Author of the publication

See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing.

, , , , , and . USENIX Security Symposium, page 1181-1198. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application layer switching: a deployable technique for providing quality of service., , and . GLOBECOM, page 3694-3699. IEEE, (2003)Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator., , , , , , , and . CoRR, (2018)Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems., , , , and . CoRR, (2018)An incrementally deployable energy efficient 802.15.4 MAC protocol (DEEP)., , , and . Ad Hoc Networks, 10 (7): 1238-1252 (2012)An 802.11 MAC layer covert channel., , , and . Wirel. Commun. Mob. Comput., 12 (5): 393-405 (2012)A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters., , and . IEEE Trans. Netw. Serv. Manag., 7 (4): 218-230 (2010)The case for collaborative distributed wireless intrusion detection systems., , and . GrC, page 782-787. IEEE, (2006)Using link RTT to passively detect unapproved wireless nodes., , and . Int. J. Secur. Networks, 4 (3): 153-163 (2009)Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid., , , and . IEEE Trans. Dependable Secur. Comput., 16 (6): 1026-1039 (2019)SOTA: Secure Over-the-Air Programming of IoT Devices., , , and . MILCOM, page 1-8. IEEE, (2018)