Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures YR Siwakoti, M Bhurtel, DB Rawat, A Oest, RC Johnson IEEE Internet of Things Journal 10 (13), 11224-11239, 2023 | 23 | 2023 |
The good, the bad and the implications of profiling mobile broadband coverage A Lutu, YR Siwakoti, Ö Alay, D Baltrūnas, A Elmokashfi Computer Networks 107, 76-93, 2016 | 13 | 2016 |
Measuring Performance of Mobile Broadband Networks under Mobility YR Siwakoti | 6 | 2014 |
Phishing attack detection with ml-based siamese empowered orb logo recognition and ip mapper M Bhurtel, YR Siwakoti, DB Rawat IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops …, 2022 | 4 | 2022 |
Profiling Mobile Broadband Coverage. A Lutu, YR Siwakoti, Ö Alay, D Baltrunas, A Elmokashfi TMA, 2016 | 4 | 2016 |
Toward Scene Understanding with Depth and Object-Aware Clustering in Contested Environment M Bhurtel, YR Siwakoti, DB Rawat, BM Sadler, JM Fossaceca, DO Rice 2023 IEEE International Conference on Machine Learning and Applications (ICMLA), 2023 | 2 | 2023 |
Investigating Security Vulnerability Related to Exposure and TLS Ecosystem in IoT Devices YR Siwakoti, DB Rawat IEEE 24th International Conference on Information Reuse and Integration for …, 2023 | 1 | 2023 |
Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT Devices YR Siwakoti, DB Rawat Proceedings of the Twenty-fourth International Symposium on Theory …, 2023 | | 2023 |