[1] Meehae Song, Thomas Elias, Ivan Martinovic, Wolfgang Müller-Wittig, and Tony K.Y. Chan. User-Centred Virtual Avatars in Real-time. In Proceedings of the 9th International Conference on Virtual Systems and Multimedia (VSMM 2003), Montreal, Canada, October 2003. [ bib ]
[2] Meehae Song, Thomas Elias, Ivan Martinovic, Wolfgang Müller-Wittig, and Tony K.Y. Chan. Digital Heritage Application as an Edutainment Tool. In Proceedings of the ACM SIGGRAPH International Conference on Virtual Reality Continuum and its Applications in Industry, pages 163--167. ACM Press, June 2004. ISBN 1-58113-884-9. [ bib ]
[3] Matthias Hollick, Ivan Martinovic, Tronje Krop, and Ivica Rimac. A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks. In Proceedings of the 30th IEEE EUROMICRO Conference, Rennes, France, pages 495--502. IEEE, September 2004. ISBN 0-7695-2199-1. [ bib ]
[4] Ivan Martinovic, Manuel Goertz, Ralf Ackermann, Andreas Mauthe, and Ralf Steinmetz. Trust and Context: Complementary Concepts for Creating Spontaneous Networks and Intelligent Applications. In Proceedings of SoftCOM'04, International Conference on Software, Telecommunications and Computer Networks, Croatia, October 2004. [ bib ]
[5] Ralf Steinmetz, Rainer Berbner, and Ivan Martinovic. Web Services zur Unterstützung flexibler Geschäftsprozesse in der Finanzwirtschaft. In Z. Sokolovsky and S. Löschenkohl, editors, Handbuch Industrialisierung der Finanzwirtschaft. Gabler Verlag, December 2004. ISBN 3-409-12675-9. [ bib ]
[6] Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt. Self-Coordination Mechanisms for Wireless Community Networks. Technical Report 339/05, University of Kaiserslautern, Germany, July 2005. [ bib | .pdf ]
[7] Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt. Lower Bounds for Contention in CSMA/CA-based Wireless LANs. Technical Report 338/05, University of Kaiserslautern, Germany, July 2005. [ bib | .pdf ]
[8] Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt. On Lower Bounds for MAC Layer Contention in CSMA/CA-Based Wireless Networks. In 3rd ACM/SIGMOBILE International Workshop on Foundations of Mobile Computing (DIALM-POMC'05), pages 8--16, Cologne, Germany, September 2005. [ bib | .pdf ]
[9] Jens Schmitt, Frank A. Zdarsky, and Ivan Martinovic. Performance Bounds in Feed-Forward Networks under Blind Multiplexing. Technical Report 349/06, University of Kaiserslautern, Germany, April 2006. [ bib | .pdf ]
[10] Ivan Martinovic, Frank A. Zdarsky, and Jens Schmitt. On the Way to IEEE 802.11 DoS Resilience. In Proceedings of IFIP NETWORKING 2006, Workshop on Security and Privacy in Mobile and Wireless Networking, Coimbra, Portugal. Springer LNCS, May 2006. [ bib | .pdf ]
[11] Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt. The Case for Virtualized Wireless Access Networks. In Proceedings of the International Workshop on Self-Organizing Systems (IWSOS 2006), Passau, Germany. Springer LNCS, September 2006. [ bib ]
[12] Ivan Martinovic, Christof Leng, Frank A. Zdarsky, Andreas Mauthe, Ralf Steinmetz, and Jens Schmitt. Self-Protection in P2P Networks: Choosing the Right Neighbourhood. In Proceedings of the International Workshop on Self-Organizing Systems (IWSOS 2006), Passau, Germany. Springer LNCS, September 2006. [ bib | .pdf ]
[13] Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt. On Self-coordination in Wireless Community Networks. In Proceedings of the 11th IFIP International Conference on Personal Wireless Communications (PWC'06), Albacete, Spain. Springer LNCS, September 2006. [ bib ]
[14] Ivan Martinovic and Jens Schmitt. Zu den Grenzen der Technik bei der Entwicklung von Konzepten zur Online-Betrugs-Prävention (Invited Paper). In Deutsches Forum für Kriminalprävention (DFK) Workshop Internet-Devianz, Bonn, Germany. Deutsches Forum für Kriminalprävention, October 2006. [ bib ]
[15] Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, and Jens Schmitt. Introduction of IEEE 802.11i and Measuring its Security vs. Performance Tradeoff. Technical Report 351/06, University of Kaiserslautern, Germany, October 2006. [ bib | .pdf ]
[16] Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christan Jung, and Jens Schmitt. Phishing in the Wireless: Implementation and Analysis. Technical Report 367/07, University of Kaiserslautern, Germany, October 2006. [ bib | .pdf ]
