Cited By
View all- Davanian AFaloutsos MLindorfer MQuek TGao DZhou JCardenas A(2024)C2Miner: Tricking IoT Malware into Revealing Live Command & Control ServersProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3644992(112-127)Online publication date: 1-Jul-2024
- Maliga DNagy RButtyán L(2024)A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform2024 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)10.1109/MASCOTS64422.2024.10786551(1-6)Online publication date: 21-Oct-2024
- Al-Begain KKhan MAlothman BJoumaa CAlrashed E(2022)A DDoS Detection and Prevention System for IoT Devices and Its Application to Smart Home EnvironmentApplied Sciences10.3390/app12221185312:22(11853)Online publication date: 21-Nov-2022
- Show More Cited By