ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Latest Publications
TOTAL DOCUMENTS
41
(FIVE YEARS 41)
H-INDEX
1
(FIVE YEARS 1)
Published By ACM
9781450380065
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
SVM
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3395351.3399348
◽
2020
◽
Author(s):
Mingshun Sun
◽
Yanmao Man
◽
Ming Li
◽
Ryan Gerdes
Download Full-text
Security in terahertz WLANs with Leaky wave antennas
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3395351.3399365
◽
2020
◽
Cited By ~ 1
Author(s):
Chia-Yi Yeh
◽
Yasaman Ghasempour
◽
Yasith Amarasinghe
◽
Daniel M. Mittleman
◽
Edward W. Knightly
Keyword(s):
Leaky Wave
Download Full-text
AnaMPhy
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3395351.3401704
◽
2020
◽
Author(s):
Jay Prakash
◽
Rajesh Pachigolla
◽
Aman Goyal
◽
Parthajit Mohapatra
◽
Tony Q. S. Quek
Download Full-text
BaseSAFE
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3395351.3399360
◽
2020
◽
Cited By ~ 2
Author(s):
Dominik Maier
◽
Lukas Seidel
◽
Shinjo Park
Download Full-text
A plug-n-play game theoretic framework for defending against radio window attacks
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3395351.3399368
◽
2020
◽
Author(s):
Pruthuvi Maheshakya Wijewardena
◽
Aditya Bhaskara
◽
Sneha Kumar Kasera
◽
Syed Ayaz Mahmud
◽
Neal Patwari
Keyword(s):
Game Theoretic
◽
Play Game
Download Full-text
Valkyrie
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3395351.3399340
◽
2020
◽
Author(s):
Guillaume Celosia
◽
Mathieu Cunche
Download Full-text
AcousticPrint
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3395351.3401700
◽
2020
◽
Author(s):
Harini Kolamunna
◽
Junye Li
◽
Thilini Dahanayaka
◽
Suranga Seneviratne
◽
Kanchana Thilakaratne
◽
...
Download Full-text
An empirical study of potentially malicious third-party libraries in Android apps
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3395351.3399346
◽
2020
◽
Author(s):
Zicheng Zhang
◽
Wenrui Diao
◽
Chengyu Hu
◽
Shanqing Guo
◽
Chaoshun Zuo
◽
...
Keyword(s):
Empirical Study
◽
Third Party
◽
Android Apps
Download Full-text
Zigator
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3395351.3399363
◽
2020
◽
Author(s):
Dimitrios-Georgios Akestoridis
◽
Madhumitha Harishankar
◽
Michael Weber
◽
Patrick Tague
Download Full-text
Process skew
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3395351.3399364
◽
2020
◽
Cited By ~ 1
Author(s):
Chuadhry Mujeeb Ahmed
◽
Jay Prakash
◽
Rizwan Qadeer
◽
Anand Agrawal
◽
Jianying Zhou
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close