Search Results - "Minn, Wei"

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Fuzzing drones for anomaly detection: A systematic literature review by Malviya, Vikas K., Minn, Wei, Shar, Lwin Khin, Jiang, Lingxiao

    Published in Computers & security (01-01-2025)
    “…Drones, also referred to as Unmanned Aerial Vehicles (UAVs), are becoming popular today due to their uses in different fields and recent technological…”
    Get full text
    Journal Article
  2. 2

    DronLomaly: Runtime Detection of Anomalous Drone Behaviors via Log Analysis and Deep Learning by Shar, Lwin Khin, Minn, Wei, Ta, Nguyen Binh Duong, Fan, Jiani, Jiang, Lingxiao, Kiat, Daniel Lim Wai

    “…Drones are increasingly popular and getting used in a variety of missions such as area surveillance, pipeline inspection, cinematography, etc. While the drone…”
    Get full text
    Conference Proceeding
  3. 3

    SmartFuzz: An Automated Smart Fuzzing Approach for Testing SmartThings Apps by Shar, Lwin Khin, Binh Duong, Ta Nguyen, Jiang, Lingxiao, Lo, David, Minn, Wei, Yong Yeo, Glenn Kiah, Kim, Eugene

    “…As IoT ecosystem has been fast-growing recently, there have been various security concerns of this new computing paradigm. Malicious IoT apps gaining access to…”
    Get full text
    Conference Proceeding
  4. 4

    DronLomaly: Runtime Log-Based Anomaly Detector for DJI Drones by Minn, Wei, Tun, Yan Naing, Shar, Lwin Khin, Jiang, Lingxiao

    “…We present an automated tool for realtime detection of anomalous behaviors while a DJI drone is executing a flight mission. The tool takes sensor data logged…”
    Get full text
    Conference Proceeding
  5. 5

    Experimental Comparison of Features and Classifiers for Android Malware Detection by Shar, Lwin Khin, Demissie, Biniam Fisseha, Ceccato, Mariano, Minn, Wei

    “…Android platform has dominated the smart phone market for years now and, consequently, gained a lot of attention from attackers. Malicious apps (malware) pose…”
    Get full text
    Conference Proceeding