Power Allocation for M2M/H2H Co-Existence in Green Dynamic TDD Networks: Low-Complexity Optimal Designs., , , , and . IEEE Internet Things J., 9 (6): 4799-4815 (2022)3GPP NR Sidelink Transmissions Toward 5G V2X., , , , , , and . IEEE Access, (2020)IoT malware classification based on reinterpreted function-call graphs., , , , and . Comput. Secur., (2023)Ecology-Based DoS Attack in Cognitive Radio Networks., and . IEEE Symposium on Security and Privacy Workshops, page 104-110. IEEE Computer Society, (2016)