Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PARVP: passively assessing risk of vulnerable passwords for HTTP authentication in networked cameras., , , and . DAI-SNAC@CoNEXT, page 10-16. ACM, (2021)Combining MUD Policies with SDN for IoT Intrusion Detection., , and . IoT S&P@SIGCOMM, page 1-7. ACM, (2018)Combining Device Behavioral Models and Building Schema for Cybersecurity of Large-Scale IoT Infrastructure., , , and . IEEE Internet Things J., 9 (23): 24174-24185 (2022)Programmable Active Scans Controlled by Passive Traffic Inference for IoT Asset Characterization., , , and . NOMS, page 1-6. IEEE, (2023)Unveiling Behavioral Transparency of Protocols Communicated by IoT Networked Assets (Full Version)., , , and . CoRR, (2024)Towards a sensor system to tame the human elephant conflict., , , , , , , , and . SAS, page 1-4. IEEE, (2015)PicP-MUD: Profiling Information Content of Payloads in MUD Flows for IoT Devices., , , and . WoWMoM, page 521-526. IEEE, (2022)Unveiling Behavioral Transparency of Protocols Communicated by IoT Networked Assets., , , and . WoWMoM, page 39-44. IEEE, (2025)Detecting Volumetric Attacks on loT Devices via SDN-Based Monitoring of MUD Activity., , , and . SOSR, page 36-48. ACM, (2019)Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles., , , , and . IoT S&P@SIGCOMM, page 8-14. ACM, (2018)