The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WiSec"( http://dblp.L3S.de/Venues/WiSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/wisec

Publication years (Num. hits)
2008 (29) 2009 (29) 2010 (23) 2011 (21) 2012 (20) 2013 (27) 2014 (27) 2015 (35) 2016 (33) 2017 (41) 2018 (41) 2019 (61) 2020 (31) 2021 (46) 2022 (40) 2023 (35)
Publication types (Num. hits)
inproceedings(523) proceedings(16)
Venues (Conferences, Journals, ...)
WISEC(539)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 218 occurrences of 138 keywords

Results
Found 539 publication records. Showing 539 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Evangelos Bitsikas, Syed Khandker, Ahmad Salous, Aanjhan Ranganathan, Roger Piqueras Jover, Christina Pöpper UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Mathy Vanhoef, Xianjun Jiao, Wei Liu 0019, Ingrid Moerman Testing and Improving the Correctness of Wi-Fi Frame Injection. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ahmed Tanvir Mahdad, Nitesh Saxena SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Haoyu Liu, Douglas J. Leith, Paul Patras Android OS Privacy Under the Loupe - A Tale from the East. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Haoze Chen, Hooman Saeidi, Suresh Venkatesh, Kaushik Sengupta, Yasaman Ghasempour Wavefront Manipulation Attack via Programmable mmWave Metasurfaces: from Theory to Experiments. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Alessandro Lotto, Vaibhav Singh, Bhaskar Ramasubramanian, Alessandro Brighente, Mauro Conti, Radha Poovendran BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Siddharth Prakash Rao, Alexandros Bakas Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yuanda Wang, Hanqing Guo, Guangjing Wang 0001, Bocheng Chen, Qiben Yan VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ka Lok Wu, Man Hong Hue, Ka Fun Tang, Sze Yiu Chau The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Edd Salkield, Marcell Szakály, Joshua Smailes, Sebastian Köhler 0005, Simon Birnbach, Martin Strohmeier, Ivan Martinovic Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Shanghao Shi, Yang Xiao 0010, Changlai Du, Md Hasan Shahriar, Ao Li 0006, Ning Zhang 0017, Y. Thomas Hou 0001, Wenjing Lou MS-PTP: Protecting Network Timing from Byzantine Attacks. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Marco Casagrande, Riccardo Cestaro, Eleonora Losiouk, Mauro Conti, Daniele Antonioli E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Mashari Alatawi, Nitesh Saxena SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Xingya Zhao, Wei-Han Chen, Kannan Srinivasan 0001 Malicious Relay Detection and Legitimate Channel Recovery. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Daniel Timko, Muhammad Lutfor Rahman Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Thijs Heijligenberg, Guido Knips, Christian Böhm 0003, David Rupprecht, Katharina Kohls BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Felipe Boeira, Mikael Asplund, Marinho P. Barcellos Provable Non-Frameability for 5G Lawful Interception. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jay Le-Papin, Brijesh Dongol, Helen Treharne, Stephan Wesemeyer Verifying List Swarm Attestation Protocols. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Naureen Hoque, Hanif Rahbari Circumventing the Defense against Modulation Classification Attacks. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Hai N. Nguyen, Guevara Noubir JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural Network. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Bedran Karakoc, Nils Fürste, David Rupprecht, Katharina Kohls Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Payton Walker, Tianfang Zhang, Cong Shi 0004, Nitesh Saxena, Yingying Chen 0001 BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ioana Boureanu, Steve Schneider, Bradley Reaves, Nils Ole Tippenhauer (eds.) Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023 Search on Bibsonomy WiSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Naureen Hoque, Hanif Rahbari Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Tuan Dinh Hoang, CheolJun Park, Mincheol Son, Taekkyung Oh, Sangwook Bae, Junho Ahn, Beomseok Oh, Yongdae Kim LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Chenggang Wang, Mabon Ninan, Shane Reilly, Joel Ward, William Hawkins, Boyang Wang, John Marty Emmert Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Shaohu Zhang, Zhouyu Li, Anupam Das 0001 VoicePM: A Robust Privacy Measurement on Voice Anonymity. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Oscar Lasierra, Gines Garcia-Aviles, Esteban Municio, Antonio F. Skarmeta, Xavier Costa-Pérez European 5G Security in the Wild: Reality versus Expectations. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Omar Adel Ibrahim, Roberto Di Pietro Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1M. Hammad Mazhar, Li Li, Md. Endadul Hoque, Omar Chowdhury Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Vera Schmitt, Zhenni Li, Maija Poikela, Robert P. Spang, Sebastian Möller 0001 What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing Factors. