Author of the publication

Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.

, , , , , and . MobiCom, page 375-386. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High Data Throughput Exfiltration Through Video Cable Emanations., , and . CRITIS, volume 13723 of Lecture Notes in Computer Science, page 27-48. Springer, (2022)Preoperative Prediction of Lymph Node Metastasis from Clinical DCE MRI of the Primary Breast Tumor Using a 4D CNN., , , , , , , , and . MICCAI (2), volume 12262 of Lecture Notes in Computer Science, page 326-334. Springer, (2020)Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband., , , and . WiSec, page 277-284. ACM, (2019)Digital radio signal cancellation attacks: an experimental evaluation., , and . WiSec, page 23-33. ACM, (2019)Evaluation of structure-derived pharmacophore of soluble epoxide hydrolase inhibitors by virtual screening, , , , , and . Bioorganic & Medicinal Chemistry Letters, 22 (21): 6762 - 6765 (2012)Design of dual ligands using excessive pharmacophore query alignment., , , , , , , , and . J. Cheminformatics, 4 (S-1): 11 (2012)You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications., , , , , and . CPSS@AsiaCCS, page 53-64. ACM, (2021)A Tale of Sea and Sky On the Security of Maritime VSAT Communications., , , , and . SP, page 1384-1400. IEEE, (2020)A smart alarm for particle accelerator beamline operations., , , , , , and . Mach. Learn. Sci. Technol., 4 (1): 15021 (March 2023)