(2022). Characterization and Evaluation of IoT Protocols for Data Exfiltration. IEEE Internet of Things Journal.

PDF Cite Code DOI

(2021). Evaluation of the Executional Power in Windows using Return Oriented Programming. IEEE Workshop on Offensive Technologies (WOOT).

PDF Cite Code Slides DOI

(2020). On Challenges in Verifying Trusted Executable Files in Memory Forensics. Forensic Science International: Digital Investigation.

PDF Cite Code Slides DOI