Author of the publication

Ethical hacking for boosting IoT vulnerability management

, , and . Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing - ICTRS \textquotesingle19, page 49–55. New York, Association for Computing Machinery, ACM Press, (September 2019)
DOI: 10.1145/3357767.3357774

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Prediction of Human Movements Across Device Types and Spatiotemporal Granularities., , , , , and . CoRR, (2019)Nimbus: Towards Latency-Energy Efficient Task Offloading for AR Services., , , , and . IEEE Trans. Cloud Comput., 11 (2): 1530-1545 (April 2023)Poster: SoftOffload: a programmable approach toward collaborative mobile traffic offloading., , and . MobiSys, page 368. ACM, (2014)Vision: Augmenting WiFi Offloading with An Open-source Collaborative Platform., , , , , and . MCS@MobiCom, page 44-48. ACM, (2015)Analyzing and Mitigating Bias for Vulnerable Classes: Towards Balanced Representation in Dataset., , , , , and . CoRR, (2024)Five Driving Forces of Multi-Access Edge Computing., , and . CoRR, (2018)5G Applications: Requirements, Challenges, and Outlook., and . CoRR, (2018)AMSense: How Mobile Sensing Platforms Capture Pedestrian/Cyclist Spatiotemporal Properties in Cities., , , , and . IEEE Intell. Transp. Syst. Mag., 14 (1): 29-43 (2022)IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge., , , and . IEEE Trans. Netw. Serv. Manag., 17 (1): 45-59 (2020)Trustworthy and Sustainable Edge AI: A Research Agenda., , and . TPS-ISA, page 164-172. IEEE, (2021)