Cited By
View all- Gopalakrishna NAnandayuvaraj DDetti ABland FRahaman SDavis J(2022)"If security is required"Proceedings of the 4th International Workshop on Software Engineering Research and Practice for the IoT10.1145/3528227.3528565(1-8)Online publication date: 19-May-2022
- Zhang HFu ZLi GMa LZhao ZYang HSun YLiu YJin Z(2022)Towards Robustness of Deep Program Processing Models—Detection, Estimation, and EnhancementACM Transactions on Software Engineering and Methodology10.1145/351188731:3(1-40)Online publication date: 9-Apr-2022
- Madani PVlajic NMaljevic I(2022)Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT SystemsDigital Threats: Research and Practice10.1145/34774033:4(1-24)Online publication date: 5-Dec-2022
- Show More Cited By