From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis of FHSS-type Drone Controller., , , , и . WISA, том 9503 из Lecture Notes in Computer Science, стр. 240-253. Springer, (2015)Frying PAN: Dissecting Customized Protocol for Personal Area Network., , , , и . WISA, том 9503 из Lecture Notes in Computer Science, стр. 300-312. Springer, (2015)Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4., , , , , и . WISEC, стр. 183-193. ACM, (2016)Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors., , , , , , , и . USENIX Security Symposium, стр. 881-896. USENIX Association, (2015)BurnFit: Analyzing and Exploiting Wearable Devices., , , и . WISA, том 9503 из Lecture Notes in Computer Science, стр. 227-239. Springer, (2015)