Author of the publication

Evaluating Malware Mitigation by Android Market Operators.

, , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Malware Mitigation by Android Market Operators., , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2016)AmpPot: Monitoring and Defending Against Amplification DDoS Attacks., , , , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 615-636. Springer, (2015)A Cross-Platform Study on IoT Malware., , , and . ICMU, page 1-2. IEEE, (2018)On Collusion Security of Random Codes., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 296-304 (2005)Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure., , , , , , , and . J. Inf. Process., (2022)ThingGate: A Gateway for Managing Traffic of Bare-metal IoT Honeypot., , and . J. Inf. Process., (2020)Honeypot Method to Lure Attackers Without Holding Crypto-Assets., , and . IEEE Access, (2024)Fighting IoT Cyberattacks: Device Discovery, Attack Observation and Security Notification.. CPSS@AsiaCCS, page 39-40. ACM, (2022)It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites., , , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 171-191. Springer, (2020)Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks., , , , , , , and . ESORICS (2), volume 14345 of Lecture Notes in Computer Science, page 23-41. Springer, (2023)