MITRE ATT CK is a comprehensive framework of adversary tactics, techni...
In the recent years cyberattacks to smart grids are becoming more freque...
The current state of the art on jamming detection relies on link-layer
m...
The performance of Radio Frequency (RF) fingerprinting techniques is
neg...
The massive deployment of IoT devices being utilized by home automation,...
Physical-layer security is regaining traction in the research community,...
We present a new machine learning-based attack that exploits network pat...
In this paper, we study the privately-own IRIDIUM satellite constellatio...
Classifying a weapon based on its muzzle blast is a challenging task tha...
Universal Serial Bus (USB) Flash Drives are nowadays one of the most
con...
Navigation software apps have a huge impact on the daily commuting of pe...
A new cybersecurity attack (cryptojacking) is emerging, in both the
lite...
Wireless devices resorting to event-triggered communications have been p...
We propose PiNcH, a methodology to detect the presence of a drone and it...