Cited By
View all- Blancaflor EOrdonez BPajutrao DVerano K(2024)Enhancing Online Privacy and Security through Proxy Chaining in Kali Linux: A Comprehensive AnalysisProceedings of the 2024 8th International Conference on E-Commerce, E-Business, and E-Government10.1145/3675585.3675593(51-55)Online publication date: 28-May-2024
- Bransky KSweetser PCaldwell SFletcher KGrollman DBroadbent EJu WSoh HWilliams T(2024)Mind-Body-Identity: A Scoping Review of Multi-EmbodimentProceedings of the 2024 ACM/IEEE International Conference on Human-Robot Interaction10.1145/3610977.3634922(65-75)Online publication date: 11-Mar-2024
- Kong RChen H(2024)CSI-RFF: Leveraging Micro-Signals on CSI for RF Fingerprinting of Commodity WiFiIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339637519(5301-5315)Online publication date: 2-May-2024
- Show More Cited By