Author:
Ghafoor Imran,Jattala Imran,Durrani Shakeel,Muhammad Tahir Ch
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CFG2VEC: Hierarchical Graph Neural Network for Cross-Architectural Software Reverse Engineering;2023 IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP);2023-05
2. A Programmatic Solution to Stop Heartbleed Bug Attack;Big Data Analytics in Astronomy, Science, and Engineering;2023
3. Vulnerability Analysis for IoT Devices of Multi-agent Systems: A Cryptographic Function Identification Approach;Proceedings of 2021 5th Chinese Conference on Swarm Intelligence and Cooperative Control;2022-07-29
4. A rule-based approach for detecting heartbleed cyber attacks;2022 IEEE International Symposium on Measurements & Networking (M&N);2022-07-18
5. Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI);IEEE Communications Surveys & Tutorials;2022