Author of the publication

A Novel Behavior-Based Tracking Attack for User Identification.

, , , , and . CBD, page 227-233. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Malware Leveraging the Android Accessibility Framework., , , , and . MobiQuitous, volume 131 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 512-523. Springer, (2013)FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices., , , , and . Future Gener. Comput. Syst., (2020)Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks., , , , , , and . NDSS, The Internet Society, (2023)Lightweight Gesture Based Trigger-Action Programming for Home Internet-of-Things., , , , and . CSCWD, page 959-964. IEEE, (2023)Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes., , , , , , and . J. Syst. Archit., (2021)An HMM Approach to Anonymity Analysis of Continuous Mixes., , and . APWeb Workshops, volume 4977 of Lecture Notes in Computer Science, page 232-243. Springer, (2008)An End-to-End View of IoT Security and Privacy., , , , and . GLOBECOM, page 1-7. IEEE, (2017)Extensive analysis and large-scale empirical evaluation of tor bridge discovery., , , , and . INFOCOM, page 2381-2389. IEEE, (2012)A novel packet size based covert channel attack against anonymizer., , , , and . INFOCOM, page 186-190. IEEE, (2011)A Novel Behavior-Based Tracking Attack for User Identification., , , , and . CBD, page 227-233. IEEE Computer Society, (2015)