The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WISEC"( http://dblp.L3S.de/Venues/WISEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/wisec

Publication years (Num. hits)
2008 (29) 2009 (29) 2010 (23) 2011 (21) 2012 (20) 2013 (27) 2014 (27) 2015 (35) 2016 (33) 2017 (41) 2018 (41) 2019 (61) 2020 (31) 2021 (46) 2022 (40) 2023 (35)
Publication types (Num. hits)
inproceedings(523) proceedings(16)
Venues (Conferences, Journals, ...)
WISEC(539)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 218 occurrences of 138 keywords

Results
Found 539 publication records. Showing 539 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mohamad Mansouri, Wafa Ben Jaballah, Melek Önen, Md Masoom Rabbani, Mauro Conti FADIA: fairness-driven collaborative remote attestation. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Merlin Chlosta, David Rupprecht, Thorsten Holz On the challenges of automata reconstruction in LTE networks. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Vincent Toubiana, Mathieu Cunche No need to ask the Android: bluetooth-low-energy scanning without the location permission. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mahmoud Ammar, Bruno Crispo, Ivan De Oliveira Nunes, Gene Tsudik Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Christina Pöpper, Mathy Vanhoef, Lejla Batina, René Mayrhofer (eds.) WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Benjamin Larsen, Thanassis Giannetsos, Ioannis Krontiris, Kenneth A. Goldman Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Shishir Nagaraja, Ryan Shah VoIPLoc: passive VoIP call provenance via acoustic side-channels. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Batyr Charyyev, Mehmet Hadi Gunes Misactivation detection and user identification in smart home speakers using traffic flow features. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Shengye Wan, Kun Sun 0001, Ning Zhang 0017, Yue Li 0002 Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ahmed Aboukora, Guillaume Bonnet, Florent Galtier, Romain Cayre, Vincent Nicomette, Guillaume Auriol A defensive man-in-middle approach to filter BLE packets. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Juchuan Zhang, Xiaoyu Ji 0001, Yuehan Chi, Yi-Chao Chen 0001, Bin Wang 0062, Wenyuan Xu 0001 OutletSpy: cross-outlet application inference via power factor correction signal. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Chinmay Garg, Aravind Machiry, Andrea Continella, Christopher Kruegel, Giovanni Vigna Toward a secure crowdsourced location tracking system. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Patrik Ekdahl, Alexander Maximov, Thomas Johansson 0001, Jing Yang 0025 SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Frans Lundberg, Juraj Feljan Julia: fast and secure key agreement for IoT devices. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Marco Spanghero, Panos Papadimitratos Detecting GNSS misbehaviour with high-precision clocks. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Romain Cayre, Géraldine Vache Marconato, Florent Galtier, Mohamed Kaâniche, Vincent Nicomette, Guillaume Auriol Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala Write to know: on the feasibility of wrist motion based user-authentication from handwriting. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Alexander Heinrich, Matthias Hollick, Thomas Schneider 0003, Milan Stute, Christian Weinert AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Aleksi Peltonen, Ralf Sasse, David A. Basin A comprehensive formal analysis of 5G handover. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Xianjun Jiao, Michael T. Mehari, Wei Liu 0019, Muhammad Aslam 0006, Ingrid Moerman openwifi CSI fuzzer for authorized sensing and covert channels. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Haipeng Li, Chenggang Wang, Nirnimesh Ghose, Boyang Wang Robust deep-learning-based radio fingerprinting with fine-tuning. Search on Bibsonomy WISEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Gabriele Oligeri, Savio Sciancalepore, Simone Raponi, Roberto Di Pietro BrokenStrokes: on the (in)security of wireless keyboards. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dominik Christian Maier, Lukas Seidel, Shinjo Park BaseSAFE: baseband sanitized fuzzing through emulation. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Pieter Robyns, Mariano Di Martino, Dennis Giese, Wim Lamotte, Peter Quax, Guevara Noubir Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mira Weller, Jiska Classen, Fabian Ullrich, Denis Waßmann, Erik Tews Lost and found: stopping bluetooth finders from leaking private information. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chia-Yi Yeh, Yasaman Ghasempour, Yasith Amarasinghe, Daniel M. Mittleman, Edward W. Knightly Security in terahertz WLANs with Leaky wave antennas. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zicheng Zhang, Wenrui Diao, Chengyu Hu, Shanqing Guo, Chaoshun Zuo, Li Li 0044 An empirical study of potentially malicious third-party libraries in Android apps. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Florentin Putz, Flor Álvarez, Jiska Classen Acoustic integrity codes: secure device pairing using short-range acoustic communication. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chuadhry Mujeeb Ahmed, Jay Prakash, Rizwan Qadeer, Anand Agrawal, Jianying Zhou 0001 Process skew: fingerprinting the process for anomaly detection in industrial control systems. