Constrained Proximity Attacks on Mobile Targets.
Xueou WangXiaolu HouRuben RiosNils Ole TippenhauerMartín OchoaPublished in: ACM Trans. Priv. Secur. (2022)
Keyphrases
- countermeasures
- mobile devices
- mobile applications
- mobile phone
- mobile users
- watermarking scheme
- traffic analysis
- mobile computing
- target recognition
- mobile environments
- communication technologies
- watermarking algorithm
- smart phones
- denial of service attacks
- malicious attacks
- malicious users
- neural network
- detecting malicious
- mobile communication
- security mechanisms
- m learning
- mobile learning
- signal processing
- information systems