From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

EV Charging Infrastructure Discovery to Contextualize Its Deployment Security., , , , , , , и . IEEE Trans. Netw. Serv. Manag., 21 (1): 1287-1301 (февраля 2024)On Ransomware Family Attribution Using Pre-Attack Paranoia Activities., , , , , и . IEEE Trans. Netw. Serv. Manag., 19 (1): 19-36 (2022)Investigating the Security of EV Charging Mobile Applications as an Attack Surface., , , , и . ACM Trans. Cyber Phys. Syst., 7 (4): 26:1-26:28 (октября 2023)A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships., , , , и . IEEE Netw. Lett., 3 (3): 161-165 (2021)Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective., , , , , и . DSN, стр. 562-573. IEEE Computer Society, (2018)Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users., и . SOUPS, стр. 301-320. USENIX Association, (2016)ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems., , , , и . NDSS, The Internet Society, (2023)EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants., , , , и . AsiaCCS, стр. 452-466. ACM, (2022)Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems., , , и . IEEE Commun. Surv. Tutorials, 20 (4): 3389-3415 (2018)A Hybrid System Call Profiling Approach for Container Protection., , , , , и . IEEE Trans. Dependable Secur. Comput., 21 (3): 1068-1083 (мая 2024)