Author of the publication

Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning

, and . (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Encrypted Malicious Network Traffic using Machine Learning., and . MILCOM, page 1-6. IEEE, (2019)Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services., , , and . DSN, page 362-373. IEEE Computer Society, (2018)Towards passive analysis of anycast in global routing: unintended impact of remote peering., , , , , and . Comput. Commun. Rev., 49 (3): 18-25 (2019)Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning, and . (2022)Packet-level traffic measurements from the Sprint IP backbone., , , , , , , , and . IEEE Netw., 17 (6): 6-16 (2003)Detecting Attacks on IoT Devices using Featureless 1D-CNN., and . CSR, page 461-466. IEEE, (2021)An Exploration of ARM System-Level Cache and GPU Side Channels., , , and . ACSAC, page 784-795. ACM, (2021)A network security classifier defense: against adversarial machine learning attacks., and . WiseML@WiSec, page 67-73. ACM, (2020)A Comprehensive Measurement-based Investigation of DNS Hijacking., , , , , and . SRDS, page 210-221. IEEE, (2021)Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints., , , and . SP, page 1002-1017. IEEE, (2022)