Search for persons
X
?
2023 IEEE International Conference on Edge Computing and Communications (EDGE) ,
1
PATRIoTA: A Similarity-based IoT Malware Detection Method R..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
2
A Practical Attack on the TLSH Similarity Digest Scheme:
, In:
?
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning ,
3
Increasing the Robustness of a Machine Learning-based IoT M..:
, In:
?
Communications in Computer and Information Science; Security in Computer and Information Sciences ,
5
T-RAID: TEE-based Remote Attestation for IoT Devices:
, In:
?
2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS) ,
6
SIMBIoTA++: Improved Similarity-based IoT Malware Detection:
, In:
?
Communications in Computer and Information Science; Security in Computer and Information Sciences ,
7
Correlation-Based Anomaly Detection for the CAN Bus:
, In:
?
Cryptographic Obfuscation; SpringerBriefs in Computer Science ,
9
Bootstrapping: From the Seed to the Flower:
, In:
?
Lecture Notes in Computer Science; Emerging Technologies for Authorization and Authentication ,
10
The Cost of Having Been Pwned: A Security Service Provider'..:
, In:
?
Cryptographic Obfuscation; SpringerBriefs in Computer Science ,
12
Building Core-Obfuscators—In Search of a Seed I:
, In:
?
Cryptographic Obfuscation; SpringerBriefs in Computer Science ,
14