Author of the publication

An Analysis of Malware Trends in Enterprise Networks.

, , , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 360-380. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy consumption of on-device machine learning models for IoT intrusion detection., , , , and . Internet Things, (April 2023)The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments., , , and . NDSS, The Internet Society, (2022)Peek-a-boo: i see your smart home activities, even encrypted!, , , , , , , , and . WISEC, page 207-218. ACM, (2020)(In)Security of File Uploads in Node.js., , , , , and . WWW, page 1573-1584. ACM, (2024)50 Shades of Support: A Device-Centric Analysis of Android Security Updates., , , , , and . NDSS, The Internet Society, (2024)A digital forensics framework for smart settings: poster., , , and . WiSec, page 332-333. ACM, (2019)Curie: Policy-based Secure Data Exchange., , , , , and . CODASPY, page 121-132. ACM, (2019)Achieving Secure and Differentially Private Computations in Multiparty Settings., , , , and . PAC, page 49-59. IEEE, (2017)A comprehensive security and performance assessment of UAV authentication schemes., , , , , , and . Secur. Priv., (January 2024)Exploring Jamming and Hijacking Attacks for Micro Aerial Drones., , , , , , and . ICC, page 1939-1944. IEEE, (2024)