From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

WACA: Wearable-Assisted Continuous Authentication., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 264-269. IEEE Computer Society, (2018)An Analysis of Malware Trends in Enterprise Networks., , , и . ISC, том 11723 из Lecture Notes in Computer Science, стр. 360-380. Springer, (2019)HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices., , , и . CNS, стр. 1-9. IEEE, (2020)Attacking HDMI distribution networks: poster., , , и . WiSec, стр. 326-327. ACM, (2019)Identifying counterfeit smart grid devices: A lightweight system level framework., , и . ICC, стр. 1-6. IEEE, (2017)Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems., , , , и . CNS, стр. 1-7. IEEE, (2019)6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices., , и . USENIX Security Symposium, стр. 397-414. USENIX Association, (2017)A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks., , и . NDSS, The Internet Society, (2022)In-Browser Cryptomining for Good: An Untold Story., , , , и . DAPPS, стр. 20-29. IEEE, (2021)Kratos: multi-user multi-device-aware access control system for the smart home., , , , , , , и . WISEC, стр. 1-12. ACM, (2020)