Author of the publication

A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices.

, , , , and . Future Internet, 12 (2): 27 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARG: Automatic ROP Chains Generation., , , , , , and . IEEE Access, (2019)Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (2): 654-676 (2024)A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices., , , , and . Future Internet, 12 (2): 27 (2020)Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers., , , , , , , , and . EuroS&P, page 171-187. IEEE, (2022)From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age., , , , , , , and . ICISSP, page 237-248. SCITEPRESS, (2021)FANS: Fuzzing Android Native System Services via Automated Interface Analysis., , , , , and . USENIX Security Symposium, page 307-323. USENIX Association, (2020)De-obfuscation and Detection of Malicious PDF Files with High Accuracy., , , , and . HICSS, page 4890-4899. IEEE Computer Society, (2013)Studying Malicious Websites and the Underground Economy on the Chinese Web., , , , , and . Managing Information Risk and the Economics of Security, Springer, (2009)A Tool for Volatile Memory Acquisition from Android Devices., , , and . IFIP Int. Conf. Digital Forensics, volume 484 of IFIP Advances in Information and Communication Technology, page 365-378. Springer, (2016)Code classification with graph neural networks: Have you ever struggled to make it work?, , , , and . Expert Syst. Appl., (December 2023)