Search for persons
X
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
3
Watch This Space: Securing Satellite Communication through ..:
, In:
?
2023 IEEE International Conference on Cyber Security and Resilience (CSR) ,
4
To TTP or not to TTP?: Exploiting TTPs to Improve ML-based ..:
, In:
?
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
5
Satellite Spoofing from A to Z: On the Requirements of Sate..:
, In:
?
2023 IEEE/AIAA 42nd Digital Avionics Systems Conference (DASC) ,
6
Adaptable Hardware Fingerprinting for Radio Data Links and ..:
, In:
?
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference ,
7
RADAR: A TTP-based Extensible, Explainable, and Effective S..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
8
Signal Injection Attacks against CCD Image Sensors:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
9
Demo : End-to-End Wireless Disruption of CCS EV Charging:
, In:
?
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses ,
10
Exorcist : Automated Differential Analysis to Detect Com..:
, In:
?
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P) ,
12
WatchAuth: User Authentication and Intent Recognition in Mo..:
, In:
?
Proceedings of the 21st Workshop on Privacy in the Electronic Society ,
13
Fingerprinting and Personal Information Leakage from Touchs..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
14
Techniques for Continuous Touch-Based Authentication:
, In:
?
2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) ,
15