Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets., , , , , , and . DSC, page 1-8. IEEE, (2019)Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers., , , , , , and . ICDCS, page 888-898. IEEE, (2020)Examining the Security of DDoS Detection Systems in Software Defined Networks., , , and . CoNEXT Companion, page 49-50. ACM, (2019)Breaking graph-based IoT malware detection systems using adversarial examples: poster., , , , , , and . WiSec, page 290-291. ACM, (2019)Systemically Evaluating the Robustness of ML-based IoT Malware Detectors., , , , , , and . DSN (Supplements), page 3-4. IEEE, (2021)Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube., , , , and . WWW (Companion Volume), page 508-515. ACM / IW3C2, (2021)Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems., , , , , , and . RAID, page 308-320. ACM, (2022)Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks., , , , , and . WISA, volume 12583 of Lecture Notes in Computer Science, page 362-374. Springer, (2020)Hiding in Plain Sight: A Measurement and Analysis of Kids' Exposure to Malicious URLs on YouTube., , and . SEC, page 321-326. IEEE, (2020)From Blue-Sky to Practical Adversarial Learning., , , , and . TPS-ISA, page 118-127. IEEE, (2020)