ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
9
views
0
references
Top references
cited by
1
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,251
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Another Supply Chain Mystery: IP Cameras Ship with Malicious Software
Author(s):
Publication date:
Read this article at
ScienceOpen
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Software for SAXS correction and analysis
Data availability:
Comments
Comment on this article
Sign in to comment
Similar content
4,251
Detecting malicious logins in enterprise networks using visualization
Authors:
Hossein Siadati
,
Bahador Saket
,
Nasir Memon
Using opcode-sequences to detect malicious Android applications
Authors:
Quentin Jerome
,
Kevin Allix
,
Radu State
…
Predicting Impending Exposure to Malicious Content from User Behavior
Authors:
Mahmood Sharif
,
Jumpei Urakawa
,
Nicolas Christin
…
See all similar
Cited by
1
The Security of IP-Based Video Surveillance Systems
Authors:
Naor Kalbo
,
Yisroel Mirsky
,
Asaf Shabtai
…
See all cited by