Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LoSeRO: a locality sensitive routing protocol in opportunistic networks., , , and . SAC, page 644-650. ACM, (2016)IoTScanner: Detecting Privacy Threats in IoT Neighborhoods., , and . IoTPTS@AsiaCCS, page 23-30. ACM, (2017)IoTPerimeter: A Passive Fingerprinting of Smart Environment using Graph-based Features., and . COMSNETS, page 59-63. IEEE, (2021)POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?, and . AsiaCCS, ACM, (2024)LoSeRO: A Locality Sensitive Routing Protocol in Opportunistic Networks with Contact Profiles., , , and . IEEE Trans. Mob. Comput., 19 (10): 2392-2408 (2020)IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operational Phase Using Payload Fuzzing., , and . CODASPY, page 171-173. ACM, (2024)POSTER: Using Directional Antennas for Epidemic Routing in DTNs in Practice., , and . ICDCN, volume 7730 of Lecture Notes in Computer Science, page 458-460. Springer, (2013)On the broadcast of segmented messages in dynamic networks., , , , , , and . INFOCOM Workshops, page 426-431. IEEE, (2015)Analyzing the performance of epidemic broadcasting in DTNs using directional antenna., , and . COMSNETS, page 1-10. IEEE, (2013)WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic., , and . WISEC, page 51-62. ACM, (2018)