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Hongjian Cao, Lin Huang, Shuwei Hu, Shangcheng Shi, Yujia Liu Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Maryam Motallebighomi, Harshad Sathaye, Mridula Singh, Aanjhan Ranganathan Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Sri Hrushikesh Varma Bhupathiraju, Jennifer Sheldon, Luke A. Bauer, Vincent Bindschaedler, Takeshi Sugawara 0001, Sara Rampazzi EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef On the Robustness of Wi-Fi Deauthentication Countermeasures. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Konstantinos Kalogiannis, Mohammad Khodaei, Weaam Mostafa Nemr Mohamed Bayaa, Panos Papadimitratos Attack Impact and Misbehavior Detection in Vehicular Platoons. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1William Enck Reflections on a Decade of Mobile Security Research. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mingshun Sun, Zhiwu Guo, Ming Li 0003, Ryan M. Gerdes Passive Drone Localization Using LTE Signals. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Alexander Heinrich, Niklas Bittner, Matthias Hollick AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Eric Wagner 0003, Martin Serror, Klaus Wehrle, Martin Henze BP-MAC: Fast Authentication for Short Messages. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Samuel Pélissier, Mathieu Cunche, Vincent Roca, Didier Donsez Device Re-identification in LoRaWAN through Messages Linkage. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Paul Staat, Kai Jansen, Christian T. Zenger, Harald Elders-Boll, Christof Paar Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Vijayanta Jain, Sanonda Datta Gupta, Sepideh Ghanavati, Sai Teja Peddinti, Collin McMillan PAcT: Detecting and Classifying Privacy Behavior of Android Applications. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Dimitrios-Georgios Akestoridis, Vyas Sekar, Patrick Tague On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Anuradha Mandal, Nitesh Saxena SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Cihan Eryonucu, Panos Papadimitratos Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Abubakar Sadiq Mohammed, Neetesh Saxena, Omer F. Rana Wheels on the Modbus - Attacking ModbusTCP Communications. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ala Darabseh, Christina Pöpper Towards Security-Optimized Placement of ADS-B Sensors. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Manuel Pöll, Michael Roland 0001 Automating the Quantitative Analysis of Reproducibility for Build Artifacts derived from the Android Open Source Project. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Anindya Maiti, Ahmad-Reza Sadeghi, Gabriela Felicia Ciocarlie, Patrick Tague Wireless and Mobile Security Research and Teaching in the Post-Pandemic World. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Shengping Bi, Tao Hou, Tao Wang 0026, Yao Liu 0007, Zhuo Lu, Qingqi Pei DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Lukas Burg, Max Granzow, Alexander Heinrich, Matthias Hollick OpenHaystack Mobile - Tracking Custom Find My Accessories on Smartphones. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Eric Wagner 0003, Jan Bauer, Martin Henze Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Felipe Boeira, Mikael Asplund, Marinho P. Barcellos No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jafar Pourbemany, Ye Zhu 0001, Riccardo Bettati Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Gabriela Felicia Ciocarlie Everything is Connected: Security and Reliability for Critical Infrastructure. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Chennan Zhang, Shuang Li, Wenrui Diao, Shanqing Guo PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Nisha Vinayaga-Sureshkanth, Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala An Investigative Study on the Privacy Implications of Mobile E-scooter Rental Apps. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Srdjan Capkun Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Wenqing Yan, Thiemo Voigt, Christian Rohner RRF: A Robust Radiometric Fingerprint System that Embraces Wireless Channel Diversity. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Shrenik Bhansali, Ahmet Aris, Abbas Acar, Harun Oz, A. Selcuk Uluagac A First Look at Code Obfuscation for WebAssembly. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mohamed Taoufiq Damir, Valtteri Niemi On Post-Quantum Identification in 5G. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Kathryn Hines, Manohar Raavi, John-Michael Villeneuve, Simeon Wuthier, Javier Moreno-Colin, Yan Bai, Sang-Yoon Chang Post-Quantum Cipher Power Analysis in Lightweight Devices. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Murtuza Jadliwala, Yongdae Kim, Alexandra Dmitrienko (eds.) WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022 Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhambyl Shaikhanov, Fahid Hassan, Hichem Guerboukha, Daniel M. Mittleman, Edward W. Knightly Metasurface-in-the-Middle Attack: From Theory to Experiment. