Ivan Martinovic : Publications
-
[1]
Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks
Joshua Smailes‚ Edd Salkield‚ Sebastian Köhler‚ Simon Birnbach‚ Martin Strohmeier and Ivan Martinovic
In 2nd Workshop on Security of Space and Satellite Systems (SpaceSec). March, 2024.
Details about Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks | BibTeX data for Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks | Download (pdf) of Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks | DOI (10.14722/spacesec.2024.23054)
-
[2]
RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection
Yashovardhan Sharma‚ Simon Birnbach and Ivan Martinovic
In Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference (EICC'23). Pages 159–166. Association for Computing Machinery (ACM). June, 2023.
Details about RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection | BibTeX data for RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection | DOI (https://doi.org/10.1145/3590777.3590804) | Link to RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection
-
[3]
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
Edd Salkield‚ Marcell Szakály‚ Joshua Smailes‚ Simon Birnbach‚ Sebastian Köhler‚ Martin Strohmeier and Ivan Martinovic
In Proceedings of the 16th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). May, 2023.
Best Paper Award: Runner Up!
Details about Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | BibTeX data for Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | Download (pdf) of Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | Link to Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
-
[4]
Dishing Out DoS: How to Disable and Secure the Starlink User Terminal
Joshua Smailes‚ Edd Salkield‚ Sebastian Köhler‚ Simon Birnbach and Ivan Martinovic
In arXiv preprint arXiv:2303.00582. March, 2023.
Details about Dishing Out DoS: How to Disable and Secure the Starlink User Terminal | BibTeX data for Dishing Out DoS: How to Disable and Secure the Starlink User Terminal | Download (pdf) of Dishing Out DoS: How to Disable and Secure the Starlink User Terminal | Link to Dishing Out DoS: How to Disable and Secure the Starlink User Terminal
-
[5]
BROKENWIRE: Wireless Disruption of CCS Electric Vehicle Charging
Sebastian Koehler‚ Richard Baker‚ Martin Strohmeier and Ivan Martinovic
In The Network and Distributed System Security Symposium (NDSS). February, 2023.
Details about BROKENWIRE: Wireless Disruption of CCS Electric Vehicle Charging | BibTeX data for BROKENWIRE: Wireless Disruption of CCS Electric Vehicle Charging | Download (pdf) of BROKENWIRE: Wireless Disruption of CCS Electric Vehicle Charging | Link to BROKENWIRE: Wireless Disruption of CCS Electric Vehicle Charging
-
[6]
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting
Joshua Smailes‚ Sebastian Köhler‚ Simon Birnbach‚ Martin Strohmeier and Ivan Martinovic
In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 23). November, 2023.
Details about Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | BibTeX data for Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | Download (pdf) of Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | DOI (10.1145/3576915.3623135) | Link to Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting
-
[7]
To TTP or not to TTP?: Exploiting TTPs to Improve ML−based Malware Detection
Yashovardhan Sharma‚ Eleonora Giunchiglia‚ Simon Birnbach and Ivan Martinovic
In 2023 IEEE International Conference on Cyber Security and Resilience (CSR). Pages 8−15. 2023.
Details about To TTP or not to TTP?: Exploiting TTPs to Improve ML−based Malware Detection | BibTeX data for To TTP or not to TTP?: Exploiting TTPs to Improve ML−based Malware Detection | DOI (10.1109/CSR57506.2023.10225000)
-
[8]
RADAR: A TTP−Based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection
Yashovardhan Sharma‚ Simon Birnbach and Ivan Martinovic
In Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference. Pages 159–166. New York‚ NY‚ USA. 2023. Association for Computing Machinery.
Details about RADAR: A TTP−Based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection | BibTeX data for RADAR: A TTP−Based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection | DOI (10.1145/3590777.3590804) | Link to RADAR: A TTP−Based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection
-
[9]
CableAuth: a biometric second factor authentication scheme for electric vehicle charging
Jack Sturgess‚ Sebastian Köhler‚ Simon Birnbach and Ivan Martinovic
In Proc. Inaugural Symposium on Vehicle Security and Privacy (VehicleSec 2023). Internet Society. 2023.
Details about CableAuth: a biometric second factor authentication scheme for electric vehicle charging | BibTeX data for CableAuth: a biometric second factor authentication scheme for electric vehicle charging
-
[10]
BROKENWIRE: wireless disruption of CCS electric vehicle charging
Sebastian Köhler‚ Richard Baker‚ Martin Strohmeier and Ivan Martinovic
In In Proc. Network and Distributed System Security (NDSS) Symposium 2023. Internet Society. 2023.
Details about BROKENWIRE: wireless disruption of CCS electric vehicle charging | BibTeX data for BROKENWIRE: wireless disruption of CCS electric vehicle charging
-
[11]
Security and Privacy Issues of Satellite Communication in the Aviation Domain
Georg Baselt‚ Martin Strohmeier‚ James Pavur‚ Vincent Lenders and Ivan Martinovic
In Cyber Conflict (CYCON)‚ 2022 14th International Conference on. May, 2022.
Details about Security and Privacy Issues of Satellite Communication in the Aviation Domain | BibTeX data for Security and Privacy Issues of Satellite Communication in the Aviation Domain | Download (pdf) of Security and Privacy Issues of Satellite Communication in the Aviation Domain
-
[12]
Fingerprinting and personal information leakage from touchscreen interactions
Martin Georgiev‚ Simon Eberz and Ivan Martinovic
In In Proc. 21st Workshop on Privacy in the Electronic Society (WPES 2022). ACM. 2022.
Details about Fingerprinting and personal information leakage from touchscreen interactions | BibTeX data for Fingerprinting and personal information leakage from touchscreen interactions
-
[13]
Exorcist: automated differential analysis to detect compromises in closed−source software supply chains
Frederick Barr−Smith‚ Richard Baker‚ Tim Blazytko and Ivan Martinovic
In In Proc. ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED '22). ACM. 2022.
Details about Exorcist: automated differential analysis to detect compromises in closed−source software supply chains | BibTeX data for Exorcist: automated differential analysis to detect compromises in closed−source software supply chains
-
[14]
Techniques for continuous touch−based authentication
Martin Georgiev‚ Simon Eberz and Ivan Martinovic
In In Proc. 17th International Conference on Information Security Practice and Experience (ISPEC 2022). Springer. 2022.
Details about Techniques for continuous touch−based authentication | BibTeX data for Techniques for continuous touch−based authentication
-
[15]
On the security of the wireless electric vehicle charging communication
Sebastian Köhler‚ Simon Birnbach‚ Richard Baker and Ivan Martinovic
In Proc. Workshop Cybersecurity of Electric Vehicle Charging and Smart Grid Resources (SECEVC). IEEE. 2022.
Details about On the security of the wireless electric vehicle charging communication | BibTeX data for On the security of the wireless electric vehicle charging communication
-
[16]
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch
Jack Sturgess‚ Simon Eberz‚ Ivo Sluganovic and Ivan Martinovic
In Proc. 7th IEEE European Symposium on Security and Privacy (EuroS&P). IEEE. 2022.
Details about WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch | BibTeX data for WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch
-
[17]
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch
Jack Sturgess‚ Simon Eberz‚ Ivo Sluganovic and Ivan Martinovic
In Proc. 7th IEEE European Symposium on Security and Privacy (EuroS&P). IEEE. 2022.
Details about WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch | BibTeX data for WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch
-
[18]
Biometric identification system based on object interactions in Internet of Things environments
Klaudia Krawiecka‚ Simon Birnbach‚ Simon Eberz and Ivan Martinovic
In Proc. IEEE Workshop on the Internet of Safe Things: SafeThings 2022. IEEE. 2022.
Details about Biometric identification system based on object interactions in Internet of Things environments | BibTeX data for Biometric identification system based on object interactions in Internet of Things environments
-
[19]
Common Evaluation Pitfalls in Touch−Based Authentication Systems
Martin Georgiev‚ Simon Eberz‚ Henry Turner‚ Giulio Lovisotto and Ivan Martinovic
In Proc. 2022 ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022). ACM. 2022.
Details about Common Evaluation Pitfalls in Touch−Based Authentication Systems | BibTeX data for Common Evaluation Pitfalls in Touch−Based Authentication Systems
-
[20]
99% false positives: A qualitative study of SOC analysts' perspectives on security alarms
Bushra AlAhmadi‚ Louise Axon and Ivan Martinovic
In Proc. 31st USENIX Security Symposium. 2022.
