Author of the publication

A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution.

, , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1165-1177 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EV Charging Infrastructure Discovery to Contextualize Its Deployment Security., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 21 (1): 1287-1301 (February 2024)On Ransomware Family Attribution Using Pre-Attack Paranoia Activities., , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (1): 19-36 (2022)A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships., , , , and . IEEE Netw. Lett., 3 (3): 161-165 (2021)Investigating the Security of EV Charging Mobile Applications as an Attack Surface., , , , and . ACM Trans. Cyber Phys. Syst., 7 (4): 26:1-26:28 (October 2023)Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective., , , , , and . DSN, page 562-573. IEEE Computer Society, (2018)Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users., and . SOUPS, page 301-320. USENIX Association, (2016)ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems., , , , and . NDSS, The Internet Society, (2023)EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants., , , , and . AsiaCCS, page 452-466. ACM, (2022)Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems., , , and . IEEE Commun. Surv. Tutorials, 20 (4): 3389-3415 (2018)A Hybrid System Call Profiling Approach for Container Protection., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (3): 1068-1083 (May 2024)