From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems., , , , и . WOOT, USENIX Association, (2016)Frying PAN: Dissecting Customized Protocol for Personal Area Network., , , , и . WISA, том 9503 из Lecture Notes in Computer Science, стр. 300-312. Springer, (2015)Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack., , , , и . WISA, том 10144 из Lecture Notes in Computer Science, стр. 124-135. (2016)Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin., , , , и . CCS, стр. 195-209. ACM, (2017)Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4., , , , , и . WISEC, стр. 183-193. ACM, (2016)An Approach for PAPR Reduction Based on Tone Reservation Method., , и . CCNC, стр. 1-2. IEEE, (2009)Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors., , , , , , , и . USENIX Security Symposium, стр. 881-896. USENIX Association, (2015)This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump., , , , и . WOOT, USENIX Association, (2016)An Efficient Hardware Simulator for the Design of a WCDMA Interference Cancellation Repeater., , , , , и . VTC Fall, стр. 1-6. IEEE, (2008)