Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets., , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 346-362. Springer, (2018)ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices., , , , , and . WISEC, page 89-100. ACM, (2024)Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications., and . ACSAC, page 900-915. ACM, (2021)UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework., , , , , and . WISEC, page 121-132. ACM, (2023)Detecting GPS Jamming Incidents in OpenSky Data., , and . OpenSky, volume 67 of EPiC Series in Computing, page 97-108. EasyChair, (2019)Hope of Delivery: Extracting User Locations From Mobile Instant Messengers., , , and . NDSS, The Internet Society, (2023)Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks., , , , and . ICETE (2), page 219-229. SciTePress, (2018)Hope of Delivery: Extracting User Locations From Mobile Instant Messengers., , , and . CoRR, (2022)Using side channel TCP features for real-time detection of malware connections., , , , and . J. Comput. Secur., 27 (5): 507-520 (2019)Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings., , , and . USENIX Security Symposium, page 2151-2168. USENIX Association, (2023)