Cited By
View all- Noman HAbu-Sharkh O(2023)Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical ImplementationsSensors10.3390/s2313606723:13(6067)Online publication date: 30-Jun-2023
- Tramèr FShokri RSan Joaquin ALe HJagielski MHong SCarlini NYin HStavrou ACremers CShi E(2022)Truth SerumProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560554(2779-2792)Online publication date: 7-Nov-2022
- Skeirik SMeseguer JRocha C(2020)Verification of the IBOS Browser Security Properties in Reachability LogicRewriting Logic and Its Applications10.1007/978-3-030-63595-4_10(176-196)Online publication date: 11-Dec-2020
- Show More Cited By



