Sotabase
Home
Researchers
Career
·
Junior Research Fellow / Senior Postdoctoral Researcher
,
University of Oxford, Department of Computer Science
Publications
(34)
Analysis of Three-Carrier Ambiguity Resolution Technique for Precise Relative Positioning in GNSS-2
1998
132
cited
Peeves: Physical Event Verification in Smart Homes
Conference on Computer and Communications Security · 2019
73
cited
Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones
Network and Distributed System Security Symposium · 2017
57
cited
They See Me Rollin’: Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors
Asia-Pacific Computer Systems Architecture Conference · 2021
43
cited
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting
Conference on Computer and Communications Security · 2023
31
cited
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
Wireless Network Security · 2023
21
cited
Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors
ACM Trans. Internet Things · 2022
19
cited
Adaptable Hardware Fingerprinting for Radio Data Links and Avionics Buses in Adversarial Settings
Symposium on Dependable Autonomic and Secure Computing · 2023
9
cited
Towards a statistical network calculus — Dealing with uncertainty in arrivals
IEEE Conference on Computer Communications · 2014
9
cited
Dishing Out DoS: How to Disable and Secure the Starlink User Terminal
arXiv.org · 2023
8
cited
Firefly: Spoofing Earth Observation Satellite Data through Radio Overshadowing
SpaceSec · 2023
7
cited
Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks
Proceedings 2024 Workshop on Security of Space and Satellite Systems · 2024
7
cited
CableAuth: A Biometric Second Factor Authentication Scheme for Electric Vehicle Charging
VehicleSec · 2023
6
cited
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection
European Interdisciplinary Cybersecurity Conference · 2022
6
cited
To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection
Computer Science Symposium in Russia · 2023
6
cited
RingAuth: Wearable Authentication using a Smart Ring
arXiv.org · 2022
5
cited
On the Security of the Wireless Electric Vehicle Charging Communication
IEEE International Conference on Smart Grid Communications · 2022
4
cited
BeeHIVE: Behavioral Biometric System based on Object Interactions in Smart Environments
International Conference on Security and Cryptography · 2022
2
cited
DSNS: The Deep Space Network Simulator
arXiv.org · 2025
2
cited
KeySpace: Enhancing Public Key Infrastructure for Interplanetary Networks
2024
2
cited
Show all 34 papers →
Sotabase
Simon Birnbach | Researcher Profile | Sotabase | Sotabase