Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards., , , and . SP, page 3061-3078. IEEE, (2023)Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach., , , , , and . Internet Measurement Conference, page 267-279. ACM, (2019)Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices., , , and . PerCom, page 114-124. IEEE, (2024)Rapid IoT device identification at the edge., , and . DistributedML@CoNEXT, page 22-28. ACM, (2021)COPSEC: Compliance-Oriented IoT Security and Privacy Evaluation Framework., , , and . MobiCom, page 140:1-140:3. ACM, (2023)Experience: Implications of Roaming in Europe., , , , , , , , , and 1 other author(s). MobiCom, page 179-189. ACM, (2018)When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers., , , , , and . Proc. Priv. Enhancing Technol., 2020 (4): 255-276 (2020)Towards Automatic Identification and Blocking of Non-Critical IoT Traffic Destinations., , , , and . CoRR, (2020)Blocking without Breaking: Identification and Mitigation of Non-Essential IoT Traffic., , , , , and . CoRR, (2021)The Case for Retraining of ML Models for IoT Device Identification at the Edge., , , , , , , and . CoRR, (2020)