Cited By
View all- Tagliaro CKomsic MContinella ABorgolte KLindorfer M(2024)Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused ProtocolsProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678899(561-578)Online publication date: 30-Sep-2024
- Guo SLyu MGharakheili H(2024)Realizing Open and Decentralized Marketplace for Exchanging Data of Expected IoT BehaviorsNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575272(1-5)Online publication date: 6-May-2024
- Smolyakova SKhodayarseresht EMajumdar S(2024)Traditional IOCs Meet Dynamic App–Device Interactions for IoT-Specific Threat IntelligenceIEEE Internet of Things Journal10.1109/JIOT.2024.341335111:19(30571-30593)Online publication date: 1-Oct-2024
- Show More Cited By