Cited By
View all- Tang KWu KChau SVilela JSchulmann HLi N(2024)Investigating TLS Version Downgrade in Enterprise SoftwareProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653263(31-42)Online publication date: 19-Jun-2024
- Theofanous APapadogiannaki EShevtsov AIoannidis SChua TNgo CKa-Wei Lee RKumar RLauw H(2024)Fingerprinting the Shadows: Unmasking Malicious Servers with Machine Learning-Powered TLS AnalysisProceedings of the ACM on Web Conference 202410.1145/3589334.3645719(1933-1944)Online publication date: 13-May-2024
- Yang KLi QWang HSun LLiu J(2024)Fingerprinting Industrial IoT devices based on multi-branch neural networkExpert Systems with Applications10.1016/j.eswa.2023.122371238(122371)Online publication date: Mar-2024
- Show More Cited By



