Search for persons
X
?
Proceedings of the 35th ACM International Conference on Supercomputing ,
1
ProMT : optimizing integrity tree updates for write-inte..:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
4
Cyber Deception in the Internet of Battlefield Things: Tech..:
, In:
?
2019 IEEE Conference on Dependable and Secure Computing (DSC) ,
8
Examining the Robustness of Learning-Based DDoS Detection i..:
, In:
?
2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) ,
9
RouteChain: Towards Blockchain-based Secure and Efficient B..:
, In:
?
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks ,
10
Analyzing endpoints in the internet of things malware : ..:
, In:
?
11
Security and Privacy in Communication Networks: 15th EAI In..
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 305
?
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks ,
12
Breaking graph-based IoT malware detection systems using ad..:
, In:
?
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks ,
13