Details about 99% false positives: A qualitative study of SOC analysts' perspectives on security alarms | BibTeX data for 99% false positives: A qualitative study of SOC analysts' perspectives on security alarms
-
[21]
Signal injection attacks against CCD image sensors
Sebastian Kohler‚ Richard Baker and Ivan Martinovic
In Proc. 2022 ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022). ACM. 2022.
Details about Signal injection attacks against CCD image sensors | BibTeX data for Signal injection attacks against CCD image sensors
-
[22]
Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch
Jack Sturgess‚ Simon Eberz‚ Ivo Sluganovic and Ivan Martinovic
In Proc. WristSense 2022: Workshop on Sensing Systems and Applications Using Wrist Worn Smart Devices. IEEE. 2022.
Details about Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch | BibTeX data for Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch
-
[23]
Studying Neutrality in Cyber−Space: A Comparative Geographical Analysis of Honeypot Responses
Martin Strohmeier‚ James Pavur‚ Ivan Martinovic and Vincent Lenders
In International Conference on Critical Information Infrastructures Security. Springer. September, 2021.
Details about Studying Neutrality in Cyber−Space: A Comparative Geographical Analysis of Honeypot Responses | BibTeX data for Studying Neutrality in Cyber−Space: A Comparative Geographical Analysis of Honeypot Responses | Download (pdf) of Studying Neutrality in Cyber−Space: A Comparative Geographical Analysis of Honeypot Responses | DOI (10.1007/978-3-030-93200-8_11) | Link to Studying Neutrality in Cyber−Space: A Comparative Geographical Analysis of Honeypot Responses
-
[24]
SLAP: Improving Physical Adversarial Examples with Short−Lived Adversarial Perturbations
Giulio Lovisotto‚ Henry Turner‚ Ivo Sluganovic‚ Martin Strohmeier and Ivan Martinovic
In 30th USENIX Security Symposium (USENIX Security 21). August, 2021.
Details about SLAP: Improving Physical Adversarial Examples with Short−Lived Adversarial Perturbations | BibTeX data for SLAP: Improving Physical Adversarial Examples with Short−Lived Adversarial Perturbations | Download (pdf) of SLAP: Improving Physical Adversarial Examples with Short−Lived Adversarial Perturbations | Link to SLAP: Improving Physical Adversarial Examples with Short−Lived Adversarial Perturbations
-
[25]
You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications
Joshua Smailes‚ Daniel Moser‚ Matthew Smith‚ Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In Proceedings of the 7th ACM Cyber−Physical System Security Workshop (CPSS 2021). June, 2021.
Best Paper Award!
Details about You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications | BibTeX data for You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications | Download (pdf) of You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications | DOI (10.1145/3457339.3457985) | Link to You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications
-
[26]
In the Same Boat: On Small Satellites‚ Big Rockets‚ and Cyber−Trust
James Pavur‚ Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In 13th International Conference on Cyber Conflict (CyCon). IEEE. May, 2021.
Details about In the Same Boat: On Small Satellites‚ Big Rockets‚ and Cyber−Trust | BibTeX data for In the Same Boat: On Small Satellites‚ Big Rockets‚ and Cyber−Trust | Download (pdf) of In the Same Boat: On Small Satellites‚ Big Rockets‚ and Cyber−Trust
-
[27]
QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit
James Pavur‚ Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In The Network and Distributed System Security Symposium (NDSS). February, 2021.
Details about QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit | BibTeX data for QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit | Link to QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit
-
[28]
Classi−Fly: Inferring Aircraft Categories from Open Data
Martin Strohmeier‚ Matthew Smith‚ Vincent Lenders and Ivan Martinovic
In ACM Transactions on Intelligent Systems and Technology (TIST). Vol. 12. No. 6. December, 2021.
Details about Classi−Fly: Inferring Aircraft Categories from Open Data | BibTeX data for Classi−Fly: Inferring Aircraft Categories from Open Data | DOI (10.1145/3480969) | Link to Classi−Fly: Inferring Aircraft Categories from Open Data
-
[29]
OpenSky Report 2021: Insights on ADS−B Mandate and Fleet Deployment in Times of Crisis
Junzi Sun‚ Xavier Olive‚ Martin Strohmeier‚ Matthias Schäfer‚ Ivan Martinovic and Vincent Lenders
In 2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC). IEEE. October, 2021.
Details about OpenSky Report 2021: Insights on ADS−B Mandate and Fleet Deployment in Times of Crisis | BibTeX data for OpenSky Report 2021: Insights on ADS−B Mandate and Fleet Deployment in Times of Crisis | Download (pdf) of OpenSky Report 2021: Insights on ADS−B Mandate and Fleet Deployment in Times of Crisis | DOI (10.1109/DASC52595.2021.9594361) | Link to OpenSky Report 2021: Insights on ADS−B Mandate and Fleet Deployment in Times of Crisis
-
[30]
#PrettyFlyForAWiFi: real−world detection of privacy invasion attacks by drones
Simon Birnbach‚ Richard Baker‚ Simon Eberz and Ivan Martinovic
In ACM Transactions on Privacy and Security. 2021.
Details about #PrettyFlyForAWiFi: real−world detection of privacy invasion attacks by drones | BibTeX data for #PrettyFlyForAWiFi: real−world detection of privacy invasion attacks by drones | DOI (10.1145/3473672)
-
[31]
Haunted house: physical smart home event verification in the presence of compromised sensors
Simon Birnbach‚ Simon Eberz and Ivan Martinovic
In ACM Transactions on Internet of Things. 2021.
Details about Haunted house: physical smart home event verification in the presence of compromised sensors | BibTeX data for Haunted house: physical smart home event verification in the presence of compromised sensors
-
[32]
Generating identities with mixture models for speaker anonymization
Henry Turner‚ Giulio Lovisotto and Ivan Martinovic
In Computer Speech and Language 72. 2021.
Details about Generating identities with mixture models for speaker anonymization | BibTeX data for Generating identities with mixture models for speaker anonymization | DOI (10.1016/j.csl.2021.101318)
-
[33]
On detecting deception in space situational awareness
James Pavur and Ivan Martinovic
In Proc. 16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2021). ACM. 2021.
Details about On detecting deception in space situational awareness | BibTeX data for On detecting deception in space situational awareness | DOI (10.1145/3433210.3453081)
-
[34]
Plug−and−play: Framework for remote experimentation in cyber security
Klaudia Krawiecka‚ Jack Sturgess‚ Alina Petrova and Ivan Martinovic
In Proc. 2021 European Symposium on Usable Security (EuroUSEC 2021). ACM. 2021.
Details about Plug−and−play: Framework for remote experimentation in cyber security | BibTeX data for Plug−and−play: Framework for remote experimentation in cyber security | DOI (10.1145/3481357.3481518)
-
[35]
They see me rollin': inherent vulnerability of the rolling shutter in CMOS image sensors
Sebastian Köhler‚ Giulio Lovisotto‚ Simon Birnbach‚ Richard Baker and Ivan Martinovic
In Proc. Annual Computer Security Applications Conference (ACSAC 2021). ACM. 2021.
Details about They see me rollin': inherent vulnerability of the rolling shutter in CMOS image sensors | BibTeX data for They see me rollin': inherent vulnerability of the rolling shutter in CMOS image sensors | DOI (10.1145/3485832.3488016)
-
[36]
MalPhase: Fine−Grained Malware Detection Using Network Flow Data
Michal Piskozub‚ Fabio De Gaspari‚ Freddie Barr−Smith‚ Luigi Mancini and Ivan Martinovic
2021.
Details about MalPhase: Fine−Grained Malware Detection Using Network Flow Data | BibTeX data for MalPhase: Fine−Grained Malware Detection Using Network Flow Data
-
[37]
Survivalism: Systematic Analysis of Windows Malware Living−Off−The−Land
Frederick Barr−Smith‚ Xabier Ugarte−Pedrero‚ Mariano Graziano‚ Riccardo Spolaor and Ivan Martinovic
In 2021 IEEE Symposium on Security and Privacy (SP). IEEE. 2021.
Details about Survivalism: Systematic Analysis of Windows Malware Living−Off−The−Land | BibTeX data for Survivalism: Systematic Analysis of Windows Malware Living−Off−The−Land
-
[38]
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating
Giulio Lovisotto‚ Simon Eberz and Ivan Martinovic
In 2020 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE. September, 2020.
