Ivan Martinovic

Orcid: 0000-0003-2340-3040

According to our database1, Ivan Martinovic authored at least 183 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware.
J. Cybersecur., January, 2024

A Mobile Payment Scheme Using Biometric Identification with Mutual Authentication.
CoRR, 2024

KeySpace: Public Key Infrastructure Considerations in Interplanetary Networks.
CoRR, 2024

UserBoost: Generating User-specific Synthetic Data for Faster Enrolment into Behavioural Biometric Systems.
CoRR, 2024

Current Affairs: A Measurement Study of Deployment and Security Trends in EV Charging Infrastructure.
CoRR, 2024

Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks.
CoRR, 2024

MC-PanDA: Mask Confidence for Panoptic Domain Adaptation.
Proceedings of the Computer Vision - ECCV 2024, 2024

2023
POSTER: spaceQUIC: Securing Communication in Computationally Constrained Spacecraft.
CoRR, 2023

Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks.
CoRR, 2023

Point Cloud Semantic Segmentation.
CoRR, 2023

Dishing Out DoS: How to Disable and Secure the Starlink User Terminal.
CoRR, 2023

RingAuth: Wearable Authentication using a Smart Ring.
CoRR, 2023

Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Firefly: Spoofing Earth Observation Satellite Data through Radio Overshadowing.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023

Death By A Thousand COTS: Disrupting Satellite Communications using Low Earth Orbit Constellations.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023

BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors.
ACM Trans. Internet Things, 2022

Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight.
J. Cybersecur., 2022

Generating identities with mixture models for speaker anonymization.
Comput. Speech Lang., 2022

RADAR: Effective Network-based Malware Detection based on the MITRE ATT&CK Framework.
CoRR, 2022

Techniques for Continuous Touch-Based Authentication Modeling.
CoRR, 2022

I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy.
CoRR, 2022

Fingerprinting and Personal Information Leakage from Touchscreen Interactions.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms.
Proceedings of the 31st USENIX Security Symposium, 2022

Biometric Identification System based on Object Interactions in Internet of Things Environments.
Proceedings of the 43rd IEEE Security and Privacy, 2022

On the Security of the Wireless Electric Vehicle Charging Communication.
Proceedings of the IEEE International Conference on Communications, 2022

Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Techniques for Continuous Touch-Based Authentication.
Proceedings of the Information Security Practice and Experience, 2022

WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Security and Privacy Issues of Satellite Communication in the Avlatlon Domain.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022

Demo: End-to-End Wireless Disruption of CCS EV Charging.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Signal Injection Attacks against CCD Image Sensors.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Common Evaluation Pitfalls in Touch-Based Authentication Systems.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Classi-Fly: Inferring Aircraft Categories from Open Data.
ACM Trans. Intell. Syst. Technol., 2021

#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones.
ACM Trans. Priv. Secur., 2021

Widen The Backdoor To Let More Attackers In.
CoRR, 2021

Recurring Turking: Conducting Daily Task Studies on Mechanical Turk.
CoRR, 2021

SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021

Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Plug-and-Play: Framework for Remote Experimentation in Cyber Security.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

In the Same Boat: On Small Satellites, Big Rockets, and Cyber Trust.
Proceedings of the 13th International Conference on Cyber Conflict, 2021

Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses.
Proceedings of the Critical Information Infrastructures Security, 2021

You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

MoveAR: Continuous Biometric Authentication for Augmented Reality Headsets.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

MalPhase: Fine-Grained Malware Detection Using Network Flow Data.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

On Detecting Deception in Space Situational Awareness.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients.
CoRR, 2020

Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020.
CoRR, 2020

SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research.
CoRR, 2020

Understanding Realistic Attacks on Airborne Collision Avoidance Systems.
CoRR, 2020

QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband.
CoRR, 2020

A Tale of Sea and Sky On the Security of Maritime VSAT Communications.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Seeing Red: PPG Biometrics Using Smartphone Cameras.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication.
ACM Trans. Priv. Secur., 2019

