From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy., , , и . CoRR, (2020)Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET., , , , и . SG-CRC, том 14 из Cryptology and Information Security Series, стр. 123-130. IOS Press, (2016)Multi-receiver GPS spoofing detection: error models and realization., , и . ACSAC, стр. 237-250. ACM, (2016)Attacks on public WLAN-based positioning systems., , , и . MobiSys, стр. 29-40. ACM, (2009)Physical-layer integrity for wireless messages., , и . Comput. Networks, (2016)Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System., , , , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 415-432. Springer, (2012)Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge., , , , и . ACNS, том 13269 из Lecture Notes in Computer Science, стр. 170-192. Springer, (2022)Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android., , и . NDSS, The Internet Society, (2019)Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems., , , , , , и . ACSAC, стр. 480-495. ACM, (2020)Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks., и . ACSAC, стр. 412-426. ACM, (2022)