Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework., , , , and . SecureComm (1), volume 304 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 126-146. Springer, (2019)A Cost-efficient IoT Forensics Framework with Blockchain., , , , , and . CoRR, (2020)Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices., , , , , and . ICC, page 1-7. IEEE, (2020)Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques., , , and . ICC, page 1-6. IEEE, (2018)A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications., , , , and . CoRR, (2018)Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks., , and . IEEE Trans. Parallel Distributed Syst., 24 (4): 803-813 (2013)Assessing the overhead of authentication during SDN-enabled restoration of smart grid inter-substation communications., , , and . CCNC, page 1-6. IEEE, (2018)LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit., , , , and . ESORICS (2), volume 12309 of Lecture Notes in Computer Science, page 734-755. Springer, (2020)Identification of Wearable Devices with Bluetooth., , and . IEEE Trans. Sustain. Comput., 6 (2): 221-230 (2021)PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings., , , , and . BuildSys@SenSys, page 130-139. ACM, (2020)