Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration')., , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 98-115. Springer, (2017)LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables Emission.. COMPSAC, page 745-754. IEEE, (2021)Analyzing users' web surfing patterns to trace terrorists and criminals., , , and . ISI, page 143-145. IEEE, (2013)HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature.. EISIC, page 94-100. IEEE, (2019)CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives.. COMPSAC, page 808-816. IEEE, (2020)Peers-Based Location of Mobile Devices., , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 439-445. Springer, (2014)LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED., , and . DIMVA, volume 10327 of Lecture Notes in Computer Science, page 161-184. Springer, (2017)JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface., , , and . TrustCom/BigDataSE/ISPA (1), page 65-73. IEEE, (2015)Personal Information Leakage During Password Recovery of Internet Services., , , and . EISIC, page 136-139. IEEE Computer Society, (2016)AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies., , , and . MALWARE, page 58-67. IEEE Computer Society, (2014)