From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Can the Operator of a Drone Be Located by Following the Drone's Path?, , и . CSCML, том 12161 из Lecture Notes in Computer Science, стр. 85-93. Springer, (2020)Sensor Defense In-Software (SDI): Practical Software Based Detection of Spoofing Attacks on Position Sensor., , , , , , , , и . CoRR, (2019)Robust Website Fingerprinting Through the Cache Occupancy Channel., , , , , , и . CoRR, (2018)Inner conflict: How smart device components can cause harm., , , и . Comput. Secur., (2020)Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses., , , , , и . USENIX Security Symposium, стр. 2863-2880. USENIX Association, (2021)Robust Website Fingerprinting Through the Cache Occupancy Channel., , , , , , и . USENIX Security Symposium, стр. 639-656. USENIX Association, (2019)Cross-Router Covert Channels., , , , и . WOOT @ USENIX Security Symposium, USENIX Association, (2019)Shattered Trust: When Replacement Smartphone Components Attack., , , и . WOOT, USENIX Association, (2017)Port Contention Goes Portable: Port Contention Side Channels in Web Browsers., , , и . AsiaCCS, стр. 1182-1194. ACM, (2022)Brief Announcement: Deriving Context for Touch Events., , , и . CSCML, том 10879 из Lecture Notes in Computer Science, стр. 283-286. Springer, (2018)