Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns., , , , , and . Sensors, 17 (4): 783 (2017)Design of a Robust Cognitive Control Channel for Cognitive Radio Networks Based on Ultra Wideband Pulse Shaped Signal., and . MACOM, volume 6886 of Lecture Notes in Computer Science, page 13-23. Springer, (2011)Distributed access control policies for spectrum sharing., , , and . Secur. Commun. Networks, 6 (8): 925-935 (2013)VetaDetect: Vehicle tampering detection with closed-loop model ensemble., , , , , and . Int. J. Crit. Infrastructure Prot., (2022)An emergency communication system based on software-defined radio., , , , and . EURASIP J. Wirel. Commun. Netw., (2014)Physical layer authentication of Internet of Things wireless devices using convolutional neural networks and recurrence plots., , and . Internet Technol. Lett., (2019)Future evolution of public safety communications in the 5G Era., , , , , and . Trans. Emerg. Telecommun. Technol., (2017)SecKit: A Model-based Security Toolkit for the Internet of Things., , , and . Comput. Secur., (2015)A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components., and . IEEE Commun. Surv. Tutorials, 19 (3): 1761-1789 (2017)Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios., , , and . Secur. Commun. Networks, 8 (3): 403-417 (2015)