Author of the publication

Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities.

, , , and . CloudNet, page 101-108. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protocol Engineering - Prinzip, Beschreibung und Entwicklung von Kommunikationsprotokollen.. Leitfäden der Informatik Teubner, (2003)Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008., , , , , and . Comput. Sci. Res. Dev., 23 (1): 15-25 (2009)Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks., , , and . FPS, volume 13877 of Lecture Notes in Computer Science, page 192-207. Springer, (2022)Whitelisting for Characterizing and Monitoring Process Control Communication., , and . NSS, volume 13983 of Lecture Notes in Computer Science, page 23-45. Springer, (2023)Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks., , , and . DSC, page 1-8. IEEE, (2022)Iterative präzisionsbewertende Signaturgenerierung., , , and . Sicherheit, volume P-170 of LNI, page 141-152. GI, (2010)Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)., , , , and . Dagstuhl Reports, 13 (10): 90-129 (2023)SEmulate: Seamless Network Protocol Simulation and Radio Channel Emulation for Wireless Sensor Networks., and . WONS, page 111-118. IEEE / IFIP, (2019)Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities., , , and . CloudNet, page 101-108. IEEE, (2022)Insights on the Security and Dependability of Industrial Control Systems., , , , and . IEEE Secur. Priv., 12 (6): 75-78 (2014)