From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks., , , и . RTAS, стр. 103-116. IEEE, (2019)Physical-Layer Identification of Wired Ethernet Devices., , , и . IEEE Trans. Inf. Forensics Secur., 7 (4): 1339-1353 (2012)On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities., , , , и . CNS, стр. 1-6. IEEE, (2020)JCN October special issue on IoT security and privacy., , , и . J. Commun. Networks, 21 (5): 441-443 (2019)Survey of Control-flow Integrity Techniques for Real-time Embedded Systems., , и . ACM Trans. Embed. Comput. Syst., 21 (4): 41:1-41:32 (2022)A Game-Theoretic Approach and Evaluation of Adversarial Vehicular Platooning., , и . SCAV@CPSWeek, стр. 35-41. ACM, (2017)GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems., , и . CoRR, (2020)Intelligent Transportation System Security: Impact-Oriented Risk Assessment of in-Vehicle Networks., , , и . IEEE Intell. Transp. Syst. Mag., 13 (2): 91-104 (2021)Optimized trusted execution for hard real-time applications on COTS processors., , , , и . RTNS, стр. 50-60. ACM, (2019)Wireless Manipulation of Serial Communication., , , и . AsiaCCS, стр. 222-236. ACM, (2022)