Login / Signup
Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming.
Rom Ogen
Kfir Zvi
Omer Shwartz
Yossi Oren
Published in:
WOOT @ USENIX Security Symposium (2018)
Keyphrases
</>
information sources
location information
end to end
distributed databases
neural network
end users
computer systems
computer simulation
shortest path
sensor data
communication networks