Ivan Martinovic
Orcid: 0000-0003-2340-3040
According to our database1,
Ivan Martinovic
authored at least 183 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware.
J. Cybersecur., January, 2024
CoRR, 2024
CoRR, 2024
UserBoost: Generating User-specific Synthetic Data for Faster Enrolment into Behavioural Biometric Systems.
CoRR, 2024
Current Affairs: A Measurement Study of Deployment and Security Trends in EV Charging Infrastructure.
CoRR, 2024
CoRR, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
2023
CoRR, 2023
Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks.
CoRR, 2023
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023
Death By A Thousand COTS: Disrupting Satellite Communications using Low Earth Orbit Constellations.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023
BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors.
ACM Trans. Internet Things, 2022
Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight.
J. Cybersecur., 2022
Comput. Speech Lang., 2022
RADAR: Effective Network-based Malware Detection based on the MITRE ATT&CK Framework.
CoRR, 2022
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms.
Proceedings of the 31st USENIX Security Symposium, 2022
Biometric Identification System based on Object Interactions in Internet of Things Environments.
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022
Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
Proceedings of the Information Security Practice and Experience, 2022
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
ACM Trans. Intell. Syst. Technol., 2021
ACM Trans. Priv. Secur., 2021
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Proceedings of the 13th International Conference on Cyber Conflict, 2021
Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses.
Proceedings of the Critical Information Infrastructures Security, 2021
You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
CoRR, 2020
Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020.
CoRR, 2020
CoRR, 2020
QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband.
CoRR, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication.
ACM Trans. Priv. Secur., 2019
On the Applicability of Satellite-Based Air Traffic Control Communication for Security.
IEEE Commun. Mag., 2019
Proceedings of the Information Security Theory and Practice, 2019
Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 11th International Conference on Cyber Conflict, 2019
On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2018
MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features.
SIGMETRICS Perform. Evaluation Rev., 2018
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS).
Proc. Priv. Enhancing Technol., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Poster: Tracking Vehicles Through Encrypted Mix-Zones Using Physical Layer Properties.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 7th Mediterranean Conference on Embedded Computing, 2018
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018
Proceedings of the 10th International Conference on Cyber Conflict, 2018
2017
IEEE Trans. Intell. Transp. Syst., 2017
ACM Trans. Priv. Secur., 2017
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS).
CoRR, 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
There are many apps for that: quantifying the availability of privacy-preserving apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017
Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS.
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 9th International Conference on Cyber Conflict, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
IEEE Trans. Wirel. Commun., 2016
ACM Trans. Priv. Secur., 2016
CoRR, 2016
CoRR, 2016
CoRR, 2016
CoRR, 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 8th International Conference on Cyber Conflict, 2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
2015
IEEE Commun. Surv. Tutorials, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
IEEE Commun. Mag., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the IPSN'14, 2014
Proceedings of the IPSN'14, 2014
2013
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication.
IEEE Trans. Inf. Forensics Secur., 2013
IEEE J. Sel. Areas Commun., 2013
J. Ambient Intell. Humaniz. Comput., 2013
CoRR, 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011
Perform. Evaluation, 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis
CoRR, 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Experimental design and analysis of transmission properties in an indoor wireless sensor network.
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010
Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation, 2010
Proceedings of the Ambient Intelligence, 2010
2009
Wirel. Networks, 2009
Chaotic communication improves authentication: protecting WSNs against injection attacks.
Secur. Commun. Networks, 2009
Pervasive Mob. Comput., 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the QEST 2009, 2009
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009
Proceedings of the AINTEC '09, 2009
2008
Design, implementation, and performance analysis of DiscoSec - Service pack for securing WLANs.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once.
Proceedings of the Proceedings 14th GI/ITG Conference on Measurement, Modelling and Evaluation of Computer and Communication Systems (MMB 2008), March 31, 2008
The DISCO Network Calculator.
Proceedings of the Proceedings 14th GI/ITG Conference on Measurement, Modelling and Evaluation of Computer and Communication Systems (MMB 2008), March 31, 2008
Proceedings of the LCN 2008, 2008
2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Q2SWinet'07, 2007
2006
Proceedings of the Personal Wireless Communications, 2006
Proceedings of the Self-Organizing Systems, First International Workshop, 2006
Proceedings of the Self-Organizing Systems, First International Workshop, 2006
2005
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005
2004
Proceedings of the Proceedings VRCAI 2004, 2004
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004