Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BloodHound: Early Detection and Identification of Jamming at the PHY-layer., , and . CCNC, page 1033-1041. IEEE, (2023)PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis., , , and . Comput. Networks, (2020)MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions., , , and . CoRR, (2020)Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques., , , , and . VTC Spring, page 634-638. IEEE, (2007)Freedom of speech: thwarting jammers via a probabilistic approach., and . WISEC, page 4:1-4:6. ACM, (2015)Jamming mitigation in cognitive radio networks., and . IEEE Netw., 27 (3): 10-15 (2013)Energy-Harvesting Based Jammer Localization: A Battery-Free Approach in Wireless Sensor Networks., , , , and . GLOBECOM, page 6212-6217. IEEE, (2022)N-Guard: a Solution to Secure Access to NFC tags., , , and . CNS, page 1-9. IEEE, (2018)Key is in the Air: Hacking Remote Keyless Entry Systems., , , and . ISSA/CSITS@ESORICS, volume 11552 of Lecture Notes in Computer Science, page 125-132. Springer, (2018)BrokenStrokes: On the (in)Security of Wireless Keyboards., , , and . CoRR, (2019)