Cited By
View all- Hong SKim BMannan MLuo BLiao XXu JKirda ELie D(2024)Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural NetworksProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3691399(5000-5002)Online publication date: 2-Dec-2024
- Briongos SKarame GSoriente CWilde A(2023)No Forking Way: Detecting Cloning Attacks on Intel SGX ApplicationsProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627187(744-758)Online publication date: 4-Dec-2023
- Berlato SMorelli UCarbone RRanise S(2022)End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control PoliciesData and Applications Security and Privacy XXXVI10.1007/978-3-031-10684-2_14(236-255)Online publication date: 18-Jul-2022
- Show More Cited By