Details about Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating | BibTeX data for Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating | DOI (10.1109/EuroSP48549.2020.00020) | Link to Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating
-
[39]
Seeing Red: PPG Biometrics Using Smartphone Cameras
Giulio Lovisotto‚ Henry Turner‚ Simon Eberz and Ivan Martinovic
In IEEE 15th Computer Society Workshop on Biometrics. IEEE. June, 2020.
Details about Seeing Red: PPG Biometrics Using Smartphone Cameras | BibTeX data for Seeing Red: PPG Biometrics Using Smartphone Cameras
-
[40]
A Tale of Sea and Sky: On the Security of Maritime VSAT Communications
James Pavur‚ Daniel Moser‚ Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In 2020 IEEE Symposium on Security and Privacy (S&P). IEEE. May, 2020.
Details about A Tale of Sea and Sky: On the Security of Maritime VSAT Communications | BibTeX data for A Tale of Sea and Sky: On the Security of Maritime VSAT Communications | Download (pdf) of A Tale of Sea and Sky: On the Security of Maritime VSAT Communications | DOI (10.1109/SP40000.2020.00056) | Link to A Tale of Sea and Sky: On the Security of Maritime VSAT Communications
-
[41]
A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems
Matthew Smith‚ Martin Strohmeier‚ Jon Harman‚ Vincent Lenders and Ivan Martinovic
In The Network and Distributed System Security Symposium (NDSS). February, 2020.
Details about A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems | BibTeX data for A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems | Download (pdf) of A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems | Link to A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems
-
[42]
Understanding Realistic Attacks on Airborne Collision Avoidance Systems
Matthew Smith‚ Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In arXiv preprint arXiv:2010.01034. 2020.
Details about Understanding Realistic Attacks on Airborne Collision Avoidance Systems | BibTeX data for Understanding Realistic Attacks on Airborne Collision Avoidance Systems
-
[43]
On the Applicability of Satellite−based Air Traffic Control Communication for Security
Martin Strohmeier‚ Daniel Moser‚ Matthias Schäfer‚ Vincent Lenders and Ivan Martinovic
In IEEE Communications Magazine. Vol. 57. No. 9. Pages 79 − 85. September, 2019.
Details about On the Applicability of Satellite−based Air Traffic Control Communication for Security | BibTeX data for On the Applicability of Satellite−based Air Traffic Control Communication for Security | Download (pdf) of On the Applicability of Satellite−based Air Traffic Control Communication for Security | DOI (10.1109/MCOM.001.1900037) | Link to On the Applicability of Satellite−based Air Traffic Control Communication for Security
-
[44]
OpenSky Report 2019: Analysing TCAS in the Real World using Big Data
Matthias Schäfer‚ Xavier Olive‚ Martin Strohmeier‚ Matthew Smith‚ Ivan Martinovic and Vincent Lenders
In 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC). Pages 1–9. IEEE. September, 2019.
Details about OpenSky Report 2019: Analysing TCAS in the Real World using Big Data | BibTeX data for OpenSky Report 2019: Analysing TCAS in the Real World using Big Data | Download (pdf) of OpenSky Report 2019: Analysing TCAS in the Real World using Big Data | DOI (10.1109/DASC43569.2019.9081686) | Link to OpenSky Report 2019: Analysing TCAS in the Real World using Big Data
-
[45]
Classi−Fly: Inferring Aircraft Categories from Open Data
Martin Strohmeier‚ Matthew Smith‚ Vincent Lenders and Ivan Martinovic
In arXiv preprint arXiv:1908.01061. August, 2019.
Details about Classi−Fly: Inferring Aircraft Categories from Open Data | BibTeX data for Classi−Fly: Inferring Aircraft Categories from Open Data | Link to Classi−Fly: Inferring Aircraft Categories from Open Data
-
[46]
Safety vs. Security: Attacking Avionic Systems with Humans in the Loop
Matthew Smith‚ Martin Strohmeier‚ Jon Harman‚ Vincent Lenders and Ivan Martinovic
In arXiv preprint arXiv:1905.08039. May, 2019.
Details about Safety vs. Security: Attacking Avionic Systems with Humans in the Loop | BibTeX data for Safety vs. Security: Attacking Avionic Systems with Humans in the Loop | Link to Safety vs. Security: Attacking Avionic Systems with Humans in the Loop
-
[47]
Peeves: Physical Event Verification in Smart Homes
Simon Birnbach‚ Simon Eberz and Ivan Martinovic
In Proceedings of the 2019 ACM Conference on Computer and Communications Security (CCS). 2019.
Details about Peeves: Physical Event Verification in Smart Homes | BibTeX data for Peeves: Physical Event Verification in Smart Homes
-
[48]
Losing the Car Keys: Wireless PHY−Layer Insecurity in EV Charging
Richard Baker and Ivan Martinovic
In 28th USENIX Security Symposium (USENIX Security 19). Pages 407–424. 2019.
Details about Losing the Car Keys: Wireless PHY−Layer Insecurity in EV Charging | BibTeX data for Losing the Car Keys: Wireless PHY−Layer Insecurity in EV Charging
-
[49]
Attacking Speaker Recognition Systems with Phoneme Morphing
Henry Turner‚ Giulio Lovisotto and Ivan Martinovic
In European Symposium on Research in Computer Security (ESORICS). Pages 471–492. Springer. 2019.
Details about Attacking Speaker Recognition Systems with Phoneme Morphing | BibTeX data for Attacking Speaker Recognition Systems with Phoneme Morphing | DOI (10.1007/978-3-030-29959-0_23)
-
[50]
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics
Simon Eberz‚ Giulio Lovisotto‚ Kasper B Rasmussen‚ Vincent Lenders and Ivan Martinovic
In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Pages 1187–1199. ACM. 2019.
Details about 28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics | BibTeX data for 28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics | DOI (10.1145/3319535.3354233)
-
[51]
OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS−B Data
Matthias Schäfer‚ Martin Strohmeier‚ Matthew Smith‚ Markus Fuchs‚ Vincent Lenders and Ivan Martinovic
In Digital Avionics Systems Conference (DASC)‚ 2018 IEEE/AIAA 37th. September, 2018.
Details about OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS−B Data | BibTeX data for OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS−B Data | Download (pdf) of OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS−B Data | DOI (10.1109/DASC.2018.8569833) | Link to OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS−B Data
-
[52]
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)
Matthew Smith‚ Daniel Moser‚ Martin Strohmeier‚ Ivan Martinovic and Vincent Lenders
In 18th Privacy Enhancing Technologies Symposium (PETS 2018). Barcelona. July, 2018.
Details about Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS) | BibTeX data for Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS) | Download (pdf) of Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS) | DOI (10.1515/popets-2018-0023) | Link to Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)
-
[53]
A k−NN−based Localization Approach for Crowdsourced Air Traffic Communication Networks
Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In IEEE Transactions on Aerospace and Electronic Systems. Vol. 54. No. 3. Pages 1519 − 1529. June, 2018.
Details about A k−NN−based Localization Approach for Crowdsourced Air Traffic Communication Networks | BibTeX data for A k−NN−based Localization Approach for Crowdsourced Air Traffic Communication Networks | Download (pdf) of A k−NN−based Localization Approach for Crowdsourced Air Traffic Communication Networks | DOI (10.1109/TAES.2018.2797760) | Link to A k−NN−based Localization Approach for Crowdsourced Air Traffic Communication Networks
-
[54]
Utilizing Air Traffic Communications for OSINT on State and Government Aircraft
Martin Strohmeier‚ Matthew Smith‚ Daniel Moser‚ Matthias Schäfer‚ Vincent Lenders and Ivan Martinovic
In Cyber Conflict (CYCON)‚ 2018 10th International Conference on. IEEE. May, 2018.
Details about Utilizing Air Traffic Communications for OSINT on State and Government Aircraft | BibTeX data for Utilizing Air Traffic Communications for OSINT on State and Government Aircraft | Download (pdf) of Utilizing Air Traffic Communications for OSINT on State and Government Aircraft | DOI (10.23919/CYCON.2018.8405023) | Link to Utilizing Air Traffic Communications for OSINT on State and Government Aircraft
-
[55]
The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication
Martin Strohmeier‚ Matthew Smith‚ Vincent Lenders and Ivan Martinovic
In IEEE European Symposium on Security and Privacy (EuroS&P) 2018. IEEE. April, 2018.
Details about The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication | BibTeX data for The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication | Download (pdf) of The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication | DOI (10.1109/EuroSP.2018.00016) | Link to The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication
-
[56]
EMPower: Detecting Malicious Power Line Networks from EM Emissions
Richard Baker and Ivan Martinovic
In IFIP International Conference on ICT Systems Security and Privacy Protection. Pages 108–121. Springer. 2018.
