Personensuche
X
?
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking ,
1
IMS is Not That Secure on Your 5G/4G Phones:
, In:
?
2024 IEEE International Conference on Pervasive Computing and Communications (PerCom) ,
2
Practical Latency-Aware Scheduling for Low-Latency Elephant..:
, In:
?
IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) ,
3
Remote Detection of 4G/5G UEs Vulnerable to Stealthy Call D..:
, In:
?
IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) ,
4
A Runtime Anomaly Detector via Service Communication Proxy ..:
, In:
?
2023 IEEE Conference on Communications and Network Security (CNS) ,
5
When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak ..:
, In:
?
GLOBECOM 2023 - 2023 IEEE Global Communications Conference ,
6
Congestion-Avoidance Adaptation for Edge-based UAV Video Fr..:
, In:
?
Proceedings of the 28th Annual International Conference on Mobile Computing And Networking ,
7
Uncovering insecure designs of cellular emergency services ..:
, In:
?
Proceedings of the 27th Annual International Conference on Mobile Computing and Networking ,
8
Insecurity of operational cellular IoT service : new vul..:
, In:
?
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy ,
9
Security Threats from Bitcoin Wallet Smartphone Application..:
, In:
?
IEEE INFOCOM 2021 - IEEE Conference on Computer Communications ,
10
An Experience Driven Design for IEEE 802.11ac Rate Adaptati..:
, In:
?
Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services ,
11
SecWIR : securing smart home IoT communications via wi-f..:
, In:
?
2020 European Conference on Networks and Communications (EuCNC) ,
12
Transparent 3rd-Party Authentication with Application Mobil..:
, In:
?
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications ,
13
WBF-PS: WiGig Beam Fingerprinting for UAV Positioning Syste..:
, In:
?
Proceedings of the 26th Annual International Conference on Mobile Computing and Networking ,
14
Ghost calls from operational 4G call systems : IMS vulne..:
, In:
?
2019 IEEE Symposium Series on Computational Intelligence (SSCI) ,
15