Author:
Bou-Harb Elias,Debbabi Mourad,Assi Chadi
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
2. Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations;2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob);2023-06-21
3. State-of-the-art survey of artificial intelligent techniques for IoT security;Computer Networks;2022-04
4. A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches;Network and System Security;2022
5. Revisiting IoT Fingerprinting behind a NAT;2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2021-09