no code implementations • 22 Mar 2023 • Volviane Saphir Mfogo, Alain Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles Kamhoua
In this paper, we propose a honeypot for IoT devices that uses machine learning techniques to learn and interact with attackers automatically.
1 code implementation • 6 Apr 2019 • Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains.
Cryptography and Security