Author of the publication

Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study.

, , , , , and . IEEE Communications Magazine, 55 (3): 132-137 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress)., , and . ICSSA, page 34-37. IEEE, (2018)A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systems., , , and . Electron. Gov. an Int. J., 6 (1): 19-40 (2009)AVDL: A highly adaptable architecture view description language., and . J. Syst. Softw., 79 (8): 1180-1206 (2006)Computing Security Scores for IoT Device Vulnerabilities., , and . ICSSA, page 52-59. IEEE, (2019)Contrology - An Ontology-Based Cloud Assurance Approach., , and . WETICE, page 105-107. IEEE Computer Society, (2015)Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security Patterns., and . ARES, page 486-492. IEEE Computer Society, (2015)KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services., , and . IMCOM, page 20:1-20:6. ACM, (2015)A Methodology for Mining Security Tactics from Security Patterns., , and . HICSS, page 1-5. IEEE Computer Society, (2010)A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies., , , and . Int. J. Mob. Commun., 7 (2): 253-267 (2009)A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions., , , , and . J. Comput. Sci. Eng., (2015)