Author:
Goksel Furkan,Ozmen Muslum Ozgur,Reeves Michael,Shivakumar Basavesh,Celik Z. Berkay
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Activity Recognition Protection for IoT Trigger-Action Platforms;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
2. MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands;Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses;2023-10-16
3. Discovering IoT Physical Channel Vulnerabilities;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
4. Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors;ACM Transactions on Internet of Things;2022-04-11