Author of the publication

PIT: A Probe Into Internet of Things by Comprehensive Security Analysis.

, , , and . TrustCom/BigDataSE, page 522-529. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OVER: overhauling vulnerability detection for iot through an adaptable and automated static analysis framework., , and . SAC, page 729-738. ACM, (2020)Honey-Gauge: Enabling User-Centric Honeypot Classification., , , , and . UbiSec, volume 2034 of Communications in Computer and Information Science, page 114-132. Springer, (2023)FOCUS: Fatigue-Reducing IOCs Through Prioritization and Scoring., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 20-27. IEEE, (2023)Security Testbed for Internet-of-Things Devices., , , , , , , and . IEEE Trans. Reliability, 68 (1): 23-44 (2019)MARK: Fill in the blanks through a JointGAN based data augmentation for network anomaly detection., , , , and . Comput. Secur., (2022)E-Audit: Distinguishing and investigating suspicious events for APTs attack detection., , , and . J. Syst. Archit., (November 2023)Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks., , , , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 529-546. Springer, (2022)ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection., , , , , , and . ICICS, volume 13407 of Lecture Notes in Computer Science, page 417-437. Springer, (2022)SMuF: State Machine Based Mutational Fuzzing Framework for Internet of Things., , , , and . CRITIS, volume 11260 of Lecture Notes in Computer Science, page 101-112. Springer, (2018)Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things., , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 43-52. Springer, (2018)