From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attacks on public WLAN-based positioning systems., , , и . MobiSys, стр. 29-40. ACM, (2009)Multi-receiver GPS spoofing detection: error models and realization., , и . ACSAC, стр. 237-250. ACM, (2016)Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET., , , , и . SG-CRC, том 14 из Cryptology and Information Security Series, стр. 123-130. IOS Press, (2016)Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android., , и . NDSS, The Internet Society, (2019)Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge., , , , и . ACNS, том 13269 из Lecture Notes in Computer Science, стр. 170-192. Springer, (2022)Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks., и . ACSAC, стр. 412-426. ACM, (2022)Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems., , , , , , и . ACSAC, стр. 480-495. ACM, (2020)Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System., , , , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 415-432. Springer, (2012)Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot., , и . CoRR, (2018)Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios., , , и . ESORICS (2), том 10493 из Lecture Notes in Computer Science, стр. 247-264. Springer, (2017)