Cited By
View all- Davanian AFaloutsos MLindorfer MQuek TGao DZhou JCardenas A(2024)C2Miner: Tricking IoT Malware into Revealing Live Command & Control ServersProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3644992(112-127)Online publication date: 1-Jul-2024
- Al-Begain KKhan MAlothman BJoumaa CAlrashed E(2022)A DDoS Detection and Prevention System for IoT Devices and Its Application to Smart Home EnvironmentApplied Sciences10.3390/app12221185312:22(11853)Online publication date: 21-Nov-2022
- Tanabe RWatanabe TFujita AIsawa RGañán CEeten MYoshioka KMatsumoto T(2022)Disposable Botnets: Long-term Analysis of IoT Botnet InfrastructureJournal of Information Processing10.2197/ipsjjip.30.57730(577-590)Online publication date: 2022
- Show More Cited By