Author:
Caballero Juan,Poosankam Pongsin,Kreibich Christian,Song Dawn
Cited by
74 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Poster: Combine Topology and Traffic to Calibrate P2P Botnet Identification in Large-Scale Network;Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos;2024-08-04
2. FIRMRES: Exposing Broken Device-Cloud Access Control in IoT Through Static Firmware Analysis;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2024-06-24
3. Forensic analysis of iOS binary cookie files;Journal of Forensic Sciences;2024-03-05
4. Lifting Network Protocol Implementation to Precise Format Specification with Security Applications;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
5. Extracting Length Field of Unknown Binary Network Protocol from Static Trace;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01