Safety vs. Security: Attacking Avionic Systems with Humans in the Loop.
CoRR, 2019

On the Applicability of Satellite-Based Air Traffic Control Communication for Security.
IEEE Commun. Mag., 2019

CompactFlow: A Hybrid Binary Format for Network Flow Data.
Proceedings of the Information Security Theory and Practice, 2019

Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging.
Proceedings of the 28th USENIX Security Symposium, 2019

Attacking Speaker Recognition Systems with Phoneme Morphing.
Proceedings of the Computer Security - ESORICS 2019, 2019

The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019

28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Peeves: Physical Event Verification in Smart Homes.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Robust Smartphone App Identification via Encrypted Network Traffic Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2018

MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features.
SIGMETRICS Perform. Evaluation Rev., 2018

Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS).
Proc. Priv. Enhancing Technol., 2018

Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff Messages.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Poster: Tracking Vehicles Through Encrypted Mix-Zones Using Physical Layer Properties.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Bionyms: Driver-centric Message Authentication using Biometric Measurements.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

EMPower: Detecting Malicious Power Line Networks from EM Emissions.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Device Pairing at the Touch of an Electrode.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Biomedical signals reconstruction under the compressive sensing approach.
Proceedings of the 7th Mediterranean Conference on Embedded Computing, 2018

Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Surveying Aviation Professionals on the Security of the Air Traffic Control System.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

MalClassifier: Malware family classification using network flow sequence behaviour.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

Utilizing air traffic communications for OSINT on state and government aircraft.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
On Perception and Reality in Wireless Air Traffic Communication Security.
IEEE Trans. Intell. Transp. Syst., 2017

Pulse-Response: Exploring Human Body Impedance for Biometric Recognition.
ACM Trans. Priv. Secur., 2017

Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones.
CoRR, 2017

Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS).
CoRR, 2017

Authentication using pulse-response biometrics.
Commun. ACM, 2017

Using EEG-Based BCI Devices to Subliminally Probe for Private Information.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

There are many apps for that: quantifying the availability of privacy-preserving apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Broken Hearted: How To Attack ECG Biometrics.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

FADEWICH: Fast Deauthentication Over the Wireless Channel.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store.
Proceedings of the Financial Cryptography and Data Security, 2017

Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS.
Proceedings of the Financial Cryptography and Data Security, 2017

Crowdsourcing security for wireless air traffic communications.
Proceedings of the 9th International Conference on Cyber Conflict, 2017

To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

VisAuth: Authentication over a Visual Channel Using an Embedded Image.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Friendly Jamming on Access Points: Analysis and Real-World Measurements.
IEEE Trans. Wirel. Commun., 2016

Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics.
ACM Trans. Priv. Secur., 2016

A Longitudinal Study of App Permission Usage across the Google Play Store.
CoRR, 2016

A Localization Approach for Crowdsourced Air Traffic Communication Networks.
CoRR, 2016

On Perception and Reality in Wireless Air Traffic Communications Security.
CoRR, 2016

TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition.
CoRR, 2016

Generating Secret Keys from Biometric Body Impedance Measurements.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Assessing the impact of aviation security on cyber power.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

DEMO: Starving Permission-Hungry Android Apps Using SecuRank.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Using Reflexive Eye Movements for Fast Challenge-Response Authentication.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Exposing Transmitters in Mobile Multi-Agent Games.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

Secure Location Verification with a Mobile Receiver.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol.
IEEE Commun. Surv. Tutorials, 2015

Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Intrusion Detection for Airborne Communication Using PHY-Layer Information.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

On Passive Data Link Layer Fingerprinting of Aircraft Transponders.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

Lightweight Location Verification in Air Traffic Surveillance Networks.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

Using Channel State Information for Tamper Detection in the Internet of Things.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Realities and challenges of nextgen air traffic management: the case of ADS-B.
IEEE Commun. Mag., 2014

