Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-User Multi-Device-Aware Access Control System for Smart Home., , , , , , , and . CoRR, (2019)Dynamically detecting USB attacks in hardware: poster., , , and . WiSec, page 328-329. ACM, (2019)CSPoweR-Watch: A Cyber-Resilient Residential Power Management System., , , , , , and . iThings/GreenCom/CPSCom/SmartData, page 768-775. IEEE, (2019)Real-time Analysis of Privacy-(un)aware IoT Applications., , , and . Proc. Priv. Enhancing Technol., 2021 (1): 145-166 (2021)CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice., , and . IEEE Trans. Inf. Forensics Secur., (2021)RøB: Ransomware over Modern Web Browsers., , , , , and . USENIX Security Symposium, page 7073-7090. USENIX Association, (2023)A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case., , and . CoRR, (2019)A digital forensics framework for smart settings: poster., , , and . WiSec, page 332-333. ACM, (2019)A survey on security and privacy issues of UAVs., , , , , , and . Comput. Networks, (April 2023)Aegis: a context-aware security framework for smart home systems., , , and . ACSAC, page 28-41. ACM, (2019)