Identifying Vulnerable IoT Applications using Deep Learning. Naeem, H. & Alalfi, M. H. In Kontogiannis, K., Khomh, F., Chatzigeorgiou, A., Fokaefs, M., & Zhou, M., editors, 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2020, London, ON, Canada, February 18-21, 2020, pages 582–586, 2020. IEEE.
Paper doi bibtex 5 downloads @inproceedings{DBLP:conf/wcre/NaeemA20,
author = {Hajra Naeem and
Manar H. Alalfi},
editor = {Kostas Kontogiannis and
Foutse Khomh and
Alexander Chatzigeorgiou and
Marios{-}Eleftherios Fokaefs and
Minghui Zhou},
title = {Identifying Vulnerable IoT Applications using Deep Learning},
booktitle = {27th {IEEE} International Conference on Software Analysis, Evolution
and Reengineering, {SANER} 2020, London, ON, Canada, February 18-21,
2020},
pages = {582--586},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/SANER48275.2020.9054817},
doi = {10.1109/SANER48275.2020.9054817},
timestamp = {Thu, 16 Apr 2020 16:27:40 +0200},
biburl = {https://dblp.org/rec/conf/wcre/NaeemA20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 5
{"_id":"DcQrL6vzfpGnmCndL","bibbaseid":"naeem-alalfi-identifyingvulnerableiotapplicationsusingdeeplearning-2020","authorIDs":["4fdK8DFhrjpifuSFR","C5A8Tqvwg6ujKkf8g","NPMgnuNnBGNvaqQ6z","RYzxG2au8GskAksXz","gKHoRLQbfvZ8YkBE5","jd4EhtRNHKgCr7myY"],"author_short":["Naeem, H.","Alalfi, M. H."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Hajra"],"propositions":[],"lastnames":["Naeem"],"suffixes":[]},{"firstnames":["Manar","H."],"propositions":[],"lastnames":["Alalfi"],"suffixes":[]}],"editor":[{"firstnames":["Kostas"],"propositions":[],"lastnames":["Kontogiannis"],"suffixes":[]},{"firstnames":["Foutse"],"propositions":[],"lastnames":["Khomh"],"suffixes":[]},{"firstnames":["Alexander"],"propositions":[],"lastnames":["Chatzigeorgiou"],"suffixes":[]},{"firstnames":["Marios-Eleftherios"],"propositions":[],"lastnames":["Fokaefs"],"suffixes":[]},{"firstnames":["Minghui"],"propositions":[],"lastnames":["Zhou"],"suffixes":[]}],"title":"Identifying Vulnerable IoT Applications using Deep Learning","booktitle":"27th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2020, London, ON, Canada, February 18-21, 2020","pages":"582–586","publisher":"IEEE","year":"2020","url":"https://doi.org/10.1109/SANER48275.2020.9054817","doi":"10.1109/SANER48275.2020.9054817","timestamp":"Thu, 16 Apr 2020 16:27:40 +0200","biburl":"https://dblp.org/rec/conf/wcre/NaeemA20.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/wcre/NaeemA20,\n author = {Hajra Naeem and\n Manar H. Alalfi},\n editor = {Kostas Kontogiannis and\n Foutse Khomh and\n Alexander Chatzigeorgiou and\n Marios{-}Eleftherios Fokaefs and\n Minghui Zhou},\n title = {Identifying Vulnerable IoT Applications using Deep Learning},\n booktitle = {27th {IEEE} International Conference on Software Analysis, Evolution\n and Reengineering, {SANER} 2020, London, ON, Canada, February 18-21,\n 2020},\n pages = {582--586},\n publisher = {{IEEE}},\n year = {2020},\n url = {https://doi.org/10.1109/SANER48275.2020.9054817},\n doi = {10.1109/SANER48275.2020.9054817},\n timestamp = {Thu, 16 Apr 2020 16:27:40 +0200},\n biburl = {https://dblp.org/rec/conf/wcre/NaeemA20.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Naeem, H.","Alalfi, M. H."],"editor_short":["Kontogiannis, K.","Khomh, F.","Chatzigeorgiou, A.","Fokaefs, M.","Zhou, M."],"key":"DBLP:conf/wcre/NaeemA20","id":"DBLP:conf/wcre/NaeemA20","bibbaseid":"naeem-alalfi-identifyingvulnerableiotapplicationsusingdeeplearning-2020","role":"author","urls":{"Paper":"https://doi.org/10.1109/SANER48275.2020.9054817"},"metadata":{"authorlinks":{}},"downloads":5},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/49/2794.bib","creationDate":"2020-06-06T01:58:54.069Z","downloads":5,"keywords":[],"search_terms":["identifying","vulnerable","iot","applications","using","deep","learning","naeem","alalfi"],"title":"Identifying Vulnerable IoT Applications using Deep Learning","year":2020,"dataSources":["sruHQc7MdEddqHEe4","kFhnZvM2M4gH47q7m","YvA7tLzaGKJhgHx3u"]}