Search for persons
X
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
4
Wireless Modulation Identification: Filling the Gap in IoT ..:
, In:
?
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
6
A defensive man-in-middle approach to filter BLE packets:
, In:
?
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
7
Cross-protocol attacks : weaponizing a smartphone by div..:
, In:
?
2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC) ,
8