Author of the publication

Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks.

, , , and . DSC, page 1-8. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protocol Engineering - Prinzip, Beschreibung und Entwicklung von Kommunikationsprotokollen.. Leitfäden der Informatik Teubner, (2003)Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008., , , , , and . Comput. Sci. Res. Dev., 23 (1): 15-25 (2009)Whitelisting for Characterizing and Monitoring Process Control Communication., , and . NSS, volume 13983 of Lecture Notes in Computer Science, page 23-45. Springer, (2023)Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks., , , and . FPS, volume 13877 of Lecture Notes in Computer Science, page 192-207. Springer, (2022)Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks., , , and . DSC, page 1-8. IEEE, (2022)Iterative präzisionsbewertende Signaturgenerierung., , , and . Sicherheit, volume P-170 of LNI, page 141-152. GI, (2010)SEmulate: Seamless Network Protocol Simulation and Radio Channel Emulation for Wireless Sensor Networks., and . WONS, page 111-118. IEEE / IFIP, (2019)Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)., , , , and . Dagstuhl Reports, 13 (10): 90-129 (2023)Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities., , , and . CloudNet, page 101-108. IEEE, (2022)Insights on the Security and Dependability of Industrial Control Systems., , , , and . IEEE Secur. Priv., 12 (6): 75-78 (2014)