Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training., , and . ARES, page 147:1-147:10. ACM, (2021)On the weakness of contactless systems under relay attacks., , and . SoftCOM, page 1-5. IEEE, (2011)Minimization of energy consumption in passive HF contactless and RFID systems., , and . SoftCOM, page 1-5. IEEE, (2011)Detecting relay attacks in RFID systems using physical layer characteristics., , , , and . WMNC, page 1-8. IEEE, (2013)iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems., , , , , , and . J. Internet Serv. Inf. Secur., 12 (2): 70-94 (2022)MaDMAN: Detection of Software Attacks Targeting Hardware Vulnerabilities., , , and . DSD, page 355-362. IEEE, (2021)A Hybrid Solution for Constrained Devices to Detect Microarchitectural Attacks., , , and . EuroS&P Workshops, page 259-269. IEEE, (2023)Automated ICS template for STRIDE Microsoft Threat Modeling Tool., , , , and . ARES, page 118:1-118:7. ACM, (2023)PLC Logic-Based Cybersecurity Risks Identification for ICS., , , and . ARES, page 117:1-117:10. ACM, (2023)Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities., , , and . NEWCAS, page 1-4. IEEE, (2021)