Details about EMPower: Detecting Malicious Power Line Networks from EM Emissions | BibTeX data for EMPower: Detecting Malicious Power Line Networks from EM Emissions
-
[57]
When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts
Simon Eberz‚ Giulio Lovisotto‚ Andrea Patane‚ Marta Kwiatkowska‚ Vincent Lenders and Ivan Martinovic
In 2018 IEEE Symposium on Security and Privacy (SP). Pages 889–905. IEEE. 2018.
Details about When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts | BibTeX data for When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts | DOI (10.1109/SP.2018.00053)
-
[58]
Snoopy: Sniffing Your Smartwatches Passwords via Deep Sequence Learning
Chris Xiaoxuan Lu‚ Bowen Du‚ Hongkai Wen‚ Sen Wang‚ Andrew Markham‚ Ivan Martinovic‚ Yiran Shen and Niki Trigoni
In ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp). 2018.
Details about Snoopy: Sniffing Your Smartwatches Passwords via Deep Sequence Learning | BibTeX data for Snoopy: Sniffing Your Smartwatches Passwords via Deep Sequence Learning | Download slides.key of Snoopy: Sniffing Your Smartwatches Passwords via Deep Sequence Learning | Download [UbiComp2018]snoopy.pdf of Snoopy: Sniffing Your Smartwatches Passwords via Deep Sequence Learning
-
[59]
On Perception and Reality in Wireless Air Traffic Communication Security
Martin Strohmeier‚ Matthias Schäfer‚ Rui Pinheiro‚ Vincent Lenders and Ivan Martinovic
In IEEE Transactions on Intelligent Transportation Systems. Vol. 18. No. 6. Pages 1338−1357. June, 2017.
Details about On Perception and Reality in Wireless Air Traffic Communication Security | BibTeX data for On Perception and Reality in Wireless Air Traffic Communication Security | Download (pdf) of On Perception and Reality in Wireless Air Traffic Communication Security | DOI (10.1109/TITS.2016.2612584) | Link to On Perception and Reality in Wireless Air Traffic Communication Security
-
[60]
Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS)
Matthew Smith‚ Daniel Moser‚ Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In ArXiv e−prints. May, 2017.
Details about Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS) | BibTeX data for Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS) | Download (pdf) of Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS)
-
[61]
Crowdsourcing Security for Wireless Air Traffic Communications
Martin Strohmeier‚ Matthew Smith‚ Matthias Schäfer‚ Vincent Lenders and Ivan Martinovic
In Cyber Conflict (CYCON)‚ 2017 9th International Conference on. IEEE. May, 2017.
Details about Crowdsourcing Security for Wireless Air Traffic Communications | BibTeX data for Crowdsourcing Security for Wireless Air Traffic Communications | Download (pdf) of Crowdsourcing Security for Wireless Air Traffic Communications | DOI (10.23919/CYCON.2017.8240336) | Link to Crowdsourcing Security for Wireless Air Traffic Communications
-
[62]
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS
Matthew Smith‚ Daniel Moser‚ Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In International Conference on Financial Cryptography and Data Security 2017. Springer. April, 2017.
Details about Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS | BibTeX data for Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS | Download (pdf) of Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS | DOI (10.1007/978-3-319-70972-7_15) | Link to Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS
-
[63]
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens
Ivo Sluganovic‚ Matej Serbec‚ Ante Derek and Ivan Martinovic
In Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017). Pages 13. December, 2017.
Details about HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens | BibTeX data for HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens | Download (pdf) of HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens
-
[64]
Wi−Fly?: Detecting Privacy Invasion Attacks by Consumer Drones
Simon Birnbach‚ Richard Baker and Ivan Martinovic
In Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS). 2017.
Details about Wi−Fly?: Detecting Privacy Invasion Attacks by Consumer Drones | BibTeX data for Wi−Fly?: Detecting Privacy Invasion Attacks by Consumer Drones
-
[65]
Mobile Biometrics in Financial Services: A Five Factor Framework
Giulio Lovisotto‚ Raghav Malik‚ Ivo Sluganovic‚ Marc Roeschlin‚ Paul Trueman and Ivan Martinovic
2017.
Details about Mobile Biometrics in Financial Services: A Five Factor Framework | BibTeX data for Mobile Biometrics in Financial Services: A Five Factor Framework | Download (pdf) of Mobile Biometrics in Financial Services: A Five Factor Framework
-
[66]
OpenSky Report 2016: Facts and Figures on SSR Mode S and ADS−B Usage
Matthias Schäfer‚ Martin Strohmeier‚ Matthew Smith‚ Markus Fuchs‚ Rui Pinheiro‚ Vincent Lenders and Ivan Martinovic
In Digital Avionics Systems Conference (DASC)‚ 2016 IEEE/AIAA 35th. September, 2016.
Details about OpenSky Report 2016: Facts and Figures on SSR Mode S and ADS−B Usage | BibTeX data for OpenSky Report 2016: Facts and Figures on SSR Mode S and ADS−B Usage | Download (pdf) of OpenSky Report 2016: Facts and Figures on SSR Mode S and ADS−B Usage | DOI (10.1109/DASC.2016.7778030) | Link to OpenSky Report 2016: Facts and Figures on SSR Mode S and ADS−B Usage
-
[67]
Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics
Simon Eberz‚ Kasper B. Rasmussen‚ Vincent Lenders and Ivan Martinovic
In ACM Transactions on Privacy and Security. Vol. 19. No. 1. June, 2016.
Details about Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics | BibTeX data for Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics | Download (pdf) of Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics
-
[68]
Assessing the Impact of Aviation Security on Cyber Power
Martin Strohmeier‚ Matthew Smith‚ Matthias Schäfer‚ Vincent Lenders and Ivan Martinovic
In Cyber Conflict (CYCON)‚ 2016 8th International Conference on. IEEE. May, 2016.
Details about Assessing the Impact of Aviation Security on Cyber Power | BibTeX data for Assessing the Impact of Aviation Security on Cyber Power | Download (pdf) of Assessing the Impact of Aviation Security on Cyber Power | DOI (10.1109/CYCON.2016.7529437) | Link to Assessing the Impact of Aviation Security on Cyber Power
-
[69]
Exposing Transmitters in Mobile Multi−Agent Games
Ben−Adar Bessos‚ Mai‚ Simon Birnbach‚ Amir Herzberg and Ivan Martinovic
In Proceedings of the 2nd ACM Workshop on Cyber−Physical Systems Security and Privacy (CPS−SPC). Pages 125–136. ACM. 2016.
Details about Exposing Transmitters in Mobile Multi−Agent Games | BibTeX data for Exposing Transmitters in Mobile Multi−Agent Games
-
[70]
Secure location verification with a mobile receiver
Richard Baker and Ivan Martinovic
In Proceedings of the 2nd ACM Workshop on Cyber−Physical Systems Security and Privacy. Pages 35–46. 2016.
Details about Secure location verification with a mobile receiver | BibTeX data for Secure location verification with a mobile receiver
-
[71]
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
Simon Eberz‚ Kasper B. Rasmussen‚ Vincent Lenders and Ivan Martinovic
In The Network and Distributed System Security Symposium (NDSS). February, 2015.
Details about Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics | BibTeX data for Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
-
[72]
On the Security of the Automatic Dependent Surveillance−Broadcast Protocol
Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In IEEE Communications Surveys & Tutorials. Vol. 17. No. 2. Pages 1066 − 1087. 2015.
Details about On the Security of the Automatic Dependent Surveillance−Broadcast Protocol | BibTeX data for On the Security of the Automatic Dependent Surveillance−Broadcast Protocol | Download (pdf) of On the Security of the Automatic Dependent Surveillance−Broadcast Protocol | DOI (10.1109/COMST.2014.2365951) | Link to On the Security of the Automatic Dependent Surveillance−Broadcast Protocol
-
[73]
Bringing Up OpenSky: A Large−scale ADS−B Sensor Network for Research
Matthias Schäfer‚ Martin Strohmeier‚ Vincent Lenders‚ Ivan Martinovic and Matthias Wilhelm
In ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN). April, 2014.
Details about Bringing Up OpenSky: A Large−scale ADS−B Sensor Network for Research | BibTeX data for Bringing Up OpenSky: A Large−scale ADS−B Sensor Network for Research
-
[74]
Authentication Using Pulse−Response Biometrics
Kasper Bonne Rasmussen‚ Marc Roeschlin‚ Ivan Martinovic and Gene Tsudik
In The Network and Distributed System Security Symposium (NDSS). February, 2014.
