Author of the publication

Rogue Z-Wave controllers: A persistent attack channel.

, and . LCN Workshops, page 734-741. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PHY foundation for multi-factor ZigBee node authentication., , and . GLOBECOM, page 795-800. IEEE, (2012)Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation., , , and . IEEE Trans. Dependable Secur. Comput., 12 (5): 585-596 (2015)An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols., , and . Int. J. Netw. Secur., 18 (4): 667-677 (2016)Misuse-based detection of Z-Wave network attacks., , , and . Comput. Secur., (2017)Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks., , , and . IPCCC, page 469-474. IEEE Computer Society, (2008)An RF-DNA verification process for ZigBee networks., , and . MILCOM, page 1-6. IEEE, (2012)Evaluating the readiness of cyber first responders responsible for critical infrastructure protection., , , , and . Int. J. Crit. Infrastructure Prot., (2016)Comparison of High-end and Low-end Receivers for RF-DNA Fingerprinting., , and . MILCOM, page 24-29. IEEE, (2014)Watching for Weakness in Wild WPANs., , , and . MILCOM, page 1404-1409. IEEE, (2013)ZigBee Device Verification for Securing Industrial Control and Building Automation Systems., , and . Critical Infrastructure Protection, volume 417 of IFIP Advances in Information and Communication Technology, page 47-62. Springer, (2013)