[17] Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, and Jens Schmitt. Measurement and Analysis of Handover Latencies in IEEE 802.11i Secured Networks. In Proceedings of the 13th European Wireless Conference (EW2007), Paris, France, April 2007. [ bib | .pdf ]
[18] Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, and Jens Schmitt. Phishing in the Wireless: Implementation and Analysis. In Proceedings of the 22nd IFIP International Information Security Conference (SEC 2007), Johannesburg, South Africa, volume Volume 232/2007, pages 145--156. Springer, May 2007. [ bib | .pdf ]
[19] Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt. Minimizing Contention through Cooperation between Densely-Deployed Wireless LANs. Wireless Networks, Springer, ISSN 1022-0038 (Print) 1572-8196 (Online), September 2007. [ bib ]
[20] Ivan Martinovic, Frank A. Zdarsky, and Jens Schmitt. Regional-based Authentication Against DoS Attacks in Wireless Networks. In Proceedings of the 3rd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks (in conjunction with ACM/IEEE MSWiM'07), Greece, October 2007. [ bib | .pdf ]
[21] Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, and Jens Schmitt. Security in IEEE 802.11-based UMA Networks. In Y. Zhang, L. T. Yang, and J. Ma, editors, Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications. Auerbach Publications, Taylor&Francis Group, 2008. ISBN:1420055372. [ bib ]
[22] Frank A. Zdarsky and Ivan Martinovic. Radio Resource Management in IEEE 802.11-based UMA Networks. In Y. Zhang, L. T. Yang, and J. Ma, editors, Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications. Auerbach Publications, Taylor&Francis Group, 2008. ISBN:1420055372. [ bib ]
[23] Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegmann, and Jens Schmitt. Wireless client puzzles in ieee 802.11 networks: Security by wireless. In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2008), pages 36--45, Alexandria, VA, USA, March 2008. ACM Press. [ bib | .pdf ]
[24] Nicos Gollan, Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt. The disco network calculator. In 14th GI/ITG Conference on Measurement, Modeling, and Evaluation of Computer and Communication Systems (MMB 2008), Dortmund, Germany, March 2008. GI/ITG. [ bib | .pdf ]
[25] Jens Schmitt, Frank A. Zdarsky, and Ivan Martinovic. Improving performance bounds in feed-forward networks by paying multiplexing only once. In 14th GI/ITG Conference on Measurement, Modeling, and Evaluation of Computer and Communication Systems (MMB 2008), Dortmund, Germany, March 2008. GI/ITG. [ bib ]
[26] Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, and Jens Schmitt. Design, implementation, and performance analysis of discosec -- service pack for securing wlans. In 9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2008), pages 1--10, Newport Beach, CA, USA, June 2008. Accepted as noteworthy contribution. [ bib | .pdf ]
[27] Jens Schmitt, Nicos Gollan, and Ivan Martinovic. End-to-End Worst-Case Analysis of Non-FIFO Systems. Technical Report 370/08, University of Kaiserslautern, Germany, August 2008. [ bib | .pdf ]
[28] Ivan Martinovic and Jens Schmitt. A Novel Approach for a Lightweight, Crypto-free Message Authentication in Wireless Sensor Networks. In Proceedings of the 7. GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, Berlin, Germany, September 2008. [ bib ]
[29] Ivan Martinovic, Nicos Gollan, and Jens Schmitt. Firewalling wireless sensor networks: Security by wireless. In Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN): Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2008), Montreal, Canada, October 2008. [ bib | .pdf ]
[30] Adam Bachorek, Ivan Martinovic, and Jens Schmitt. Enabling Authentic Transmissions in WSNs -- Turning Jamming against the Attacker. In Proceedings of the IEEE ICNP 4th Annual Workshop on Secure Network Protocols (NPSec 2008), pages 21--26, Orlando, FL, USA, October 2008. [ bib | .pdf ]
[31] Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, and Jens Schmitt. Bringing law and order to ieee 802.11 networks -- a case for discosec. Pervasive and Mobile Computing (PMC), Elsevier, 5(5):510 -- 525, 2009. [ bib ]
