Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives.. COMPSAC, page 808-816. IEEE, (2020)LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables Emission.. COMPSAC, page 745-754. IEEE, (2021)HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature.. EISIC, page 94-100. IEEE, (2019)Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration')., , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 98-115. Springer, (2017)LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED., , and . DIMVA, volume 10327 of Lecture Notes in Computer Science, page 161-184. Springer, (2017)Peers-Based Location of Mobile Devices., , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 439-445. Springer, (2014)Analyzing users' web surfing patterns to trace terrorists and criminals., , , and . ISI, page 143-145. IEEE, (2013)AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies., , , and . MALWARE, page 58-67. IEEE Computer Society, (2014)Personal Information Leakage During Password Recovery of Internet Services., , , and . EISIC, page 136-139. IEEE Computer Society, (2016)JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface., , , and . TrustCom/BigDataSE/ISPA (1), page 65-73. IEEE, (2015)