From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PowerSpy: Location Tracking Using Mobile Device Power Analysis., , , , и . USENIX Security Symposium, стр. 785-800. USENIX Association, (2015)On the Fidelity of 802.11 Packet Traces., , и . PAM, том 4979 из Lecture Notes in Computer Science, стр. 132-141. Springer, (2008)Analysis of SSL certificate reissues and revocations in the wake of heartbleed., , , , , , и . Internet Measurement Conference, стр. 489-502. ACM, (2014)How to Find Correlated Internet Failures., , , , и . PAM, том 11419 из Lecture Notes in Computer Science, стр. 210-227. Springer, (2019)Home is where the hijacking is: understanding DNS interception by residential routers., , , , , , и . Internet Measurement Conference, стр. 390-397. ACM, (2021)PowerSpy: Location Tracking using Mobile Device Power Analysis., , , и . CoRR, (2015)Access Denied: Assessing Physical Risks to Internet Access Networks., , , , , , , , , и . USENIX Security Symposium, стр. 6877-6892. USENIX Association, (2023)Maranello: Practical Partial Packet Recovery for 802.11., , , , , , , , и . NSDI, стр. 205-218. USENIX Association, (2010)ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes., , , , , и . CoRR, (2021)Atomix: A Framework for Deploying Signal Processing Applications on Wireless Infrastructure., , и . NSDI, стр. 173-188. USENIX Association, (2015)