[32] Ivan Martinovic, Luc Cappellaro, Nicos Gollan, and Jens Schmitt. Chaotic Communication Improves Authentication: Protecting WSNs Against Injection Attacks. Security and Communication Networks, Special Issue on Security in Wireless Sensor Networks, Wiley, 2(2):117--132, March 2009. [ bib ]
[33] Jens Schmitt, Nicos Gollan, and Ivan Martinovic. A New Service Curve Model to Deal with Non-FIFO Systems. In 16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany, pages 143--154. Springer Informatik Aktuell, March 2009. [ bib ]
[34] Ivan Martinovic and Jens Schmitt. Turning The Tables: Using Wireless Communication Against An Attacker. In 16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany, pages 205--216. Springer Informatik Aktuell, March 2009. [ bib ]
[35] Ivan Martinovic, Paul Pichota, and Jens Schmitt. Jamming for Good: A Fresh Approach to Authentic Communication in WSNs. In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2009), pages 161--168, Zurich, Switzerland, March 2009. ACM Press. [ bib | .pdf ]
[36] Jens Schmitt and Ivan Martinovic. Demultiplexing in Network Calculus - A Stochastic Scaling Approach. In Proceedings of the 6th International Conference on Quantitative Evaluation of SysTems (QEST) 2009, pages 82--93, Budapest, Hungary, September 2009. IEEE Computer Society. [ bib | DOI ]
[37] Matthias Wilhelm, Ivan Martinovic, and Jens Schmitt. On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties. In Proceedings of the 5th Annual Workshop on Secure Network Protocols (NPSec) in conjunction with IEEE ICNP 2009, pages 37--42, Princeton, New Jersey, USA, October 2009. IEEE Computer Society. [ bib | .pdf ]
[38] Matthias Wilhelm, Ivan Martinovic, and Jens Schmitt. Light-weight Key Generation based on Physical Properties of Wireless Channels. In Proceedings of the 11. Kryptotag der Gesellschaft für Informatik e.V., page 4, University of Trier, Germany, November 2009. [ bib | .pdf ]
[39] Ivan Martinovic. Security by Wireless or Why Play Fairer than the Attacker? In Proceedings of the 5th ACM SIGCOMM Asian Internet Engineering Conference (AINTEC) 2009, Bangkok, Thailand, November 2009. ACM, invited paper. [ bib ]
[40] Matthias Wilhelm, Ivan Martinovic, and Jens Schmitt. Secret Keys from Entangled Sensor Motes: Implementation and Analysis. In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2010), pages 139--144, Hoboken, NJ, USA, March 2010. ACM Press. [ bib | .pdf ]
[41] Dennis Christmann and Ivan Martinovic. Experimental Design and Analysis of Transmission Properties in an Indoor Wireless Sensor Network. In Proceedings of the 6th International Workshop on Wireless Network Measurements (WiNMee), in conjunction with WiOpt 2010, Avignon, France, May 2010. IEEE Computer Society. [ bib ]
[42] Matthias Wilhelm, Ivan Martinovic, and Jens Schmitt. Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels: Design, Implementation, and Analysis. Technical Report arXiv:1005.0712v1 [cs.CR], ArXiv.org, May 2010. [ bib | http ]
[43] Jens Schmitt, Nicos Gollan, Steffen Bondorf, and Ivan Martinovic. Pay bursts only once holds for (some) non-fifo systems. Technical Report 378/10, University of Kaiserslautern, Germany, July 2010. [ bib | .pdf ]
[44] Matthias Wilhelm, Ivan Martinovic, Ersin Uzun, and Jens Schmitt. SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors. In Proceedings of the 6th Annual Workshop on Secure Network Protocols (NPSec) in conjunction with IEEE ICNP 2010, Kyoto, Japan, October 2010. IEEE. [ bib | .pdf ]
[45] Jens Schmitt, Hao Wang, and Ivan Martinovic. A Self-Adversarial Approach to Delay Analysis under Arbitrary Scheduling. In Proceedings of 4th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2010). Springer Verlag, October 2010. [ bib | .pdf ]
[46] Paolo Barsocchi, Stefano Chessa, Ivan Martinovic, and Gabriele Oligeri. AmbiSec: Securing Smart Spaces Using Entropy Harvesting. In Proceedings of the First International Joint Conference on Ambient Intelligence (AmI-10). Springer Verlag, November 2010. [ bib ]
[47] Dennis Christmann, Ivan Martinovic, and Jens Schmitt. Analysis of transmission properties in an indoor wireless sensor network based on a full-factorial design. Special Issue on Wireless Sensor Networks - Designing for Real-world Deployment and Deployment Experiences, Measurement Science and Technology, Institute of Physics, 21(12), December 2010. [ bib ]
