Login / Signup
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation.
Jiska Classen
Francesco Gringoli
Michael Hermann
Matthias Hollick
Published in:
IEEE Symposium on Security and Privacy (2022)
Keyphrases
</>
feature vectors
case study
image features
feature set
communication technologies
feature space
high speed
low level
digital images
computer systems
intrusion detection
security mechanisms
remote control