共 50 条
- [21] A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms ACM Transactions on Design Automation of Electronic Systems, 2021, 27 (01):
- [23] An Improved Approach for SQL Injection Vulnerabilities Detection INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3017 - 3020
- [24] Identifying Vulnerabilities of Consumer Internet of Things (IoT) Devices: A Scalable Approach 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 179 - 181
- [25] A Dynamic Detection Technique for XSS Vulnerabilities 2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018), 2018, : 34 - 43
- [26] Design and Development of a Command-line Tool for Portable Executable File Analysis and Malware Detection in IoT Devices INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 127 - 136
- [27] Detecting Command Injection and Cross-site Scripting Vulnerabilities Using Graph Representations Proc. IEEE Int. Conf. Data Softw. Eng., ICoDSE, 1600, (49-54):
- [28] REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices 2024 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS, PERCOM WORKSHOPS, 2024, : 7 - 8
- [29] A comparative analysis of Buffer Overflow vulnerabilities in High-End IoT devices 2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 694 - 701
- [30] Exploring the Vulnerabilities of IoT Devices: A Comprehensive Analysis of Mirai and Bashlite Attack Vectors 2023 10TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, IOTSMS, 2023, : 125 - 132