[48] Sebastian Wille, Norbert Wehn, Ivan Martinovic, Simon Kunz, and Peter Göhner. AmICA - A flexible, compact, easy-to-program, and low-power WSN platform. In Proceedings of 7th International Conference on Mobile and Ubiquitous Systems (Mobiquitous). Springer Verlag, December 2010. [ bib ]
[49] Hao Wang, Jens Schmitt, and Ivan Martinovic. Dynamic demultiplexing in network calculus -- theory and application. Performance Evaluation, Elsevier, 68(2):201--219, February 2011. [ bib | .pdf ]
[50] Jens Schmitt, Nicos Gollan, Steffen Bondorf, and Ivan Martinovic. Pay bursts only once holds for (some) non-fifo systems. In The 30th IEEE International Conference on Computer Communications (INFOCOM 2011), Shanghai, China, April 2011. [ bib | DOI | .pdf ]
[51] Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, and Vincent Lenders. Reactive Jamming in Wireless Networks: How Realistic is the Threat? In Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec '11), pages 47--52, New York, NY, USA, June 2011. ACM. [ bib | http ]
[52] Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, and Vincent Lenders. WiFire: A firewall for wireless networks. In Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '11), pages 456--457, New York, NY, USA, August 2011. ACM. [ bib | .pdf ]
[53] Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, and Vincent Lenders. WiSec 2011 demo: RFReact---a real-time capable and channel-aware jamming platform. SIGMOBILE Mobile Computing and Communications Review, 15:41--42, November 2011. [ bib | DOI | http ]
[54] Simon Eberz, Martin Strohmeier, Matthias Wilhelm, and Ivan Martinovic. A practical man-in-the-middle attack on signal-based key generation protocols. In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS '12). Springer, September 2012. [ bib | .pdf ]
[55] Tim Stöber, Mario Frank, Jens Schmitt, and Ivan Martinovic. Who do you sync you are?: smartphone fingerprinting via application behaviour. In ACM WiSec, pages 7--12, April 2013. [ bib | .pdf ]
[56] Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, and Vincent Lenders. Air dominance in sensor networks: Guarding sensor motes using selective interference. Technical Report arXiv:1305.4038, University of Kaiserslautern, Germany, May 2013. [ bib | http ]
[57] Matthias Schäfer, Vincent Lenders, and Ivan Martinovic. Experimental analysis of attacks on next generation air traffic communication. In Applied Cryptography and Network Security (ACNS '13), volume 7954 of Lecture Notes in Computer Science, pages 253--271. Springer Berlin Heidelberg, June 2013. [ bib | .pdf ]
[58] Matthias Wilhelm, Ivan Martinovic, and Jens Schmitt. Secure key generation in sensor networks based on frequency-selective channels. IEEE Journal on Selected Areas in Communications, 31(8), September 2013. [ bib ]
[59] Martin Strohmeier, Ivan Martinovic, Utz Roedig, Karim El Defrawy, and Jens Schmitt. Neighborhood watch: On network coding throughput and key sharing. In IEEE GLOBECOM, December 2013. [ bib | .pdf ]
[60] Daniel S. Berger, Francesco Gringoli, Nicol`o Facchi, Ivan Martinovic, and Jens Schmitt. Gaining insight on friendly jamming in a real-world ieee 802.11 network. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec '14, pages 105--116, New York, NY, USA, 2014. ACM. [ bib | DOI | .pdf ]
[61] Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, and Matthias Wilhelm. Bringing up opensky: A large-scale ads-b sensor network for research. In Proceedings of the 13th International Symposium on Information Processing in Sensor Networks (IPSN '14), pages 83--94, Piscataway, NJ, USA, April 2014. IEEE Press. [ bib | http ]
[62] Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, and Matthias Wilhelm. Demonstration abstract: Opensky: A large-scale ads-b sensor network for research. In Proceedings of the 13th International Symposium on Information Processing in Sensor Networks (IPSN '14), pages 313--314, Piscataway, NJ, USA, April 2014. IEEE Press. [ bib | http ]
[63] Martin Strohmeier, Matthias Schäfer, Vincent Lenders, and Ivan Martinovic. Realities and challenges of nextgen air traffic management: The case of ads-b. IEEE Communications Magazine, 52(5):111--118, May 2014. [ bib | .pdf ]
