Citation Impact

Citing Papers

Understanding the mirai botnet
2017
Internet of Things is a revolutionary approach for future technology enhancement: a review
2019 Standout
The industrial internet of things (IIoT): An analysis framework
2018 Standout
Cyber–Physical System Security for the Electric Power Grid
2011 Standout
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
2017 Standout
An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks
2019
Cyber–Physical Security of a Smart Grid Infrastructure
2011 Standout
A Survey on the Edge Computing for the Internet of Things
2017 Standout
Industrial Internet-of-Things Security Enhanced With Deep Learning Approaches for Smart Cities
2020 Standout
A Survey on Metaverse: Fundamentals, Security, and Privacy
2022 Standout
Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing
2017 Standout
Secure integration of IoT and Cloud Computing
2016 Standout
Toward trusted wireless sensor networks
2010
On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration
2017 Standout
Adaptive Federated Learning in Resource Constrained Edge Computing Systems
2019 Standout
Towards Multistep Electricity Prices in Smart Grid Electricity Markets
2015
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
2019
Fog and IoT: An Overview of Research Opportunities
2016 Standout
Collaborative Cloud and Edge Computing for Latency Minimization
2019 Standout
Cumulative Attestation Kernels for Embedded Systems
2012
A Survey on Mobile Edge Computing: The Communication Perspective
2017 Standout

Works of Aurélien Francillon being referenced

A minimalist approach to remote attestation
2014
Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares
2014
A minimalist approach to Remote Attestation
2014
Code injection attacks on harvard-architecture devices
2008
A Large-Scale Analysis of the Security of Embedded Firmwares
2014
Automated Dynamic Firmware Analysis at Scale
2016
Rankless by CCL
2026