Author of the publication

Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise.

, , and . Comput. Secur., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Deviations in Mobile Applications Network Behavior, , , , and . CoRR, (2012)Quantifying the resilience of machine learning classifiers used for cyber security., and . Expert Syst. Appl., (2018)Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup., , , and . CoRR, (2019)Drones' Cryptanalysis - Smashing Cryptography with a Flicker., , , and . IEEE Symposium on Security and Privacy, page 1397-1414. IEEE, (2019)Leaking data from enterprise networks using a compromised smartwatch device., , and . SAC, page 741-750. ACM, (2018)Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs., , , , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 223-237. Springer, (2011)9-1-1 DDoS: Attacks, Analysis and Mitigation., , and . EuroS&P, page 218-232. IEEE, (2017)Speaker-to-speaker covert ultrasonic communication., , and . J. Inf. Secur. Appl., (2020)Securing Android-Powered Mobile Devices Using SELinux., , and . IEEE Secur. Priv., 8 (3): 36-44 (2010)PIT: A Probe Into Internet of Things by Comprehensive Security Analysis., , , and . TrustCom/BigDataSE, page 522-529. IEEE, (2019)