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuanyi Sun, Shiqing Chen, Sencun Zhu, Yu Chen 0002 iRyP: a purely edge-based visual privacy-respecting system for mobile cameras. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zicheng Chi, Yan Li 0048, Xin Liu 0045, Wei Wang 0190, Yao Yao 0009, Ting Zhu 0001, Yanchao Zhang Countering cross-technology jamming attack. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac Kratos: multi-user multi-device-aware access control system for the smart home. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Pruthuvi Maheshakya Wijewardena, Aditya Bhaskara, Sneha Kumar Kasera, Syed Ayaz Mahmud, Neal Patwari A plug-n-play game theoretic framework for defending against radio window attacks. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mahsa Foruhandeh, Abdullah Zubair Mohammed, Gregor Kildow, Paul Berges, Ryan M. Gerdes Spotr: GPS spoofing detection via device fingerprinting. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mingshun Sun, Yanmao Man, Ming Li 0003, Ryan M. Gerdes SVM: secure vehicle motion verification with a single wireless receiver. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dimitrios-Georgios Akestoridis, Madhumitha Harishankar, Michael Weber 0011, Patrick Tague Zigator: analyzing the security of zigbee-enabled smart homes. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac Peek-a-boo: i see your smart home activities, even encrypted! Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mathy Vanhoef, Prasant Adhikari, Christina Pöpper Protecting wi-fi beacons from outsider forgeries. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1René Mayrhofer, Michael Roland 0001 (eds.) WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020 Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Gabriele Oligeri, Savio Sciancalepore, Roberto Di Pietro GNSS spoofing detection via opportunistic IRIDIUM signals. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Keen Sung, Brian Neil Levine, Mariya Zheleva Protecting location privacy from untrusted wireless service providers. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun, Boyang Wang Fingerprinting encrypted voice traffic on smart speakers with deep learning. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dennis Heinze, Jiska Classen, Felix Rohrbach MagicPairing: Apple's take on securing bluetooth peripherals. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Stefan Gvozdenovic, Johannes K. Becker, John Mikulskis, David Starobinski Truncate after preamble: PHY-based starvation attacks on IoT networks. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ala Darabseh, Hoda AlKhzaimi, Christina Pöpper MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Prakash Shrestha, Nitesh Saxena Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Guillaume Celosia, Mathieu Cunche Valkyrie: a generic framework for verifying privacy provisions in wireless networks. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kaiming Fang, Guanhua Yan Paging storm attacks against 4G/LTE networks from regional Android botnets: rationale, practicality, and implications. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kyuin Lee, Neil Klingensmith, Dong He, Suman Banerjee 0001, Younghyun Kim 0001 ivPair: context-based fast intra-vehicle device pairing for secure wireless connectivity. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Frank Hessel, Lars Almon, Flor Álvarez ChirpOTLE: a framework for practical LoRaWAN security evaluation. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Martin Striegel, Johann Heyszl, Florian Jakobsmeier, Yacov Matveev, Georg Sigl Secure and user-friendly over-the-air firmware distribution in a portable faraday cage. Search on Bibsonomy WISEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chen Song 0001, Zhengxiong Li, Wenyao Xu Cardiac biometrics for continuous and non-contact mobile authentication: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1David Gabay, Mumin Cebe, Kemal Akkaya On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1T. J. OConnor, Reham Mohamed 0002, Markus Miettinen, William Enck, Bradley Reaves, Ahmad-Reza Sadeghi HomeSnitch: behavior transparency and control for smart home IoT devices. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Guillaume Celosia, Mathieu Cunche Himiko: A human interface for monitoring and inferring knowledge on bluetooth-low-energy objects: demo. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sanket Goutam, William Enck, Bradley Reaves Hestia: simple least privilege network policies for smart homes. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yuzhou Feng, Liangdong Deng, Dong Chen IoT devices discovery and identification using network traffic data: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Marjani Peterson, Chutima Boonthum-Denecke Investigation of cookie vulnerabilities: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Noga Agmon, Asaf Shabtai, Rami Puzis Deployment optimization of IoT devices through attack graph analysis. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Karim Eldefrawy, Gene Tsudik Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohammad Khodaei, Hamid Noroozi, Panos Papadimitratos Scaling pseudonymous authentication for large mobile systems. