From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

BadVoice: Soundless voice-control replay attack on modern smartphones., , , и . ICUFN, стр. 882-887. IEEE, (2016)A Practical Security Architecture for In-Vehicle CAN-FD., , , и . IEEE Trans. Intell. Transp. Syst., 17 (8): 2248-2261 (2016)RIDAS: Real-time identification of attack sources on controller area networks., , , , , и . USENIX Security Symposium, стр. 6911-6928. USENIX Association, (2023)Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol., , и . Comput. Secur., (марта 2023)An Enhanced Method for Reverse Engineering CAN Data Payload., , , , и . IEEE Trans. Veh. Technol., 70 (4): 3371-3381 (2021)MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks., , , , , и . IEEE Trans. Veh. Technol., 69 (2): 2204-2218 (2020)T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method., , , и . IEEE Access, (2019)How to Securely Record Logs based on ARM TrustZone., , , и . AsiaCCS, стр. 664-666. ACM, (2019)Reliable Cooperative Authentication for Vehicular Networks., , и . IEEE Trans. Intell. Transp. Syst., 19 (4): 1065-1079 (2018)SOME/IP Intrusion Detection System Using Machine Learning., , и . IEICE Trans. Inf. Syst., 105-D (11): 1923-1924 (ноября 2022)