Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of DECT identity spoofing through radio frequency fingerprinting., , , and . MIPRO, page 1296-1301. IEEE, (2015)The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices., , , , and . SCVT, page 1-6. IEEE, (2017)Future evolution of public safety communications in the 5G Era., , , , , and . Trans. Emerg. Telecommun. Technol., (2017)SecKit: A Model-based Security Toolkit for the Internet of Things., , , and . Comput. Secur., (2015)Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns., , , , , and . Sensors, 17 (4): 783 (2017)Design of a Robust Cognitive Control Channel for Cognitive Radio Networks Based on Ultra Wideband Pulse Shaped Signal., and . MACOM, volume 6886 of Lecture Notes in Computer Science, page 13-23. Springer, (2011)Experimentally detecting IEEE 802.11n Wi-Fi based on cyclostationarity features for ultra-wide band cognitive radios., , and . PIMRC, page 2315-2319. IEEE, (2009)Physical layer authentication of Internet of Things wireless devices using convolutional neural networks and recurrence plots., , and . Internet Technol. Lett., (2019)A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components., and . IEEE Commun. Surv. Tutorials, 19 (3): 1761-1789 (2017)Distributed access control policies for spectrum sharing., , , and . Secur. Commun. Networks, 6 (8): 925-935 (2013)