Details about Authentication Using Pulse−Response Biometrics | BibTeX data for Authentication Using Pulse−Response Biometrics
-
[75]
Realities and Challenges of NextGen Air Traffic Management: The Case of ADS−B
Martin Strohmeier‚ Matthias Schäfer‚ Vincent Lenders and Ivan Martinovic
In Communications Magazine‚ IEEE. Vol. 52. No. 5. 2014.
Details about Realities and Challenges of NextGen Air Traffic Management: The Case of ADS−B | BibTeX data for Realities and Challenges of NextGen Air Traffic Management: The Case of ADS−B
-
[76]
Gaining Insight on Friendly Jamming in a Real−world IEEE 802.11 Network
Daniel S. Berger‚ Francesco Gringoli‚ Nicol‘o Facchi‚ Ivan Martinovic and Jens Schmitt
In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks. Pages 105–116. New York‚ NY‚ USA. 2014. ACM.
Details about Gaining Insight on Friendly Jamming in a Real−world IEEE 802.11 Network | BibTeX data for Gaining Insight on Friendly Jamming in a Real−world IEEE 802.11 Network | DOI (10.1145/2627393.2627403) | Download (pdf) of Gaining Insight on Friendly Jamming in a Real−world IEEE 802.11 Network
-
[77]
Secure Key Generation in Sensor Networks Based on Frequency−selective Channels
Matthias Wilhelm‚ Ivan Martinovic and Jens Schmitt
In IEEE Journal on Selected Areas in Communications (JSAC) − Signal Processing Techniques for Wireless Physical Layer Security. Vol. 31. No. 9. Pages 1779−1790. September, 2013.
Details about Secure Key Generation in Sensor Networks Based on Frequency−selective Channels | BibTeX data for Secure Key Generation in Sensor Networks Based on Frequency−selective Channels | Link to Secure Key Generation in Sensor Networks Based on Frequency−selective Channels
-
[78]
Touchalytics: On the Applicability of Touchscreen Input as a Behavioural Biometric for Continuous Authentication
Mario Frank‚ Ralf Biedert‚ Eugene Ma‚ Ivan Martinovic and Dawn Song
In IEEE Transactions on Information Forensics and Security. Vol. 8. No. 1. January, 2013.
Details about Touchalytics: On the Applicability of Touchscreen Input as a Behavioural Biometric for Continuous Authentication | BibTeX data for Touchalytics: On the Applicability of Touchscreen Input as a Behavioural Biometric for Continuous Authentication | DOI (10.1109/TIFS.2012.2225048)
-
[79]
SAFE: Secure Authentication with Face and Eyes
Arman Boehm‚ Dongqu Chen‚ Mario Frank‚ Ling Huang‚ Cynthia Kuo‚ Tihomir Lolic‚ Ivan Martinovic and Dawn Song
In Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems (successor of MobiSec). Proceedings in preparation.. 2013.
Best Paper Award
Details about SAFE: Secure Authentication with Face and Eyes | BibTeX data for SAFE: Secure Authentication with Face and Eyes | Download (pdf) of SAFE: Secure Authentication with Face and Eyes
-
[80]
Experimental Analysis of Attacks on Next Generation Air Traffic Communication
Matthias Schäfer‚ Vincent Lenders and Ivan Martinovic
In Applied Cryptography and Network Security (ACNS’13). Vol. 7954 of Lecture Notes in Computer Science. Pages 253−271. Springer Berlin Heidelberg. 2013.
Details about Experimental Analysis of Attacks on Next Generation Air Traffic Communication | BibTeX data for Experimental Analysis of Attacks on Next Generation Air Traffic Communication | DOI (10.1007/978-3-642-38980-1_16) | Link to Experimental Analysis of Attacks on Next Generation Air Traffic Communication
-
[81]
Who do you sync you are: smartphone fingerprinting via application behaviour
Tim Stöber‚ Mario Frank‚ Jens Schmitt and Ivan Martinovic
In Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks. Pages 7–12. ACM. 2013.
Details about Who do you sync you are: smartphone fingerprinting via application behaviour | BibTeX data for Who do you sync you are: smartphone fingerprinting via application behaviour
-
[82]
Security of ADS−B: State of the Art and Beyond
Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
No. RR−13−10. DCS. 2013.
Details about Security of ADS−B: State of the Art and Beyond | BibTeX data for Security of ADS−B: State of the Art and Beyond | Download (pdf) of Security of ADS−B: State of the Art and Beyond
-
[83]
A Practical Man−In−The−Middle Attack on Signal−Based Key Generation Protocols
Simon Eberz‚ Martin Strohmeier‚ Matthias Wilhelm and Ivan Martinovic
In 17th European Symposium on Research in Computer Security (ESORICS). Vol. 7459 of Lecture Notes in Computer Science. Pages 235−252. Springer. September, 2012.
Details about A Practical Man−In−The−Middle Attack on Signal−Based Key Generation Protocols | BibTeX data for A Practical Man−In−The−Middle Attack on Signal−Based Key Generation Protocols | Download (pdf) of A Practical Man−In−The−Middle Attack on Signal−Based Key Generation Protocols | DOI (10.1007/978-3-642-33167-1_14) | Link to A Practical Man−In−The−Middle Attack on Signal−Based Key Generation Protocols
-
[84]
On the Feasibility of Side−channel Attacks with Brain−computer Interfaces
Ivan Martinovic‚ Doug Davies‚ Mario Frank‚ Daniele Perito‚ Tomas Ros and Dawn Song
In Proceedings of the 21st USENIX Conference on Security Symposium. Pages 34–46. Berkeley‚ CA‚ USA. August, 2012. USENIX Association.
Details about On the Feasibility of Side−channel Attacks with Brain−computer Interfaces | BibTeX data for On the Feasibility of Side−channel Attacks with Brain−computer Interfaces | Download (pdf) of On the Feasibility of Side−channel Attacks with Brain−computer Interfaces
-
[85]
Stimuli for Gaze Based Intrusion Detection
Ralf Biedert‚ Mario Frank‚ Ivan Martinovic and Dawn Song
In Future Information Technology‚ Application‚ and Service. Vol. 164 of Lecture Notes in Electrical Engineering. Pages 757−763. Springer Netherlands. July, 2012.
10.1007/978−94−007−4516−2_80
Details about Stimuli for Gaze Based Intrusion Detection | BibTeX data for Stimuli for Gaze Based Intrusion Detection | Link to Stimuli for Gaze Based Intrusion Detection
-
[86]
WiFire: A Firewall for Wireless Networks
Matthias Wilhelm‚ Ivan Martinovic‚ Jens B. Schmitt and Vincent Lenders
In Proceedings of the ACM SIGCOMM 2011 Conference on Applications‚ Technologies‚ Architectures‚ and Protocols for Computer Communications (SIGCOMM '11). Pages 456–457. New York‚ NY‚ USA. August, 2011. ACM.
Details about WiFire: A Firewall for Wireless Networks | BibTeX data for WiFire: A Firewall for Wireless Networks
-
[87]
Reactive Jamming in Wireless Networks: How Realistic is the Threat?
Matthias Wilhelm‚ Ivan Martinovic‚ Jens B. Schmitt and Vincent Lenders
In Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec '11). Pages 47–52. New York‚ NY‚ USA. June, 2011. ACM.
Details about Reactive Jamming in Wireless Networks: How Realistic is the Threat? | BibTeX data for Reactive Jamming in Wireless Networks: How Realistic is the Threat? | Link to Reactive Jamming in Wireless Networks: How Realistic is the Threat?
-
[88]
Pay Bursts Only Once Holds for (Some) Non−FIFO Systems
Jens B. Schmitt‚ Nicos Gollan‚ Steffen Bondorf and Ivan Martinovic
In The 30th IEEE International Conference on Computer Communications (INFOCOM 2011). Shanghai‚ China. April, 2011.
Accepted for publication.
Details about Pay Bursts Only Once Holds for (Some) Non−FIFO Systems | BibTeX data for Pay Bursts Only Once Holds for (Some) Non−FIFO Systems
-
[89]
WiSec 2011 Demo: RFReact—A Real−time Capable and Channel−aware Jamming Platform
Matthias Wilhelm‚ Ivan Martinovic‚ Jens B. Schmitt and Vincent Lenders
In SIGMOBILE Mobile Computing and Communications Review. Vol. 15. Pages 41–42. November, 2011.
