Author of the publication

ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.

, , , , , , , , and . IEEE Internet Things J., 9 (4): 2485-2496 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Instrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges., , , , and . SOSR, page 16:1-16:7. ACM, (2018)A Data-Driven Study of DDoS Attacks and Their Dynamics., , , and . IEEE Trans. Dependable Secur. Comput., 17 (3): 648-661 (2020)Side-Channel Attack on a Protected RFID Card., , , , , , and . IEEE Access, (2018)Efficient collision attacks on smart card implementations of masked AES., , , , , , and . Sci. China Inf. Sci., 58 (5): 1-15 (2015)Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing., , , , , and . IEEE Access, (2019)An Efficient MLP-based Point-guided Segmentation Network for Ore Images with Ambiguous Boundary., , , , , , , and . CoRR, (2024)SAM Meets Robotic Surgery: An Empirical Study in Robustness Perspective., , , , and . CoRR, (2023)Towards Effective Multi-Task Interaction for Entity-Relation Extraction: A Unified Framework with Selection Recurrent Network., , , and . CoRR, (2022)Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks., , and . KSII Trans. Internet Inf. Syst., 7 (5): 1094-1107 (2013)Analysis of Software Implemented Low Entropy Masking Schemes., , , and . Secur. Commun. Networks, (2018)