Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Buhm Han
Daniel P. Kennedy
Roza G. Bayrak
Dan Graur
Barbara Aquilani
Fang-Lue Zhang
Roland Zumkeller
Maximilian Dürr
Liangliang Shang
Chen Ma
Home
/
Author
/
JISKA CLASSEN
Author Info
Open Visualization
Name
Affiliation
Papers
JISKA CLASSEN
Secure Mobile Networking Lab, Technische Universität Darmstadt and CASED, Darmstadt, Germany. Email: jiska.classen@seemoo.tudarmstadt.de
23
Collaborators
Citations
PageRank
46
33
9.10
Referers
Referees
References
87
206
82
Search Limit
100
206
Publications (23 rows)
Collaborators (46 rows)
Referers (87 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
0
0.34
2022
Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones
0
0.34
2022
AirTag of the Clones: Shenanigans with Liberated Item Finders
0
0.34
2022
ARIstoteles - Dissecting Apple's Baseband Interface
0
0.34
2021
Happy MitM: fun and toys in every bluetooth device
1
0.40
2021
Improving the Reliability of Bluetooth Low Energy Connections.
0
0.34
2020
Demo - Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices.
0
0.34
2020
Firmware Insider: Bluetooth Randomness is Mostly Random
0
0.34
2020
ToothPicker: Apple Picking in the iOS Bluetooth Stack
0
0.34
2020
Firmware Insider: Bluetooth Randomness is Mostly Random.
0
0.34
2020
Inside job: diagnosing bluetooth lower layers using off-the-shelf devices
2
0.42
2019
Practical VLC to WiFi Handover Mechanisms.
0
0.34
2019
InternalBlue - Bluetooth Binary Patching and Experimentation Framework
2
0.40
2019
Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem.
0
0.34
2019
Vacuums in the Cloud - Analyzing Security in a Hardened IoT Ecosystem.
0
0.34
2019
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware
2
0.38
2018
Opportunities and pitfalls in securing visible light communication on the physical layer.
0
0.34
2016
Analyzing TETRA Location Privacy and Network Availability.
0
0.34
2016
A Distributed Reputation System for Certification Authority Trust Management
1
0.36
2015
Practical covert channels for WiFi systems
4
0.44
2015
Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves
3
0.38
2015
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications
11
0.67
2015
CA trust management for the Web PKI.
7
0.92
2014
1