Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants., , , , and . IEEE Internet Things J., 10 (10): 8371-8394 (May 2023)Characterizing Linux-based malware: Findings and recent trends., , and . Future Gener. Comput. Syst., (2020)An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns., , , , and . Eng. Appl. Artif. Intell., 123 (Part B): 106344 (2023)On how VoIP attacks foster the malicious call ecosystem., , and . Comput. Secur., (2022)An instrumentation based algorithm for stack overflow detection., , , and . J. Comput. Virol. Hacking Tech., 16 (3): 245-256 (2020)A context-centered methodology for IoT forensic investigations., , , and . Int. J. Inf. Sec., 20 (5): 647-673 (2021)Attack Pattern Recognition in the Internet of Things using Complex Event Processing and Machine Learning., , , , and . SMC, page 1919-1926. IEEE, (2021)A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms., , , , and . Comput. Networks, (September 2023)Developing an IoT forensic methodology. A concept proposal., , , and . Digit. Investig., (2021)MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats., , , and . J. Supercomput., 79 (11): 11895-11933 (2023)