Author of the publication

Swords and shields: a study of mobile game hacks and existing defenses.

, , , , , and . ACSAC, page 386-397. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensetribute: smart home occupant identification via fusion across on-object sensing devices., , , , , and . BuildSys@SenSys, page 2:1-2:10. ACM, (2017)Using bluetooth low energy spoofing to dispute device details: demo., and . WiSec, page 340-342. ACM, (2019)Stochastic optimization of flow-jamming attacks in multichannel wireless networks., , and . ICC, page 2165-2170. IEEE, (2013)Towards secure multi-path routing for wireless mobile ad-hoc networks: A cross-layer strategy., and . SECON, page 146-148. IEEE, (2011)Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponents., and . Pervasive Mob. Comput., (2014)Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection., and . PECCS, page 431-439. SciTePress, (2012)Throughput optimization for multipath unicast routing under probabilistic jamming., , , , and . PIMRC, page 1-5. IEEE, (2008)XRec: Behavior-Based User Recognition Across Mobile Devices., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (3): 111:1-111:26 (2017)Pitchln: eavesdropping via intelligible speech reconstruction using non-acoustic sensor fusion., , and . IPSN, page 181-192. ACM, (2017)Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis., , , and . IEEE Trans. Dependable Secur. Comput., 6 (2): 111-123 (2009)