Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware., , , , , and . USENIX Security Symposium, page 6115-6132. USENIX Association, (2023)A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications., , , , and . CoRR, (2018)IoT-enabled smart lighting systems for smart cities., , , , , and . CCWC, page 639-645. IEEE, (2018)Invited Tutorial: Counteracting Web Application Abuse in Malware., , , , , and . SecDev, page 1-2. IEEE, (2023)6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices., , and . USENIX Security Symposium, page 397-414. USENIX Association, (2017)HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices., , , and . CNS, page 1-9. IEEE, (2020)Kratos: multi-user multi-device-aware access control system for the smart home., , , , , , , and . WISEC, page 1-12. ACM, (2020)HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems., , , and . SNAMS, page 389-396. IEEE, (2019)The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments., , , and . NDSS, The Internet Society, (2022)Sentinel: A Robust Intrusion Detection System for IoT Networks Using Kernel-Level System Information., , , , , and . IoTDI, page 53-66. ACM, (2021)