Author of the publication

On the Applicability of Satellite-Based Air Traffic Control Communication for Security.

, , , , and . IEEE Commun. Mag., 57 (9): 79-85 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020., , and . CoRR, (2020)Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating., , and . EuroS&P, page 184-197. IEEE, (2020)#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones., , , and . ACM Trans. Priv. Secur., 24 (4): 31:1-31:34 (2021)On the Applicability of Satellite-Based Air Traffic Control Communication for Security., , , , and . IEEE Commun. Mag., 57 (9): 79-85 (2019)Attacking Speaker Recognition Systems with Phoneme Morphing., , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 471-492. Springer, (2019)Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles., , , and . VNC, page 1-8. IEEE, (2018)IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients., , , , , and . CoRR, (2020)QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband., , , and . CoRR, (2020)Safety vs. Security: Attacking Avionic Systems with Humans in the Loop., , , , and . CoRR, (2019)RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection., , and . EICC, page 159-166. ACM, (2023)