From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems., , , , , , и . RAID, стр. 308-320. ACM, (2022)Systemically Evaluating the Robustness of ML-based IoT Malware Detectors., , , , , , и . DSN (Supplements), стр. 3-4. IEEE, (2021)Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699., , , , , и . Comput. Networks, (2021)Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions., , , и . SecureComm (1), том 254 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 377-395. Springer, (2018)Graph-Based Comparison of IoT and Android Malware., , , , , и . CSoNet, том 11280 из Lecture Notes in Computer Science, стр. 259-272. Springer, (2018)Measuring the Cost of Software Vulnerabilities., , , , , , и . EAI Endorsed Trans. Security Safety, 7 (23): e1 (2020)ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation., , , , , , , , и . IEEE Internet Things J., 9 (4): 2485-2496 (2022)POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions., , и . AsiaCCS, стр. 793-795. ACM, (2018)RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing., , , , , и . IEEE ICBC, стр. 210-218. IEEE, (2019)IoT malware ecosystem in the wild: a glimpse into analysis and exposures., , , , , и . SEC, стр. 413-418. ACM, (2019)