Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Malicious Activity on Smartphones Using Sensor Measurements., , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 475-487. Springer, (2015)Detecting Targeted Attacks By Multilayer Deception., , , , and . J. Cyber Secur. Mobil., 2 (2): 175-199 (2013)Anomaly detection in cellular Machine-to-Machine communications., and . ICC, page 2138-2143. IEEE, (2013)Connection-less communication of IoT devices over LTE mobile networks., and . SECON, page 247-255. IEEE, (2015)How an SMS-based malware infection will get throttled by the wireless link., and . ICC, page 960-965. IEEE, (2012)Is it really you?: user identification via adaptive behavior fingerprinting., , , and . CODASPY, page 333-344. ACM, (2014)Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks., , , , and . WOWMOM, page 1-9. IEEE Computer Society, (2015)Crime scene investigation: SMS spam data analysis., and . Internet Measurement Conference, page 441-452. ACM, (2012)Analysis and detection of SIMbox fraud in mobility networks., , , and . INFOCOM, page 1519-1526. IEEE, (2014)Firecycle: A scalable test bed for large-scale LTE security research., , , and . ICC, page 907-913. IEEE, (2014)