标题
IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering
作者
关键词
-
出版物
Symmetry-Basel
Volume 10, Issue 11, Pages 561
出版商
MDPI AG
发表日期
2018-11-01
DOI
10.3390/sym10110561
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
- (2018) Chong-zhi Gao et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones
- (2018) Weizhi Meng et al. COMPUTERS & SECURITY
- Secure attribute-based data sharing for resource-limited users in cloud computing
- (2018) Jin Li et al. COMPUTERS & SECURITY
- A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity
- (2018) Zhiwei Wang Future Generation Computer Systems-The International Journal of eScience
- Enhancing network capacity by weakening community structure in scale-free network
- (2018) Jun Cai et al. Future Generation Computer Systems-The International Journal of eScience
- PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
- (2018) Entao Luo et al. IEEE COMMUNICATIONS MAGAZINE
- Significant Permission Identification for Machine-Learning-Based Android Malware Detection
- (2018) Jin Li et al. IEEE Transactions on Industrial Informatics
- Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack
- (2018) Chong-zhi Gao et al. INFORMATION SCIENCES
- TouchWB : Touch behavioral user authentication based on web browsing on smartphones
- (2018) Weizhi Meng et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT
- (2018) Hongyang Yan et al. SENSORS
- When Intrusion Detection Meets Blockchain Technology: A Review
- (2018) Weizhi Meng et al. IEEE Access
- Towards a Comprehensive Insight into the Eclipse Attacks of Tor Hidden Services
- (2018) Qingfeng Tan et al. IEEE Internet of Things Journal
- Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks
- (2017) Entao Luo et al. Future Generation Computer Systems-The International Journal of eScience
- Multi-key privacy-preserving deep learning in cloud computing
- (2017) Ping Li et al. Future Generation Computer Systems-The International Journal of eScience
- Lightweight distributed secure data management system for health internet of things
- (2017) Yang Yang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Finger vein secure biometric template generation based on deep learning
- (2017) Yi Liu et al. SOFT COMPUTING
- Fully secure fuzzy identity-based encryption for secure IoT communications
- (2016) Yijun Mao et al. COMPUTER STANDARDS & INTERFACES
- Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures
- (2016) Shuhong Chen et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- Bit-oriented format extraction approach for automatic binary protocol reverse engineering
- (2016) Siyu Tao et al. IET Communications
- Automatic network protocol message format analysis
- (2016) Ming-Ming Xiao et al. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- A survey of methods for time series change point detection
- (2016) Samaneh Aminikhanghahi et al. KNOWLEDGE AND INFORMATION SYSTEMS
- Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks
- (2016) Zhenyu Zhou et al. IEEE Internet of Things Journal
- A Survey of Automatic Protocol Reverse Engineering Tools
- (2015) John Narayan et al. ACM COMPUTING SURVEYS
- Network protocol fuzz testing for information systems and applications: a survey and taxonomy
- (2015) Tewodros Legesse Munea et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Flexible neural trees based early stage identification for IP traffic
- (2015) Zhenxiang Chen et al. SOFT COMPUTING
- Efficient file fuzz testing using automated analysis of binary file format
- (2010) Hyoung Chun Kim et al. JOURNAL OF SYSTEMS ARCHITECTURE
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now