ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Latest Publications
TOTAL DOCUMENTS
45
(FIVE YEARS 45)
H-INDEX
0
(FIVE YEARS 0)
Published By ACM
9781450383493
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
RIP StrandHogg
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3448300.3468288
◽
2021
◽
Author(s):
Jasper Stang
◽
Alexandra Dmitrienko
◽
Sascha Roth
Download Full-text
SELEST
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3448300.3468228
◽
2021
◽
Author(s):
Marinos Vomvas
◽
Erik-Oliver Blass
◽
Guevara Noubir
Download Full-text
Identifying device type from cross channel probe request behavior
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3448300.3468257
◽
2021
◽
Author(s):
Wyatt Praharenka
◽
Ioanis Nikolaidis
Keyword(s):
Device Type
◽
Probe Request
Download Full-text
Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3448300.3467827
◽
2021
◽
Author(s):
Han Wang
◽
Luis Muñoz-González
◽
David Eklund
◽
Shahid Raza
Keyword(s):
Anomaly Detection
◽
Peer To Peer
Download Full-text
A framework to test and fuzz wi-fi devices
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3448300.3468261
◽
2021
◽
Author(s):
Domien Schepers
◽
Mathy Vanhoef
◽
Aanjhan Ranganathan
Download Full-text
Message sieving to mitigate smart gridlock attacks in V2V
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3448300.3467834
◽
2021
◽
Author(s):
Siddharth Dongre
◽
Hanif Rahbari
Download Full-text
Spearphone
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3448300.3468499
◽
2021
◽
Author(s):
S Abhishek Anand
◽
Chen Wang
◽
Jian Liu
◽
Nitesh Saxena
◽
Yingying Chen
Download Full-text
Misactivation detection and user identification in smart home speakers using traffic flow features
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3448300.3468289
◽
2021
◽
Author(s):
Batyr Charyyev
◽
Mehmet Hadi Gunes
Keyword(s):
Traffic Flow
◽
Smart Home
◽
User Identification
◽
Flow Features
Download Full-text
OpenHaystack
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3448300.3468251
◽
2021
◽
Author(s):
Alexander Heinrich
◽
Milan Stute
◽
Matthias Hollick
Download Full-text
Relay/replay attacks on GNSS signals
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3448300.3468256
◽
2021
◽
Author(s):
Malte Lenhart
◽
Marco Spanghero
◽
Panagiotis Papadimitratos
Keyword(s):
Replay Attacks
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close