Gaining insight on friendly jamming in a real-world IEEE 802.11 network.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Demonstration abstract: OpenSky: a large-scale ADS-B sensor network for research.
Proceedings of the IPSN'14, 2014

Bringing up OpenSky: a large-scale ADS-B sensor network for research.
Proceedings of the IPSN'14, 2014

2013
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication.
IEEE Trans. Inf. Forensics Secur., 2013

Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels.
IEEE J. Sel. Areas Commun., 2013

A cyber-physical approach to secret key generation in smart environments.
J. Ambient Intell. Humaniz. Comput., 2013

Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference
CoRR, 2013

Security of ADS-B: State of the Art and Beyond.
CoRR, 2013

Subliminal Probing for Private Information via EEG-Based BCI Devices.
CoRR, 2013

Who do you sync you are?: smartphone fingerprinting via application behaviour.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

SAFE: Secure authentication with Face and Eyes.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

Neighborhood watch: On network coding throughput and key sharing.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Experimental Analysis of Attacks on Next Generation Air Traffic Communication.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
WiSec 2011 demo: RFReact - a real-time capable and channel-aware jamming platform.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Dynamic demultiplexing in network calculus - Theory and application.
Perform. Evaluation, 2011

Short paper: reactive jamming in wireless networks: how realistic is the threat?
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

WiFire: a firewall for wireless networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Pay bursts only once holds for (some) non-FIFO systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis
CoRR, 2010

Secret keys from entangled sensor motes: implementation and analysis.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Experimental design and analysis of transmission properties in an indoor wireless sensor network.
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010

AmICA - A Flexible, Compact, Easy-to-Program and Low-Power WSN Platform.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling.
Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation, 2010

AmbiSec: Securing Smart Spaces Using Entropy Harvesting.
Proceedings of the Ambient Intelligence, 2010

2009
Security in wireless networks: a fresh approach.
PhD thesis, 2009

Minimizing contention through cooperation between densely deployed wireless LANs.
Wirel. Networks, 2009

Chaotic communication improves authentication: protecting WSNs against injection attacks.
Secur. Commun. Networks, 2009

Bringing law and order to IEEE 802.11 networks - A case for DiscoSec.
Pervasive Mob. Comput., 2009

Jamming for good: a fresh approach to authentic communication in WSNs.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Demultiplexing in Network Calculus- A Stochastic Scaling Approach.
Proceedings of the QEST 2009, 2009

A New Service Curve Model to Deal with Non-FIFO Systems.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

Turning the Tables: Using Wireless Communication Against an Attacker.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

Security by wireless: why play fairer than the attacker.
Proceedings of the AINTEC '09, 2009

2008
Design, implementation, and performance analysis of DiscoSec - Service pack for securing WLANs.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Wireless client puzzles in IEEE 802.11 networks: security by wireless.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once.
Proceedings of the Proceedings 14th GI/ITG Conference on Measurement, Modelling and Evaluation of Computer and Communication Systems (MMB 2008), March 31, 2008

The DISCO Network Calculator.
Proceedings of the Proceedings 14th GI/ITG Conference on Measurement, Modelling and Evaluation of Computer and Communication Systems (MMB 2008), March 31, 2008

Firewalling wireless sensor networks: Security by wireless.
Proceedings of the LCN 2008, 2008

2007
Phishing in the Wireless: Implementation and Analysis.
Proceedings of the New Approaches for Security, 2007

Regional-based authentication against dos attacks in wireless networks.
Proceedings of the Q2SWinet'07, 2007

2006
On Self-coordination in Wireless Community Networks.
Proceedings of the Personal Wireless Communications, 2006

The Case for Virtualized Wireless Access Networks.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

Self-protection in P2P Networks: Choosing the Right Neighbourhood.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

2005
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005

2004
Digital heritage application as an edutainment tool.
Proceedings of the Proceedings VRCAI 2004, 2004

A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004


  Loading...