Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants., , , , and . IEEE Internet Things J., 10 (10): 8371-8394 (May 2023)Characterizing Linux-based malware: Findings and recent trends., , and . Future Gener. Comput. Syst., (2020)An instrumentation based algorithm for stack overflow detection., , , and . J. Comput. Virol. Hacking Tech., 16 (3): 245-256 (2020)An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns., , , , and . Eng. Appl. Artif. Intell., 123 (Part B): 106344 (2023)On how VoIP attacks foster the malicious call ecosystem., , and . Comput. Secur., (2022)Forensic analysis of the Xiaomi Mi Smart Sensor Set., , , and . Digit. Investig., (2022)A context-centered methodology for IoT forensic investigations., , , and . Int. J. Inf. Sec., 20 (5): 647-673 (2021)Attack Pattern Recognition in the Internet of Things using Complex Event Processing and Machine Learning., , , , and . SMC, page 1919-1926. IEEE, (2021)A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents., , , and . Comput. J., 67 (4): 1324-1345 (2024)A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms., , , , and . Comput. Networks, (September 2023)