Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection., , and . EICC, page 159-166. ACM, (2023)QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit., , , and . NDSS, The Internet Society, (2021)Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating., , and . EuroS&P, page 184-197. IEEE, (2020)Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles., , , and . VNC, page 1-8. IEEE, (2018)#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones., , , and . ACM Trans. Priv. Secur., 24 (4): 31:1-31:34 (2021)Attacking Speaker Recognition Systems with Phoneme Morphing., , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 471-492. Springer, (2019)Safety vs. Security: Attacking Avionic Systems with Humans in the Loop., , , , and . CoRR, (2019)IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients., , , , , and . CoRR, (2020)QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband., , , and . CoRR, (2020)Firefly: Spoofing Earth Observation Satellite Data through Radio Overshadowing., , , , , and . SpaceSec, The Internet Society, (2023)