From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints., , и . CoRR, (2017)Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3., , , , и . CoRR, (2017)TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition., , , , , и . MIST@CCS, стр. 45-56. ACM, (2017)Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications., , , , , и . Int. J. Inf. Sec., 20 (2): 181-197 (2021)Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques., , , , , , и . Int. J. Inf. Sec., 22 (6): 1665-1685 (декабря 2023)NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints., , и . ACM Trans. Priv. Secur., 24 (1): 2:1-2:35 (2020)SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems., , и . Int. J. Crit. Infrastructure Prot., (2021)Automatic Quantification of Cache Side-Channels., , и . CAV, том 7358 из Lecture Notes in Computer Science, стр. 564-580. Springer, (2012)Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies., , , , , и . ESORICS (2), том 11099 из Lecture Notes in Computer Science, стр. 373-392. Springer, (2018)FooBaR: Fault Fooling Backdoor Attack on Neural Network Training., , , и . CoRR, (2021)