Search for persons
X
?
2023 IEEE International Conference on Edge Computing and Communications (EDGE) ,
1
PATRIoTA: A Similarity-based IoT Malware Detection Method R..:
, In:
?
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning ,
2
Increasing the Robustness of a Machine Learning-based IoT M..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
4
A Practical Attack on the TLSH Similarity Digest Scheme:
, In:
?
2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS) ,
5
SIMBIoTA++: Improved Similarity-based IoT Malware Detection:
, In:
?
Communications in Computer and Information Science; Security in Computer and Information Sciences ,
6
Correlation-Based Anomaly Detection for the CAN Bus:
, In:
?
Communications in Computer and Information Science; Security in Computer and Information Sciences ,
7
T-RAID: TEE-based Remote Attestation for IoT Devices:
, In:
?
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium ,
8
Clustering IoT Malware based on Binary Similarity:
, In:
?
Cryptographic Obfuscation; SpringerBriefs in Computer Science ,
9
iO Combiners and Universal Constructions:
, In:
?
Cryptographic Obfuscation; SpringerBriefs in Computer Science ,
10
Building Core-Obfuscators—In Search of a Seed I:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2019 ,
14
There Is Always an Exception: Controlling Partial Informati..:
, In:
?
Cryptographic Obfuscation; SpringerBriefs in Computer Science ,
15