From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

XRec: Behavior-Based User Recognition Across Mobile Devices., , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (3): 111:1-111:26 (2017)Using bluetooth low energy spoofing to dispute device details: demo., и . WiSec, стр. 340-342. ACM, (2019)Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection., и . PECCS, стр. 431-439. SciTePress, (2012)Sensetribute: smart home occupant identification via fusion across on-object sensing devices., , , , , и . BuildSys@SenSys, стр. 2:1-2:10. ACM, (2017)Stochastic optimization of flow-jamming attacks in multichannel wireless networks., , и . ICC, стр. 2165-2170. IEEE, (2013)Towards secure multi-path routing for wireless mobile ad-hoc networks: A cross-layer strategy., и . SECON, стр. 146-148. IEEE, (2011)Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponents., и . Pervasive Mob. Comput., (2014)Pitchln: eavesdropping via intelligible speech reconstruction using non-acoustic sensor fusion., , и . IPSN, стр. 181-192. ACM, (2017)All your jammers belong to us - Localization of wireless sensors under jamming attack., , , и . ICC, стр. 949-954. IEEE, (2012)Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis., , , и . IEEE Trans. Dependable Secur. Comput., 6 (2): 111-123 (2009)