Author:
Herwig Stephen,Harvey Katura,Hughey George,Roberts Richard,Levin Dave
Cited by
109 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IoT malware detection using static and dynamic analysis techniques: A systematic literature review;SECURITY AND PRIVACY;2024-07-19
2. Conditional Network Availability: Enhancing Connectivity Guarantees for TEE-Based Services;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
3. Can Allowlists Capture the Variability of Home IoT Device Network Behavior?;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
4. C2Miner: Tricking IoT Malware into Revealing Live Command & Control Servers;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
5. Research on Malicious Network Traffic Communication Based on Blockchain;2024 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB);2024-06-19