Cited By
View all- Dara NShankar PArvind PSingh V(2024)Intelligent Insight into IoT Threats: Leveraging Advanced Analytics with Honeypots for Anomaly Detection2024 IEEE 9th International Conference for Convergence in Technology (I2CT)10.1109/I2CT61223.2024.10543511(1-6)Online publication date: 5-Apr-2024
- Yuan SLiu CShi JZhang KPu WLiu XYang L(2024)Research on Vulnerability Detection Techniques Based on Static Analysis and Program Slice2024 6th International Conference on Electronic Engineering and Informatics (EEI)10.1109/EEI63073.2024.10696068(965-969)Online publication date: 28-Jun-2024
- Meng JYang ZZhang ZGeng YDeng RCheng PChen JZhou J(2023)SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network TrafficProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627179(310-323)Online publication date: 4-Dec-2023
- Show More Cited By