Details about WiSec 2011 Demo: RFReact—A Real−time Capable and Channel−aware Jamming Platform | BibTeX data for WiSec 2011 Demo: RFReact—A Real−time Capable and Channel−aware Jamming Platform | DOI (http://doi.acm.org/10.1145/2073290.2073300) | Link to WiSec 2011 Demo: RFReact—A Real−time Capable and Channel−aware Jamming Platform
-
[90]
Pay Bursts Only Once Holds for (Some) Non−FIFO Systems
Jens Schmitt‚ Nicos Gollan‚ Steffen Bondorf and Ivan Martinovic
No. 378/10. University of Kaiserslautern‚ Germany. July, 2010.
Details about Pay Bursts Only Once Holds for (Some) Non−FIFO Systems | BibTeX data for Pay Bursts Only Once Holds for (Some) Non−FIFO Systems
-
[91]
Experiental Design and Analysis of Transmission Properties in an Indoor Wireless Sensor Network
Dennis Christmann and Ivan Martinovic
In Proceedings of the 6th International Workshop on Wireless Network Measurements (WiNMee)‚ in conjunction with WiOpt 2010. Avignon‚ France. May, 2010. IEEE Computer Society.
Details about Experiental Design and Analysis of Transmission Properties in an Indoor Wireless Sensor Network | BibTeX data for Experiental Design and Analysis of Transmission Properties in an Indoor Wireless Sensor Network
-
[92]
Key Generation in Wireless Sensor Networks Based on Frequency−selective Channels: Design‚ Implementation‚ and Analysis
Matthias Wilhelm‚ Ivan Martinovic and Jens B. Schmitt
No. arXiv:1005.0712v1 [cs.CR]. ArXiv.org. May, 2010.
Details about Key Generation in Wireless Sensor Networks Based on Frequency−selective Channels: Design‚ Implementation‚ and Analysis | BibTeX data for Key Generation in Wireless Sensor Networks Based on Frequency−selective Channels: Design‚ Implementation‚ and Analysis | Link to Key Generation in Wireless Sensor Networks Based on Frequency−selective Channels: Design‚ Implementation‚ and Analysis
-
[93]
Secret Keys from Entangled Sensor Motes: Implementation and Analysis
Matthias Wilhelm‚ Ivan Martinovic and Jens B. Schmitt
In Proceedings of the Third ACM Conference on Wireless Network Security (WiSec '10). Pages 139–144. ACM. March, 2010.
Details about Secret Keys from Entangled Sensor Motes: Implementation and Analysis | BibTeX data for Secret Keys from Entangled Sensor Motes: Implementation and Analysis
-
[94]
Analysis of Transmission Properties in an Indoor Wireless Sensor Network Based on a Full−Factorial Design
Dennis Christmann‚ Ivan Martinovic and Jens B. Schmitt
In Special Issue on Wireless Sensor Networks − Designing for Real−world Deployment and Deployment Experiences‚ Measurement Science and Technology‚ Institute of Physics. Vol. 21. No. 12. December, 2010.
In Print.
Details about Analysis of Transmission Properties in an Indoor Wireless Sensor Network Based on a Full−Factorial Design | BibTeX data for Analysis of Transmission Properties in an Indoor Wireless Sensor Network Based on a Full−Factorial Design
-
[95]
Dynamic Demultiplexing in Network Calculus – Theory and Application
Jens B. Schmitt‚ Hao Wang and Ivan Martinovic
In Performance Evaluation‚ Elsevier. December, 2010.
In Press (available online). DOI: 10.1016/j.peva.2010.12.002
Details about Dynamic Demultiplexing in Network Calculus – Theory and Application | BibTeX data for Dynamic Demultiplexing in Network Calculus – Theory and Application
-
[96]
AmICA – A flexible‚ compact‚ easy−to−program‚ and low−power WSN platform
Sebastian Wille‚ Norbert Wehn‚ Ivan Martinovic‚ Simon Kunz and Peter Göhner
In Proceedings of 7th International Conference on Mobile and Ubiquitous Systems (Mobiqutious). Springer Verlag. December, 2010.
Details about AmICA – A flexible‚ compact‚ easy−to−program‚ and low−power WSN platform | BibTeX data for AmICA – A flexible‚ compact‚ easy−to−program‚ and low−power WSN platform
-
[97]
AmbiSec: Securing Smart Spaces Using Entropy Harvesting
Paolo Barsocchi‚ Stefano Chessa‚ Ivan Martinovic and Gabriele Oligeri
In Proceedings of the First International Joint Conference on Ambient Intelligence (AmI−10). Springer Verlag. November, 2010.
Details about AmbiSec: Securing Smart Spaces Using Entropy Harvesting | BibTeX data for AmbiSec: Securing Smart Spaces Using Entropy Harvesting
-
[98]
SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors
Matthias Wilhelm‚ Ivan Martinovic‚ Ersin Uzun and Jens B. Schmitt
In Proceedings of the 6th Annual Workshop on Secure Network Protocols (NPSec '10). Pages 1–6. IEEE. October, 2010.
Details about SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors | BibTeX data for SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors | DOI (10.1109/NPSEC.2010.5634458) | Download (pdf) of SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors
-
[99]
A Self−Adversarial Approach to Delay Analysis under Arbitrary Scheduling
Jens Schmitt‚ Hao Wang and Ivan Martinovic
In Proceedings of 4th International Symposium On Leveraging Applications of Formal Methods‚ Verification and Validation (ISoLA 2010). Springer Verlag. October, 2010.
Details about A Self−Adversarial Approach to Delay Analysis under Arbitrary Scheduling | BibTeX data for A Self−Adversarial Approach to Delay Analysis under Arbitrary Scheduling
-
[100]
Demultiplexing in Network Calculus − A Stochastic Scaling Approach
Jens B. Schmitt and Ivan Martinovic
In Proceedings of the 6th International Conference on Quantitative Evaluation of SysTems (QEST) 2009. Pages 82–93. Budapest‚ Hungary. September, 2009. IEEE Computer Society.
Details about Demultiplexing in Network Calculus − A Stochastic Scaling Approach | BibTeX data for Demultiplexing in Network Calculus − A Stochastic Scaling Approach
-
[101]
Chaotic Communication Improves Authentication: Protecting WSNs Against Injection Attacks
Ivan Martinovic‚ Luc Cappellaro‚ Nicos Gollan and Jens B. Schmitt
In Security and Communication Networks‚ Special Issue on Security in Wireless Sensor Networks‚ Wiley. Vol. 2. No. 2. Pages 117–132. March, 2009.
Details about Chaotic Communication Improves Authentication: Protecting WSNs Against Injection Attacks | BibTeX data for Chaotic Communication Improves Authentication: Protecting WSNs Against Injection Attacks
-
[102]
A New Service Curve Model to Deal with Non−FIFO Systems
Jens B. Schmitt‚ Nicos Gollan and Ivan Martinovic
In 16. ITG/GI − Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009‚ Kassel‚ Germany. Springer Informatik Aktuell. March, 2009.
143–154
Details about A New Service Curve Model to Deal with Non−FIFO Systems | BibTeX data for A New Service Curve Model to Deal with Non−FIFO Systems
-
[103]
Turning The Tables: Using Wireless Communication Against An Attacker
Ivan Martinovic and Jens B. Schmitt
In 16. ITG/GI − Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009‚ Kassel‚ Germany. Pages 205–216. Springer Informatik Aktuell. March, 2009.
Details about Turning The Tables: Using Wireless Communication Against An Attacker | BibTeX data for Turning The Tables: Using Wireless Communication Against An Attacker
-
[104]
Jamming for Good: A Fresh Approach to Authentic Communication in WSNs
Ivan Martinovic‚ Paul Pichota and Jens B. Schmitt
In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2009). Pages 161–168. Zurich‚ Switzerland. March, 2009. ACM Press.
Details about Jamming for Good: A Fresh Approach to Authentic Communication in WSNs | BibTeX data for Jamming for Good: A Fresh Approach to Authentic Communication in WSNs
-
[105]
Light−weight Key Generation based on Physical Properties of Wireless Channels
Matthias Wilhelm‚ Ivan Martinovic and Jens B. Schmitt
In Proceedings of the 11. Kryptotag der Gesellschaft für Informatik e.V.. Pages 4. University of Trier‚ Germany. November, 2009.
