Cited By
View all- Qu ZDuan RHan XZhao SLiu YLu Z(2024)Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00042(2740-2758)Online publication date: 19-May-2024
- Tervoort TDe Oliveira MPieters WVan Gelder POlabarriaga SMarquering H(2020)Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping ReviewIEEE Access10.1109/ACCESS.2020.29843768(84352-84361)Online publication date: 2020
- Robyns PQuax PLamotte WNoubir GConti MKasera S(2017)PHY-layer security is no alternative to cryptographyProceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3098243.3098271(160-162)Online publication date: 18-Jul-2017