Author of the publication

Security Assessment of the Image-Based Authentication Using Screen-Capture Tools.

, , , , and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 156-161. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System., , , and . BWCCA, volume 186 of Lecture Notes on Data Engineering and Communications Technologies, page 302-311. Springer, (2023)Hardware-Software Interworking Real-Time V2X Dynamic Analysis Method., , , and . BWCCA, volume 570 of Lecture Notes in Networks and Systems, page 215-223. Springer, (2022)Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime., , , , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 457-467. Springer, (2020)Cyber Attack Scenarios in Cooperative Automated Driving., , , , , and . BWCCA, volume 159 of Lecture Notes in Networks and Systems, page 416-425. Springer, (2020)In-vehicle Network IDS Using Message Time Interval Infrastructure., , , , and . BWCCA, volume 346 of Lecture Notes in Networks and Systems, page 111-119. Springer, (2021)SPEC: Frame Filtering for CAN Protocol on ECU., , , , and . BWCCA, volume 346 of Lecture Notes in Networks and Systems, page 284-293. Springer, (2021)Artifact Extraction Methods for In-Vehicle Infotainment System., , , and . INCoS, volume 182 of Lecture Notes on Data Engineering and Communications Technologies, page 68-78. Springer, (2023)Design and Implementation of a Novel Testbed for Automotive Security Analysis., , , , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 234-243. Springer, (2020)Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface., , , , , and . IMIS, volume 773 of Advances in Intelligent Systems and Computing, page 212-219. Springer, (2018)Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network., , , , and . IMIS, volume 496 of Lecture Notes in Networks and Systems, page 97-107. Springer, (2022)