Cited By
View all- Noman HAbu-Sharkh ONoman S(2024)Log Poisoning Attacks in IoT: Methodologies, Evasion, Detection, Mitigation, and Criticality AnalysisIEEE Access10.1109/ACCESS.2024.343838312(118295-118314)Online publication date: 2024
- Zhang YShi Y(2023)Constructing Dynamic Honeypot Using Machine LearningProceedings of the 8th International Conference on Cyber Security and Information Engineering10.1145/3617184.3618056(116-120)Online publication date: 28-Dec-2023