From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Establishing and Maintaining Trust in a Mobile Device., , и . IT Prof., 17 (6): 66-68 (2015)A Passive Approach to Wireless NIC Identification., , и . ICC, стр. 2329-2334. IEEE, (2006)Constructing timing-based covert channels in mobile networks by adjusting CPU frequency., , , и . HASP@ISCA, стр. 2:1-2:8. ACM, (2014)A Wired-Side Approach to MAC Misbehavior Detection., , и . ICC, стр. 1-6. IEEE, (2010)A passive approach to wireless device fingerprinting., , и . DSN, стр. 383-392. IEEE Computer Society, (2010)Countering Intelligent Jamming with Full Protocol Stack Agility., , , и . IEEE Secur. Priv., 12 (2): 44-50 (2014)A passive technique for fingerprinting wireless devices with Wired-side Observations., , , , и . CNS, стр. 305-313. IEEE, (2013)Fighting banking botnets by exploiting inherent command and control vulnerabilities., , , и . MALWARE, стр. 93-100. IEEE Computer Society, (2014)Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments., , и . GridNets, стр. 16. ICST, (2007)A Passive Approach to Rogue Access Point Detection., , и . GLOBECOM, стр. 355-360. IEEE, (2007)