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Grant Hernandez, Kevin R. B. Butler Basebads: Automated security analysis of baseband firmware: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Eyuphan Bulut, Ismail Güvenç, Kemal Akkaya Privacy preserving distributed matching for device-to-device IoT communications: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci Are you secure in your car?: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu 0005, Yubin Xia, Bo Luo Protecting mobile devices from physical memory attacks with targeted encryption. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1David Gérault, Ioana Boureanu Distance bounding under different assumptions: opinion. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mumin Cebe, Kemal Akkaya Performance evaluation of key management schemes for wireless legacy smart grid environments: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shoukat Ali, Koray Karabina, Emrah Karagoz Biometric data transformation for cryptographic domains and its application: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nissy Sombatruang, Lucky Onwuzurike, M. Angela Sasse, Michelle Baddeley Factors influencing users to use unsecured wi-fi networks: evidence in the wild. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jiska Classen, Matthias Hollick Inside job: diagnosing bluetooth lower layers using off-the-shelf devices. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tao Liu 0023, Wujie Wen Deep-evasion: Turn deep neural network into evasive self-contained cyber-physical malware: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sigmund Albert Gorski III, William Enck ARF: identifying re-delegation vulnerabilities in Android system services. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper Lost traffic encryption: fingerprinting LTE/4G traffic on layer two. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Aysajan Abidin Quantum distance bounding. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park 0001, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen Breaking graph-based IoT malware detection systems using adversarial examples: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Qi Li, Dong Chen Exposing the location of anonymous solar-powered homes: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, Jun Han 0001, Jong Taek Lee SurFi: detecting surveillance camera looping attacks with wi-fi channel state information. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1T. J. OConnor, William Enck, Bradley Reaves Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper LTE security disabled: misconfiguration in commercial networks. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Timothy Claeys, Franck Rousseau, Boris Simunovic, Bernard Tourancheau Thermal covert channel in bluetooth low energy networks. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Joseph I. Choi, Dave (Jing) Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong Enclave-based privacy-preserving localization: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gabriele Oligeri, Savio Sciancalepore, Omar Adel Ibrahim, Roberto Di Pietro Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments). Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jay Prakash, Chenxi Liu 0002, Tony Q. S. Quek, Jemin Lee RF based entropy sources for jamming resilience: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Robert Heras, Alexander Perez-Pons Ensemble malware analysis for evaluating the integrity of mission critical devices poster: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shishir Nagaraja, Ryan Shah Clicktok: click fraud detection using traffic analysis. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jasmine D. Bowers, Imani N. Sherman, Kevin R. B. Butler, Patrick Traynor Characterizing security and privacy practices in emerging digital credit applications. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala deWristified: handwriting inference using wrist-based motion sensors revisited. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir Wireless attacks on aircraft landing systems: demo. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1T. Charles Clancy, Robert W. McGwier, Lidong Chen Post-quantum cryptography and 5G security: tutorial. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vashish Baboolal, Kemal Akkaya, Nico Saputro, Khaled Rabieh Preserving privacy of drone videos using proxy re-encryption technique: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zhanel Tucker, Chutima Boonthum-Denecke Security, privacy, and ethical concerns on human radio-frequency identification (RFID) implants: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jayesh Soni, Nagarajan Prabakar, Himanshu Upadhyay Deep learning approach to detect malicious attacks at system level: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Daniel Moser, Vincent Lenders, Srdjan Capkun Digital radio signal cancellation attacks: an experimental evaluation. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1James Pavur, Daniel Moser, Vincent Lenders, Ivan Martinovic Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Beatrice Perez, Mirco Musolesi, Gianluca Stringhini Fatal attraction: identifying mobile devices through electromagnetic emissions. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohammad Ashiqur Rahman, Md Hasan Shahriar, Rahat Masum False data injection attacks against contingency analysis in power grids: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen Analyzing endpoints in the internet of things malware: poster. Search on Bibsonomy WiSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 539 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license