Author of the publication

Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis.

, , , and . QRS, page 514-523. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Blockchain Network for IoT Device Firmware Integrity Verification and Update., , and . HASE, page 164-170. IEEE, (2019)Blockchain Based Model for Consent Management and Data Transparency Assurance., , , and . QRS Companion, page 1050-1059. IEEE, (2021)On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography., , , , and . QRS Companion, page 758-759. IEEE, (2022)On the Impact of Inter-language Dependencies in Multi-language Systems., , , , and . QRS, page 509. IEEE, (2020)Protecting Internet users from becoming victimized attackers of click-fraud., , , and . Journal of Software: Evolution and Process, (2018)Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?, , and . QRS, page 95-102. IEEE, (2018)An Analysis of Android Malware Behavior., , and . QRS Companion, page 505-512. IEEE, (2018)Detecting Blind Cross-Site Scripting Attacks Using Machine Learning., , , and . SPML, page 22-25. ACM, (2018)Architecting Peer-to-Peer Serverless Distributed Machine Learning Training for Improved Fault Tolerance., , and . CoRR, (2023)On the analysis of evolution of software artefacts and programs.. ICSE, page 1563-1566. IEEE Computer Society, (2012)