Details about Light−weight Key Generation based on Physical Properties of Wireless Channels | BibTeX data for Light−weight Key Generation based on Physical Properties of Wireless Channels
-
[106]
Security by Wireless or Why Play Fairer than the Attacker?
Ivan Martinovic
In Proceedings of the 5th ACM SIGCOMM Asian Internet Engineering Conference (AINTEC) 2009. Bangkok‚ Thailand. November, 2009. ACM‚ invited paper.
Details about Security by Wireless or Why Play Fairer than the Attacker? | BibTeX data for Security by Wireless or Why Play Fairer than the Attacker?
-
[107]
On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties
Matthias Wilhelm‚ Ivan Martinovic and Jens B. Schmitt
In Proceedings of the 5th Annual Workshop on Secure Network Protocols (NPSec '09). Pages 37–42. IEEE Computer Society. October, 2009.
Details about On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties | BibTeX data for On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties
-
[108]
Bringing law and order to IEEE 802.11 networks – A case for DiscoSec
Ivan Martinovic‚ Paul Pichota‚ Matthias Wilhelm‚ Frank A. Zdarsky and Jens B. Schmitt
In Pervasive and Mobile Computing (PMC). Vol. 5. No. 5. Pages 510–525. 2009.
Details about Bringing law and order to IEEE 802.11 networks – A case for DiscoSec | BibTeX data for Bringing law and order to IEEE 802.11 networks – A case for DiscoSec
-
[109]
A Novel Approach for a Lightweight‚ Crypto−free Message Authentication in Wireless Sensor Networks
Ivan Martinovic and Jens B. Schmitt
In Proceedings of the 7. GI/ITG KuVS Fachgespräch "Drahtlose Sensornetze"‚ Berlin‚ Germany. September, 2008.
Details about A Novel Approach for a Lightweight‚ Crypto−free Message Authentication in Wireless Sensor Networks | BibTeX data for A Novel Approach for a Lightweight‚ Crypto−free Message Authentication in Wireless Sensor Networks
-
[110]
End−to−End Worst−Case Analysis of Non−FIFO Systems
Jens B. Schmitt‚ Nicos Gollan and Ivan Martinovic
No. 370/08. University of Kaiserslautern‚ Germany. August, 2008.
Details about End−to−End Worst−Case Analysis of Non−FIFO Systems | BibTeX data for End−to−End Worst−Case Analysis of Non−FIFO Systems
-
[111]
Design‚ Implementation‚ and Performance Analysis of DiscoSec – Service Pack for Securing WLANs
Ivan Martinovic‚ Paul Pichota‚ Matthias Wilhelm‚ Frank A. Zdarsky and Jens B. Schmitt
In 9th IEEE International Symposium on a World of Wireless‚ Mobile and Multimedia Networks (WOWMOM 2008). Pages 1–10. Newport Beach‚ CA‚ USA. June, 2008.
Accepted as noteworthy contribution.
Details about Design‚ Implementation‚ and Performance Analysis of DiscoSec – Service Pack for Securing WLANs | BibTeX data for Design‚ Implementation‚ and Performance Analysis of DiscoSec – Service Pack for Securing WLANs
-
[112]
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Ivan Martinovic‚ Frank A. Zdarsky‚ Matthias Wilhelm‚ Christian Wegmann and Jens B. Schmitt
In Proceedings of the ACM Conference on Wireless Network Security (WiSec '08). Pages 36–45. ACM Press. March, 2008.
Details about Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless | BibTeX data for Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
-
[113]
The DISCO Network Calculator
Nicos Gollan‚ Frank A. Zdarsky‚ Ivan Martinovic and Jens B. Schmitt
In 14th GI/ITG Conference on Measurement‚ Modeling‚ and Evaluation of Computer and Communication Systems (MMB 2008). Dortmund‚ Germany. March, 2008. GI/ITG.
Details about The DISCO Network Calculator | BibTeX data for The DISCO Network Calculator
-
[114]
Improving Performance Bounds in Feed−Forward Networks by Paying Multiplexing Only Once
Jens B. Schmitt‚ Frank A. Zdarsky and Ivan Martinovic
In 14th GI/ITG Conference on Measurement‚ Modeling‚ and Evaluation of Computer and Communication Systems (MMB 2008). Dortmund‚ Germany. March, 2008. GI/ITG.
Details about Improving Performance Bounds in Feed−Forward Networks by Paying Multiplexing Only Once | BibTeX data for Improving Performance Bounds in Feed−Forward Networks by Paying Multiplexing Only Once
-
[115]
Firewalling Wireless Sensor Networks: Security by Wireless
Ivan Martinovic‚ Nicos Gollan and Jens B. Schmitt
In Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN): Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2008). Pages 770 – 777. Montreal‚ Canada. October, 2008.
Details about Firewalling Wireless Sensor Networks: Security by Wireless | BibTeX data for Firewalling Wireless Sensor Networks: Security by Wireless
-
[116]
Enabling Authentic Transmissions in WSNs – Turning Jamming against the Attacker
Adam Bachorek‚ Ivan Martinovic and Jens B. Schmitt
In Proceedings of the IEEE ICNP 4th Annual Workshop on Secure Network Protocols (NPSec 2008). Pages 21–26. Orlando‚ FL‚ USA. October, 2008.
Details about Enabling Authentic Transmissions in WSNs – Turning Jamming against the Attacker | BibTeX data for Enabling Authentic Transmissions in WSNs – Turning Jamming against the Attacker
-
[117]
Worst Case Modelling of Wireless Sensor Networks
Jens B. Schmitt and Nicos Gollan
In Praxis der Informationsverarbeitung und Kommunikation. Vol. 1. Pages 12–16. January, 2008.
Details about Worst Case Modelling of Wireless Sensor Networks | BibTeX data for Worst Case Modelling of Wireless Sensor Networks
-
[118]
Security in IEEE 802.11−based UMA Networks
Ivan Martinovic‚ Frank A. Zdarsky‚ Adam Bachorek and Jens B. Schmitt
In Y. Zhang‚ L. T. Yang and J. Ma, editors, Unlicensed Mobile Access Technology: Protocols‚ Architectures‚ Security‚ Standards and Applications. Auerbach Publications‚ Taylor Taylor&Francis Group. 2008.
ISBN:1420055372. Accepted for publication
Details about Security in IEEE 802.11−based UMA Networks | BibTeX data for Security in IEEE 802.11−based UMA Networks
-
[119]
Radio Resource Management in IEEE 802.11−based UMA Networks
Frank A. Zdarsky and Ivan Martinovic
In Y. Zhang‚ L. T. Yang and J. Ma, editors, Unlicensed Mobile Access Technology: Protocols‚ Architectures‚ Security‚ Standards and Applications. Auerbach Publications‚ Taylor Taylor&Francis Group. 2008.
ISBN:1420055372. Accepted for publication
Details about Radio Resource Management in IEEE 802.11−based UMA Networks | BibTeX data for Radio Resource Management in IEEE 802.11−based UMA Networks
-
[120]
Minimizing Contention through Cooperation between Densely−Deployed Wireless LANs
Frank A. Zdarsky‚ Ivan Martinovic and Jens B. Schmitt
In Wireless Networks‚ Springer. Vol. ISSN 1022−0038 (Print) 1572−8196 (Online). September, 2007.
Details about Minimizing Contention through Cooperation between Densely−Deployed Wireless LANs | BibTeX data for Minimizing Contention through Cooperation between Densely−Deployed Wireless LANs
-
[121]
Phishing in the Wireless: Implementation and Analysis
Ivan Martinovic‚ Frank A. Zdarsky‚ Adam Bachorek‚ Christian Jung and Jens B. Schmitt
In Proceedings of the 22nd IFIP International Information Security Conference (SEC 2007)‚ Johannesburg‚ South Africa. Vol. Volume 232/2007. Pages 145–156. Springer. May, 2007.
Details about Phishing in the Wireless: Implementation and Analysis | BibTeX data for Phishing in the Wireless: Implementation and Analysis
-
[122]
Measurement and Analysis of Handover Latencies in IEEE 802.11i Secured Networks
Ivan Martinovic‚ Frank A. Zdarsky‚ Adam Bachorek and Jens B. Schmitt
In Proceedings of the 13th European Wireless Conference (EW2007)‚ Paris‚ France. April, 2007.
Details about Measurement and Analysis of Handover Latencies in IEEE 802.11i Secured Networks | BibTeX data for Measurement and Analysis of Handover Latencies in IEEE 802.11i Secured Networks
-
[123]
Regional−based Authentication Against DoS Attacks in Wireless Networks
Ivan Martinovic‚ Frank A. Zdarsky and Jens B. Schmitt
In Proceedings of the 3rd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks (in conjunction with ACM/IEEE MSWiM'07). Greece. October, 2007.
