Author:
Jero Samuel,Hoque Endadul,Choffnes David,Mislove Alan,Nita-Rotaru Cristina
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
2. CC-fuzz;Proceedings of the 21st ACM Workshop on Hot Topics in Networks;2022-11-14
3. Automating network heuristic design and analysis;Proceedings of the 21st ACM Workshop on Hot Topics in Networks;2022-11-14
4. Zigbee’s Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications;25th International Symposium on Research in Attacks, Intrusions and Defenses;2022-10-26
5. Host identification based on self-similarity of network activity;Computer Communications;2022-07