Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets., , , , , , and . DSC, page 1-8. IEEE, (2019)Examining the Security of DDoS Detection Systems in Software Defined Networks., , , and . CoNEXT Companion, page 49-50. ACM, (2019)Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers., , , , , , and . ICDCS, page 888-898. IEEE, (2020)Breaking graph-based IoT malware detection systems using adversarial examples: poster., , , , , , and . WiSec, page 290-291. ACM, (2019)Systemically Evaluating the Robustness of ML-based IoT Malware Detectors., , , , , , and . DSN (Supplements), page 3-4. IEEE, (2021)Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube., , , , and . WWW (Companion Volume), page 508-515. ACM / IW3C2, (2021)Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems., , , , , , and . RAID, page 308-320. ACM, (2022)Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks., , , , , and . WISA, volume 12583 of Lecture Notes in Computer Science, page 362-374. Springer, (2020)ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation., , , , , , , , and . IEEE Internet Things J., 9 (4): 2485-2496 (2022)Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations., , , , , and . CoRR, (2023)