Cited By
View all- Bhattacharjee ACecconello SKuipers FSmaragdakis G(2024)Fingerprinting of Cellular Infrastructure Based on Broadcast InformationComputer Security – ESORICS 202310.1007/978-3-031-51476-0_5(81-101)Online publication date: 11-Jan-2024
- Song JWan SHuang MLiu JSun LLi Q(2023)Toward Automatically Connecting IoT Devices with Vulnerabilities in the WildACM Transactions on Sensor Networks10.1145/360895120:1(1-26)Online publication date: 17-Jul-2023
- Adhatarao SLauradoux CBorghys DBas PVerdoliva LPevný TLi BNewman J(2021)Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files?Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security10.1145/3437880.3460405(35-44)Online publication date: 17-Jun-2021
- Show More Cited By