Spoofing attacks against vehicular FMCW radar
Komissarov, Rony, Vaisman, Sharon, Wool, Avishai
Published in Journal of cryptographic engineering (01.11.2023)
Published in Journal of cryptographic engineering (01.11.2023)
Get full text
Journal Article
Implementing public-key cryptography on passive RFID tags is practical
Arbit, Alex, Livne, Yoel, Oren, Yossef, Wool, Avishai
Published in International journal of information security (01.02.2015)
Published in International journal of information security (01.02.2015)
Get full text
Journal Article
Using the MSET Device to Counteract Power-Analysis Attacks
Peled, Assaf, David, Liron, Amrani, Ofer, Rosenwaks, Yossi, Wool, Avishai
Published in IEEE journal of the Electron Devices Society (2020)
Published in IEEE journal of the Electron Devices Society (2020)
Get full text
Journal Article
The Geometric Efficient Matching Algorithm for Firewalls
Rovniagin, Dmitry, Wool, Avishai
Published in IEEE transactions on dependable and secure computing (01.01.2011)
Published in IEEE transactions on dependable and secure computing (01.01.2011)
Get full text
Journal Article
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
Goldenberg, Niv, Wool, Avishai
Published in International journal of critical infrastructure protection (01.06.2013)
Published in International journal of critical infrastructure protection (01.06.2013)
Get full text
Journal Article
A Security Analysis and Revised Security Extension for the Precision Time Protocol
Itkin, Eyal, Wool, Avishai
Published in IEEE transactions on dependable and secure computing (01.01.2020)
Published in IEEE transactions on dependable and secure computing (01.01.2020)
Get full text
Journal Article
WDA: A Web farm Distributed Denial Of Service attack attenuator
Doron, Ehud, Wool, Avishai
Published in Computer networks (Amsterdam, Netherlands : 1999) (01.04.2011)
Published in Computer networks (Amsterdam, Netherlands : 1999) (01.04.2011)
Get full text
Journal Article