Author of the publication

Detecting Internet-Scale Surveillance Devices Using RTSP Recessive Features.

, , , , , and . SciSec, volume 13005 of Lecture Notes in Computer Science, page 21-35. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks., , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 50-59. Springer, (2015)Fast Provisioning of Virtual Machine Based on Intelligent Virtual Machine Image Prefetching., , , , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 778-787. IEEE, (2022)Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis., , , , , , , and . USENIX Security Symposium, page 887-903. USENIX Association, (2019)RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources., , , , and . EUC, page 197-204. IEEE Computer Society, (2011)ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing., , , , , , , , , and . ACSAC, page 849-860. ACM, (2021)HackMentor: Fine-Tuning Large Language Models for Cybersecurity., , , , , , , and . TrustCom, page 452-461. IEEE, (2023)Vehicle Anomaly Detection Based on Trajectory Data of ANPR System., , , and . GLOBECOM, page 1-6. IEEE, (2015)LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries., , , , , , , and . MILCOM, page 741-746. IEEE, (2023)An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification., , , , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 20-38. Springer, (2022)Exploiting ephemeral link correlation for mobile wireless networks., , , , , and . SenSys, page 239-252. ACM, (2012)