Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots., , , , , and . CoRR, (2015)Haptic passwords., , , and . IROS, page 1194-1199. IEEE, (2015)Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks., and . GameSec, volume 7037 of Lecture Notes in Computer Science, page 44-55. Springer, (2011)Continuous Operator Authentication for Teleoperated Systems Using Hidden Markov Models., , , , and . ACM Trans. Cyber Phys. Syst., 6 (1): 6:1-6:25 (2022)App Stores for the Brain : Privacy and Security in Brain-Computer Interfaces., , and . IEEE Technol. Soc. Mag., 34 (2): 32-39 (2015)Node capture attacks in wireless sensor networks: A system theoretic approach., , and . CDC, page 6765-6772. IEEE, (2010)Experimental analysis of denial-of-service attacks on teleoperated robotic systems., , , , and . ICCPS, page 11-20. ACM, (2015)A convex optimization approach for clone detection in wireless sensor networks., , , and . Pervasive and Mobile Computing, 9 (4): 528-545 (2013)On potential security threats against rescue robotic systems., and . SSRR, page 1-2. IEEE, (2012)Distributed clone detection in wireless sensor networks: An optimization approach., , , and . WOWMOM, page 1-6. IEEE Computer Society, (2011)