Martin Strohmeier
Orcid: 0000-0002-1936-0933Affiliations:
- armasuisse, Switzerland
According to our database1,
Martin Strohmeier
authored at least 74 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
5
10
1
3
2
1
4
2
2
2
2
2
1
1
1
9
8
8
6
2
3
3
2
1
3
2
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Collective victim counting in post-disaster response: A distributed, power-efficient algorithm via BLE spontaneous networks.
Pervasive Mob. Comput., 2025
2024
CoRR, 2024
CoRR, 2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS).
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
You Know What? - Evaluation of a Personalised Phishing Training Based on Users' Phishing Knowledge and Detection Skills.
Proceedings of the 2024 European Symposium on Usable Security, 2024
Defeating and Improving Network Flow Classifiers Through Adversarial Machine Learning.
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024
Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks.
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024
2023
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach.
IEEE Secur. Priv., 2023
Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks.
CoRR, 2023
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality, 2023
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Improving Aircraft Localization: Experiences and Lessons Learned from an Open Competition.
CoRR, 2022
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022
Building Collaborative Cybersecurity for Critical Infrastructure Protection: Empirical Evidence of Collective Intelligence Information Sharing Dynamics on ThreatFox.
Proceedings of the Critical Information Infrastructures Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Flying in Private Mode: Understanding and Improving the Privacy ICAO Address Program.
J. Aerosp. Inf. Syst., August, 2021
ACM Trans. Intell. Syst. Technol., 2021
Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS.
CoRR, 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021
QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 13th International Conference on Cyber Conflict, 2021
Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses.
Proceedings of the Critical Information Infrastructures Security, 2021
You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
2020
QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband.
CoRR, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
On the Applicability of Satellite-Based Air Traffic Control Communication for Security.
IEEE Commun. Mag., 2019
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019
Proceedings of the 11th International Conference on Cyber Conflict, 2019
2018
A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2018
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS).
Proc. Priv. Enhancing Technol., 2018
The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018
Proceedings of the 10th International Conference on Cyber Conflict, 2018
2017
IEEE Trans. Intell. Transp. Syst., 2017
Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS).
CoRR, 2017
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS.
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 9th International Conference on Cyber Conflict, 2017
2016
CoRR, 2016
CoRR, 2016
Proceedings of the 8th International Conference on Cyber Conflict, 2016
2015
IEEE Commun. Surv. Tutorials, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015
2014
IEEE Commun. Mag., 2014
Proceedings of the IPSN'14, 2014
Proceedings of the IPSN'14, 2014
2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Proceedings of the Computer Security - ESORICS 2012, 2012