From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Wireless Manipulation of Serial Communication., , , и . AsiaCCS, стр. 222-236. ACM, (2022)On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities., , , , и . CNS, стр. 1-6. IEEE, (2020)Physical-Layer Identification of Wired Ethernet Devices., , , и . IEEE Trans. Inf. Forensics Secur., 7 (4): 1339-1353 (2012)Intelligent Transportation System Security: Impact-Oriented Risk Assessment of in-Vehicle Networks., , , и . IEEE Intell. Transp. Syst. Mag., 13 (2): 91-104 (2021)On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks., , , и . RTAS, стр. 103-116. IEEE, (2019)A Game-Theoretic Approach and Evaluation of Adversarial Vehicular Platooning., , и . SCAV@CPSWeek, стр. 35-41. ACM, (2017)Optimized trusted execution for hard real-time applications on COTS processors., , , , и . RTNS, стр. 50-60. ACM, (2019)Towards physical layer identification of cognitive radio devices., , и . CNS, стр. 1-9. IEEE, (2017)On the Limitations of Obfuscating Redundant Circuits in Frustrating Hardware Trojan Implantation., , и . J. Hardw. Syst. Secur., 5 (1): 75-87 (2021)Better Side-Channel Attacks Through Measurements., и . ASHES@CCS, стр. 15-26. ACM, (2023)