Author of the publication

Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts.

, , , , , and . EuroS&P, page 337-352. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Customized Malware: Identifying Target Systems Using Personally Identifiable Information., , , , , , and . COMPSAC, page 1007-1012. IEEE, (2024)Threat of Technical Support Scams in Japan., , , , , and . DSC, page 115-122. IEEE, (2024)Evasive Malware via Identifier Implanting., , , , , , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 162-184. Springer, (2018)Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts., , , , , and . EuroS&P, page 337-352. IEEE, (2021)Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai., , , , , , , , and . NDSS, The Internet Society, (2019)Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT., , , , , , and . USENIX Security Symposium, page 1541-1558. USENIX Association, (2023)Inherited Threat Reproduction on Open Source 5G Testbed., , , , , and . DSC, page 9-16. IEEE, (2024)IoTPOT: Analysing the Rise of IoT Compromises., , , , , and . WOOT, USENIX Association, (2015)Malware Detection Method by Catching Their Random Behavior in Multiple Executions., , , and . SAINT, page 262-266. IEEE Computer Society, (2012)An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors., , and . AsiaJCIS, page 19-25. IEEE Computer Society, (2014)