Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices., , , , and . SCVT, page 1-6. IEEE, (2017)Experimentally detecting IEEE 802.11n Wi-Fi based on cyclostationarity features for ultra-wide band cognitive radios., , and . PIMRC, page 2315-2319. IEEE, (2009)Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns., , , , , and . Sensors, 17 (4): 783 (2017)Detection of DECT identity spoofing through radio frequency fingerprinting., , , and . MIPRO, page 1296-1301. IEEE, (2015)A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components., and . IEEE Commun. Surv. Tutorials, 19 (3): 1761-1789 (2017)Future evolution of public safety communications in the 5G Era., , , , , and . Trans. Emerg. Telecommun. Technol., (2017)Physical layer authentication of Internet of Things wireless devices using convolutional neural networks and recurrence plots., , and . Internet Technol. Lett., (2019)Design of a Robust Cognitive Control Channel for Cognitive Radio Networks Based on Ultra Wideband Pulse Shaped Signal., and . MACOM, volume 6886 of Lecture Notes in Computer Science, page 13-23. Springer, (2011)Distributed access control policies for spectrum sharing., , , and . Secur. Commun. Networks, 6 (8): 925-935 (2013)SecKit: A Model-based Security Toolkit for the Internet of Things., , , and . Comput. Secur., (2015)