Author of the publication

Semantic Learning Based Cross-Platform Binary Vulnerability Search For IoT Devices.

, , , , , and . IEEE Trans. Ind. Informatics, 17 (2): 971-979 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical vulnerability analysis of automated smart contracts security testing on blockchains., , , and . CASCON, page 103-113. ACM, (2018)Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things., , , and . IEEE Internet of Things Journal, 5 (4): 3059-3067 (2018)Improving Security Awareness in the Government Sector., , , , and . DG.O, page 1-7. ACM, (2016)A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials., , , and . IEEE Access, (2018)IoT Device Forensics and Data Reduction., and . IEEE Access, (2018)Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop.. SIGACT News, 43 (2): 38-40 (2012)A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks., , and . RFIDSec, volume 10155 of Lecture Notes in Computer Science, page 30-44. Springer, (2016)Designing Sensing as a Service (S2aaS) Ecosystem for Internet of Things., , , , , and . CoRR, (2019)Errors in Computational Complexity Proofs for Protocols., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 624-643. Springer, (2005)Examining Indistinguishability-Based Proof Models for Key Establishment Protocols., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 585-604. Springer, (2005)