Author of the publication

Covert Channel-Based Transmitter Authentication in Controller Area Networks.

, , , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2665-2679 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ContextOS: A Context Aware Operating System for Mobile Devices., , and . GreenCom/iThings/CPScom, page 976-984. IEEE, (2013)Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features., , , , , and . CoRR, (2019)SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices., , , and . CoRR, (2019)MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities., , and . STM, volume 8203 of Lecture Notes in Computer Science, page 65-81. Springer, (2013)Windows Mobile LiveSD Forensics., , , and . J. Netw. Comput. Appl., 36 (2): 677-684 (2013)A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems., , , and . CoRR, (2020)TANGO: A temporal spatial dynamic graph model for event prediction., , , and . Neurocomputing, (July 2023)Online Advertising Security: Issues, Taxonomy, and Future Directions., , , and . IEEE Commun. Surv. Tutorials, 23 (4): 2494-2524 (2021)Penetration Testing of 5G Core Network Web Technologies., , , , and . CoRR, (2024)Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training., , , , and . CoRR, (2022)