[64] Martin Strohmeier, Matthias Schäfer, Markus Fuchs, Vincent Lenders, and Ivan Martinovic. Opensky: A swiss army knife for air traffic security research. In IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), September 2015. [ bib | .pdf ]
[65] Matthias Schäfer, Martin Strohmeier, Matthew Smith, Markus Fuchs, Rui Pinheiro, Vincent Lenders, and Ivan Martinovic. Opensky report 2016: Facts and figures on ssr mode s and ads-b usage. In IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), 2016. [ bib | .pdf ]
[66] Martin Strohmeier, Matt Smith, Matthias Schäfer, Vincent Lenders, and Ivan Martinovic. Assessing the impact of aviation security on cyber power. In International Conference on Cyber Conflict (CyCon), 2016. [ bib | .pdf ]
[67] Martin Strohmeier, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, and Ivan Martinovic. On perception and reality in wireless air traffic communications security. arXiv:1602.08777 [cs.CR], February 2016. [ bib | http ]
[68] D. S. Berger, F. Gringoli, N. Facchi, I. Martinovic, and J. B. Schmitt. Friendly jamming on access points: Analysis and real-world measurements. IEEE Transactions on Wireless Communications, PP(99), June 2016. [ bib | .pdf ]
[69] Martin Strohmeier, Matt Smith, Matthias Schäfer, Vincent Lenders, and Ivan Martinovic. Crowdsourcing Security for Wireless Air Traffic Communications. In Proceedings of the 9th International Conference on Cyber Conflict (CyCon), May 2017. [ bib | .pdf ]
[70] Martin Strohmeier, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, and Ivan Martinovic. On perception and reality in wireless air traffic communication security. IEEE Transactions on Intelligent Transportation Systems, 18(6):1338--1357, June 2017. [ bib | .pdf ]
[71] Matthias Schäfer, Martin Strohmeier, Matthew Smith, Markus Fuchs, Vincent Lenders, Marc Liechti, and Ivan Martinovic. Opensky report 2017: Mode s and ads-b usage of military and other state aircraft. In IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), September 2017. [ bib | .pdf ]
[72] Martin Strohmeier, Anna K. Niedbala, Matthias Schäfer, Vincent, Lenders, and Ivan Martinovic. Surveying aviation professionals on the security of the air traffic control system. In International Workshop on Cyber Security for Intelligent Transportation Systems (CSITS), 2018. [ bib | .pdf ]
[73] Martin Strohmeier, Matt Smith, Daniel Moser, Matthias Schäfer, Vincent Lenders, and Ivan Martinovic. Utilizing air traffic communications for osint on state and government aircraft. In 10th International Conference on Cyber Conflict (CyCon), pages 299--320, May 2018. [ bib | .pdf ]
[74] Matthias Schäfer, Martin Strohmeier, Matthew Smith, Markus Fuchs, Vincent Lenders, and Ivan Martinovic. Opensky report 2018: Assessing the integrity of crowdsourced mode s and ads-b data. In Digital Avionics Systems Conference (DASC), 2018 IEEE/AIAA 37th, September 2018. [ bib | .pdf ]
[75] Matthias Schäfer, Xavier Olive, Martin Strohmeier, Matthew Smith, Vincent Lenders, and Ivan Martinovic. Opensky report 2019: Analysing tcas in the real world using big data. In IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), September 2019. [ bib | .pdf ]
[76] Martin Strohmeier, Daniel Moser, Matthias Schäfer, Vincent Lenders, and Ivan Martinovic. On the applicability of satellite-based air traffic control communication for security. IEEE Communications Magazine, 57(9), September 2019. [ bib | .pdf ]
[77] Xavier Olive, Axel Tanner, Martin Strohmeier, Matthias Schäfer, Metin Feridun, Allan Tart, Ivan Martinovic, and Vincent Lenders. Opensky report 2020: Analysing in-flight emergencies using big data. In 2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), 2020. [ bib | DOI ]
[78] Junzi Sun, Xavier Olive, Martin Strohmeier, Matthias Schäfer, Ivan Martinovic, and Vincent Lenders. Opensky report 2021: Insights on ads-b mandate and fleet deployment in times of crisis. In 2021 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), 2021. [ bib ]
[79] Junzi Sun, Luis Basora, Xavier Olive, Martin Strohmeier, Matthias Schäfer, Ivan Martinovic, and Vincent Lenders. Opensky report 2022: Evaluating aviation emissions using crowdsourced open flight data. In 2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC), pages 1--8, 2022. [ bib | DOI ]