Author of the publication

Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices.

, , and . IEEE Secur. Priv., 17 (5): 10-21 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security & Privacy in Smart Toys., and . IoT S&P@CCS, page 19-24. ACM, (2017)Improving the Security of Visual Challenges., , , , and . ACM Trans. Cyber Phys. Syst., 3 (3): 34:1-34:26 (2019)Using Visual Challenges to Verify the Integrity of Security Cameras., and . ACSAC, page 141-150. ACM, (2015)Limiting the Impact of Stealthy Attacks on Industrial Control Systems., , , , , , , , and . CCS, page 1092-1105. ACM, (2016)DIVAs 4.0: A Multi-Agent Based Simulation Framework., , , , and . DS-RT, page 105-114. IEEE Computer Society, (2013)Remote Proofs of Video Freshness for Public Spaces., and . CPS-SPC@CCS, page 111-122. ACM, (2017)DIVAs 4.0: a framework for the development of situated multi-agent based simulation systems., , , , and . AAMAS, page 1351-1352. IFAAMAS, (2013)Privacy and Security in Internet-Connected Cameras., , and . ICIOT, page 173-180. IEEE, (2019)Cyber-Physical Systems Attestation., , and . DCOSS, page 354-357. IEEE Computer Society, (2014)Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices., , and . IEEE Secur. Priv., 17 (5): 10-21 (2019)