Details about Regional−based Authentication Against DoS Attacks in Wireless Networks | BibTeX data for Regional−based Authentication Against DoS Attacks in Wireless Networks
-
[124]
The Case for Virtualized Wireless Access Networks
Frank A. Zdarsky‚ Ivan Martinovic and Jens B. Schmitt
In Proceedings of the International Workshop on Self−Organizing Systems (IWSOS 2006)‚ Passau‚ Germany. Springer LNCS. September, 2006.
Details about The Case for Virtualized Wireless Access Networks | BibTeX data for The Case for Virtualized Wireless Access Networks
-
[125]
Self−Protection in P2P Networks: Choosing the Right Neighbourhood
Ivan Martinovic‚ Christof Leng‚ Frank A. Zdarsky‚ Andreas Mauthe‚ Ralf Steinmetz and Jens B. Schmitt
In Proceedings of the International Workshop on Self−Organizing Systems (IWSOS 2006)‚ Passau‚ Germany. Springer LNCS. September, 2006.
Details about Self−Protection in P2P Networks: Choosing the Right Neighbourhood | BibTeX data for Self−Protection in P2P Networks: Choosing the Right Neighbourhood
-
[126]
On Self−coordination in Wireless Community Networks
Frank A. Zdarsky‚ Ivan Martinovic and Jens B. Schmitt
In Proceedings of the 11th IFIP International Conference on Personal Wireless Communications (PWC'06)‚ Albacete‚ Spain. Springer LNCS. September, 2006.
Details about On Self−coordination in Wireless Community Networks | BibTeX data for On Self−coordination in Wireless Community Networks
-
[127]
On the Way to IEEE 802.11 DoS Resilience
Ivan Martinovic‚ Frank A. Zdarsky and Jens B. Schmitt
In Proceedings of IFIP NETWORKING 2006‚ Workshop on Security and Privacy in Mobile and Wireless Networking‚ Coimbra‚ Portugal. Springer LNCS. May, 2006.
Details about On the Way to IEEE 802.11 DoS Resilience | BibTeX data for On the Way to IEEE 802.11 DoS Resilience
-
[128]
Performance Bounds in Feed−Forward Networks under Blind Multiplexing
Jens B. Schmitt‚ Frank A. Zdarsky and Ivan Martinovic
No. 349/06. University of Kaiserslautern‚ Germany. April, 2006.
Details about Performance Bounds in Feed−Forward Networks under Blind Multiplexing | BibTeX data for Performance Bounds in Feed−Forward Networks under Blind Multiplexing
-
[129]
Zu den Grenzen der Technik bei der Entwicklung von Konzepten zur Online−Betrugs−Prävention (Invited Paper)
Ivan Martinovic and Jens B. Schmitt
In Deutsches Forum für Kriminalprävention (DFK) Workshop "Internet−Devianz"‚ Bonn‚ Germany. Deutsches Forum für Kriminalprävention. October, 2006.
Details about Zu den Grenzen der Technik bei der Entwicklung von Konzepten zur Online−Betrugs−Prävention (Invited Paper) | BibTeX data for Zu den Grenzen der Technik bei der Entwicklung von Konzepten zur Online−Betrugs−Prävention (Invited Paper)
-
[130]
Introduction of IEEE 802.11i and Measuring its Security vs. Performance Tradeoff
Ivan Martinovic‚ Frank A. Zdarsky‚ Adam Bachorek and Jens B. Schmitt
No. 351/06. University of Kaiserslautern‚ Germany. October, 2006.
Details about Introduction of IEEE 802.11i and Measuring its Security vs. Performance Tradeoff | BibTeX data for Introduction of IEEE 802.11i and Measuring its Security vs. Performance Tradeoff
-
[131]
Phishing in the Wireless: Implementation and Analysis
Ivan Martinovic‚ Frank A. Zdarsky‚ Adam Bachorek‚ Christan Jung and Jens B. Schmitt
No. 367/07. University of Kaiserslautern‚ Germany. October, 2006.
Details about Phishing in the Wireless: Implementation and Analysis | BibTeX data for Phishing in the Wireless: Implementation and Analysis
-
[132]
On Lower Bounds for MAC Layer Contention in CSMA/CA−Based Wireless Networks
Frank A. Zdarsky‚ Ivan Martinovic and Jens B. Schmitt
In 3rd ACM/SIGMOBILE International Workshop on Foundations of Mobile Computing (DIALM−POMC'05). Pages 8–16. Cologne‚ Germany. September, 2005.
Details about On Lower Bounds for MAC Layer Contention in CSMA/CA−Based Wireless Networks | BibTeX data for On Lower Bounds for MAC Layer Contention in CSMA/CA−Based Wireless Networks
-
[133]
Self−Coordination Mechanisms for Wireless Community Networks
Frank A. Zdarsky‚ Ivan Martinovic and Jens B. Schmitt
No. 339/05. University of Kaiserslautern‚ Germany. July, 2005.
Details about Self−Coordination Mechanisms for Wireless Community Networks | BibTeX data for Self−Coordination Mechanisms for Wireless Community Networks
-
[134]
Lower Bounds for Contention in CSMA/CA−based Wireless LANs
Frank A. Zdarsky‚ Ivan Martinovic and Jens B. Schmitt
No. 338/05. University of Kaiserslautern‚ Germany. July, 2005.
Details about Lower Bounds for Contention in CSMA/CA−based Wireless LANs | BibTeX data for Lower Bounds for Contention in CSMA/CA−based Wireless LANs
-
[135]
A Survey on Dependable Routing in Sensor Networks‚ Ad hoc Networks‚ and Cellular Networks
Matthias Hollick‚ Ivan Martinovic‚ Tronje Krop and Ivica Rimac
In Proceedings of the 30th IEEE EUROMICRO Conference‚ Rennes‚ France. Pages 495–502. IEEE. September, 2004.
ISBN 0−7695−2199−1
Details about A Survey on Dependable Routing in Sensor Networks‚ Ad hoc Networks‚ and Cellular Networks | BibTeX data for A Survey on Dependable Routing in Sensor Networks‚ Ad hoc Networks‚ and Cellular Networks
-
[136]
Digital Heritage Application as an Edutainment Tool
Meehae Song‚ Thomas Elias‚ Ivan Martinovic‚ Wolfgang Müller−Wittig and Tony K.Y. Chan
In Proceedings of the ACM SIGGRAPH International Conference on Virtual Reality Continuum and its Applications in Industry. Pages 163–167. ACM Press. June, 2004.
ISBN 1−58113−884−9
Details about Digital Heritage Application as an Edutainment Tool | BibTeX data for Digital Heritage Application as an Edutainment Tool
-
[137]
Web Services zur Unterstützung flexibler Geschäftsprozesse in der Finanzwirtschaft
Ralf Steinmetz‚ Rainer Berbner and Ivan Martinovic
In Z. Sokolovsky and S. Löschenkohl, editors, Handbuch Industrialisierung der Finanzwirtschaft. Gabler Verlag. December, 2004.
ISBN 3−409−12675−9
Details about Web Services zur Unterstützung flexibler Geschäftsprozesse in der Finanzwirtschaft | BibTeX data for Web Services zur Unterstützung flexibler Geschäftsprozesse in der Finanzwirtschaft
-
[138]
Trust and Context: Complementary Concepts for Creating Spontaneous Networks and Intelligent Applications
Ivan Martinovic‚ Manuel Goertz‚ Ralf Ackermann‚ Andreas Mauthe and Ralf Steinmetz
In Proceedings of SoftCOM'04‚ International Conference on Software‚ Telecommunications and Computer Networks‚ Croatia. October, 2004.
Details about Trust and Context: Complementary Concepts for Creating Spontaneous Networks and Intelligent Applications | BibTeX data for Trust and Context: Complementary Concepts for Creating Spontaneous Networks and Intelligent Applications
-
[139]
User−Centred Virtual Avatars in Real−time
Meehae Song‚ Thomas Elias‚ Ivan Martinovic‚ Wolfgang Müller−Wittig and Tony K.Y. Chan
In Proceedings of the 9th International Conference on Virtual Systems and Multimedia (VSMM 2003)‚ Montreal‚ Canada. October, 2003.
Details about User−Centred Virtual Avatars in Real−time | BibTeX data for User−Centred Virtual Avatars in Real−time