Author of the publication

Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.

, , , , , and . MobiCom, page 375-386. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Role of Flows and Sessions in Internet Traffic Modeling: An Explorative Toy-Model., , , , , and . GLOBECOM, page 1-8. IEEE, (2009)On Wireless Links for Vehicle-to-Infrastructure Communications., , , , , and . IEEE Trans. Vehicular Technology, 59 (1): 269-282 (2010)Bottleneck Detection via Aggregate Rate Analysis : A Real Case in a 3G Network., and . NOMS, IEEE, (2006)Traffic Handling in AQUILA QoS IP Network., , , , and . QofIS, volume 2156 of Lecture Notes in Computer Science, page 243-260. Springer, (2001)Performance Evaluation of a Distributed Scheme for Protection against Single and Double Faults for MPLS., , , and . QoS-IP, volume 2601 of Lecture Notes in Computer Science, page 218-232. Springer, (2003)Scanning Traffic at the Edge of a Cellular Network., and . PAM, volume 4427 of Lecture Notes in Computer Science, page 269-272. Springer, (2007)Cellular data meet vehicular traffic theory: location area updates and cell transitions for travel time estimation., , , , and . UbiComp, page 361-370. ACM, (2012)On the estimation of link delay distributions by cumulant-based moment matching., and . Internet Technol. Lett., (2018)On Integrating a Proprietary and a Commercial Architecture for Optimal BIST Performances in SoCs., , , , , , and . ICCD, page 539-540. IEEE Computer Society, (2000)Embedded SW Design Issues for Distributed Applications on Mobile Terminals., , , , and . MobiQuitous, page 507-509. IEEE Computer Society, (2005)