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Payton Walker, Nathan McClaran, Zihao Zheng, Nitesh Saxena, Guofei Gu BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Shiyue Nie, Yiming Zhang 0009, Tao Wan 0004, Haixin Duan, Song Li Measuring the Deployment of 5G Security Enhancement. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhambyl Shaikhanov, Fahid Hassan, Hichem Guerboukha, Daniel M. Mittleman, Edward W. Knightly Adversarial Metasurfaces: Metasurface-in-the-Middle Attack. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ryan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Vincent Quentin Ulitzsch, Shinjo Park, Soundes Marzougui, Jean-Pierre Seifert A Post-Quantum Secure Subscription Concealed Identifier for 6G. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Chia-Yi Yeh, Alejandro Cohen, Rafael G. L. D'Oliveira, Muriel Médard, Daniel M. Mittleman, Edward W. Knightly Angularly Dispersive Terahertz Links with Secure Coding: From Theoretical Foundations to Experiments. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Theo Gamboni-Diehl, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang Lightweight Code Assurance Proof for Wireless Software. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Wyatt Praharenka, Ioanis Nikolaidis Identifying device type from cross channel probe request behavior. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Marinos Vomvas, Erik-Oliver Blass, Guevara Noubir SELEST: secure elevation estimation of drones using MPC. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Merlin Chlosta, David Rupprecht, Christina Pöpper, Thorsten Holz 5G SUCI-catchers: still catching them all? Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Abida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro Anonymous device authorization for cellular networks. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Siddharth Dongre, Hanif Rahbari Message sieving to mitigate smart gridlock attacks in V2V. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mengfei Ren 0001, Xiaolei Ren, Huadong Feng, Jiang Ming 0002, Yu Lei 0001 Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementation. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Eric Jedermann, Martin Strohmeier, Matthias Schäfer 0002, Jens B. Schmitt, Vincent Lenders Orbit-based authentication using TDOA signatures in satellite networks. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Travis Peters, Timothy J. Pierson, Sougata Sen, José Camacho 0001, David Kotz Recurring verification of interaction authenticity within bluetooth networks. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mridula Singh, Marc Roeschlin, Ezzat Zalzala, Patrick Leu, Srdjan Capkun Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Dennis Giese, Guevara Noubir Amazon echo dot or the reverberating secrets of IoT devices. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Han Wang, Luis Muñoz-González, David Eklund, Shahid Raza Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Domien Schepers, Mridula Singh, Aanjhan Ranganathan Here, there, and everywhere: security analysis of wi-fi fine timing measurement. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1S. Abhishek Anand, Chen Wang 0009, Jian Liu 0001, Nitesh Saxena, Yingying Chen 0001 Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Malte Lenhart, Marco Spanghero, Panagiotis Papadimitratos Relay/replay attacks on GNSS signals. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef Let numbers tell the tale: measuring security trends in wi-fi networks and best practices. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jay Prakash, Prathmesh Thorwe, Tony Q. S. Quek AgriAuth: sensor collaboration and corroboration for data confidence in smart farms. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Norbert Ludant, Guevara Noubir SigUnder: a stealthy 5G low power attack and defenses. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Alexander Heinrich, Milan Stute, Matthias Hollick OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Tien Dang Vo-Huu, Triet Dang Vo-Huu, Guevara Noubir Spectrum-flexible secure broadcast ranging. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac LightningStrike: (in)secure practices of E-IoT systems in the wild. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jasper Stang, Alexandra Dmitrienko, Sascha Roth RIP StrandHogg: a practical StrandHogg attack detection method on Android. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Payton Walker, Nitesh Saxena SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ahmet Kurt, Suat Mercan, Omer Shlomovits, Enes Erdin, Kemal Akkaya LNGate: powering IoT with next generation lightning micro-payments using threshold cryptography. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jiska Classen, Matthias Hollick Happy MitM: fun and toys in every bluetooth device. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Domien Schepers, Mathy Vanhoef, Aanjhan Ranganathan A framework to test and fuzz wi-fi devices. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 539 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license