BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:64383231-3161-4661-a230-616661343161
X-WR-CALNAME:Physical-Layer Security Calendar
X-WR-CALDESC:Events of the lecture Physical-Layer Security
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:63616563-3333-4664-b734-326465363332
DTSTAMP:20260409T192736Z
DESCRIPTION:Introduction of students and faculty\, topic\, discussion of pa
 pers and format
DTSTART:20181023T141500Z
DTEND:20181023T163000Z
SUMMARY:Ps: Seminar 1: Introduction
END:VEVENT
BEGIN:VEVENT
UID:37396138-3761-4664-a536-383533343938
DTSTAMP:20260409T192736Z
DESCRIPTION:Presentation on 'How to give good presentations'\, how-to read 
 a paper\, discussion
DTSTART:20181030T151500Z
DTEND:20181030T170000Z
LOCATION:0.06
SUMMARY:Ps: Seminar 2: How-To
END:VEVENT
BEGIN:VEVENT
UID:62313635-6262-4633-b935-376635303631
DTSTAMP:20260409T192736Z
DESCRIPTION:- Alaeddine: Spectre Attacks: Exploiting Speculative Execution
 \n- Lena: Ghost talk: Mitigating EMI signal injection attacks against\nana
 log sensors
DTSTART:20181113T151500Z
DTEND:20181113T170000Z
LOCATION:0.06
SUMMARY:Ps: Seminar 3: Alaeddine and Lena
END:VEVENT
BEGIN:VEVENT
UID:63356138-3938-4466-a563-613366336131
DTSTAMP:20260409T192736Z
DESCRIPTION:- Finn: DolphinAttack: Inaudible Voice Commands\n- Arthur: They
  can hear your heartbeats
DTSTART:20181127T151500Z
DTEND:20181127T170000Z
LOCATION:0.06
SUMMARY:Ps: Seminar 4: Finn and Arthur
END:VEVENT
BEGIN:VEVENT
UID:35366538-6365-4339-a261-396332663636
DTSTAMP:20260409T192736Z
DESCRIPTION:-Dennis: Analyzing and Enhancing the Security of Ultrasonic Sen
 sors for\nAutonomous Vehicles\n- M.: Relay attacks on passive keyless entr
 y and start systems in modern\ncars
DTSTART:20181211T151500Z
DTEND:20181211T170000Z
LOCATION:0.06
SUMMARY:Ps: Seminar 5: Dennis and M.
END:VEVENT
BEGIN:VEVENT
UID:38356633-6130-4132-a331-336330323666
DTSTAMP:20260409T192736Z
DESCRIPTION:- Niklas: False data injection attacks against state estimation
  in\nelectric power grids.\n- the other M (who did not vote in doodle poll
 s): Hey\, My Malware Knows\nPhysics! Attacking PLCs with Physical Model Aw
 are Rootkit
DTSTART:20190108T151500Z
DTEND:20190108T170000Z
LOCATION:0.06
SUMMARY:Ps: Seminar 6: Niklas and M.
END:VEVENT
BEGIN:VEVENT
UID:62333365-6665-4535-b938-616437383031
DTSTAMP:20260409T192736Z
DESCRIPTION:As discussed\, all students will polish (and shorten to 15 minu
 tes) their\npresentation for a second run (which will determine 50% of the
  grade). I\nwould propose to have this on 22. January.
DTSTART:20190122T151500Z
DTEND:20190122T170000Z
LOCATION:0.06
SUMMARY:Ps: Seminar 7: Second Presentations (graded)
END:VEVENT
BEGIN:VEVENT
UID:34366563-6162-4466-a631-303331386661
DTSTAMP:20260409T192736Z
DESCRIPTION:Make-up date for Lena's second presentation (please everyone at
 tend)
DTSTART:20190205T151500Z
DTEND:20190205T155000Z
SUMMARY:Ps: Seminar 8: Lena's Second Presentations (graded)
END:VEVENT
END:VCALENDAR
