Abstract | ||
---|---|---|
Recent years have witnessed lots of attacks targeted at the widespread Internet of Things (IoT) devices and malicious activities conducted by compromised IoT devices. After some notorious IoT malware released their source code, many new variants emerge, which are usually more powerful and stealthy. Although numerous existing studies have analyzed some exposed families, there is a lack of systemati... |
Year | DOI | Venue |
---|---|---|
2021 | 10.1109/JIOT.2021.3063840 | IEEE Internet of Things Journal |
Keywords | DocType | Volume |
Malware,Security,Internet of Things,Feature extraction,Companies,Semantics,Computer viruses | Journal | 8 |
Issue | ISSN | Citations |
20 | 2327-4662 | 1 |
PageRank | References | Authors |
0.35 | 0 | 12 |
Name | Order | Citations | PageRank |
---|---|---|---|
Huanran Wang | 1 | 5 | 2.17 |
Weizhe Zhang | 2 | 287 | 53.07 |
Hui He | 3 | 80 | 16.45 |
Peng Liu | 4 | 1701 | 171.49 |
Daniel Xiapu Luo | 5 | 1 | 0.35 |
Yang Liu | 6 | 8 | 6.60 |
Jiawei Jiang | 7 | 1 | 0.35 |
Yan Li | 8 | 1 | 0.35 |
Xing Zhang | 9 | 155 | 32.89 |
Wenmao Liu | 10 | 1 | 3.05 |
Runzi Zhang | 11 | 1 | 0.35 |
Jiawei Jiang | 12 | 89 | 14.60 |