Author of the publication

Unintended Certificate Installation into Remote IoT Nodes.

, , , , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 845-854. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on Signature Verification Process for the Firmware of an Android Platform., , , , and . IMIS, volume 773 of Advances in Intelligent Systems and Computing, page 540-545. Springer, (2018)Unintended Certificate Installation into Remote IoT Nodes., , , , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 845-854. Springer, (2019)A Technical Survey on Methods for Detecting Rogue Access Points., , , , , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 215-226. Springer, (2019)Individually Separated Wireless Access Point to Protect User's Private Information., and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 589-596. Springer, (2019)Wavelet Transform Based PID Sequence Analysis for IDS on CAN Protocol., , , , and . IMIS, volume 496 of Lecture Notes in Networks and Systems, page 85-96. Springer, (2022)Design and Implementation of a Novel Testbed for Automotive Security Analysis., , , , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 234-243. Springer, (2020)Vulnerability Analysis of Secure Disk: Based on Backup Feature of Product A., , and . BWCCA, volume 12 of Lecture Notes on Data Engineering and Communications Technologies, page 386-391. Springer, (2017)Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies., , , , and . IEEE Access, (2024)Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime., , , , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 457-467. Springer, (2020)In-vehicle Network IDS Using Message Time Interval Infrastructure., , , , and . BWCCA, volume 346 of Lecture Notes in Networks and Systems, page 111-119. Springer, (2021)