Author of the publication

Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses.

, , , and . PerCom Workshops, page 279-284. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beamforming and Scheduling for mmWave Downlink Sparse Virtual Channels with Non-Orthogonal and Orthogonal Multiple Access., and . VTC Fall, page 1-6. IEEE, (2017)Interference Prediction for Low-Complexity Link Adaptation in Beyond 5G Ultra-Reliable Low-Latency Communications., , , , and . CoRR, (2021)Towards An Enhanced Reputation System for IOTA's Coordicide., , , and . BCCA, page 26-33. IEEE, (2021)EVScout2.0: Electric Vehicle Profiling Through Charging Profile., , , and . CoRR, (2021)Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions., , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 67-80. Springer, (2022)Obfuscated Location Disclosure for Remote ID Enabled Drones., , , and . CoRR, (2024)LoVe is in the Air - Location Verification of ADS-B Signals using Distributed Public Sensors., , , , , and . ICC, page 6040-6045. IEEE, (2023)GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction., , , , and . ESORICS (1), volume 14982 of Lecture Notes in Computer Science, page 374-393. Springer, (2024)ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning., , , and . SAS, page 1-6. IEEE, (2023)Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering., , , , and . M&N, page 1-6. IEEE, (2022)