[1]
|
Meehae Song, Thomas Elias, Ivan Martinovic, Wolfgang Müller-Wittig, and
Tony K.Y. Chan.
User-Centred Virtual Avatars in Real-time.
In Proceedings of the 9th International Conference on Virtual
Systems and Multimedia (VSMM 2003), Montreal, Canada, October 2003.
[ bib ]
|
[2]
|
Meehae Song, Thomas Elias, Ivan Martinovic, Wolfgang Müller-Wittig, and
Tony K.Y. Chan.
Digital Heritage Application as an Edutainment Tool.
In Proceedings of the ACM SIGGRAPH International Conference on
Virtual Reality Continuum and its Applications in Industry, pages 163--167.
ACM Press, June 2004.
ISBN 1-58113-884-9.
[ bib ]
|
[3]
|
Matthias Hollick, Ivan Martinovic, Tronje Krop, and Ivica Rimac.
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks,
and Cellular Networks.
In Proceedings of the 30th IEEE EUROMICRO Conference, Rennes,
France, pages 495--502. IEEE, September 2004.
ISBN 0-7695-2199-1.
[ bib ]
|
[4]
|
Ivan Martinovic, Manuel Goertz, Ralf Ackermann, Andreas Mauthe, and Ralf
Steinmetz.
Trust and Context: Complementary Concepts for Creating Spontaneous
Networks and Intelligent Applications.
In Proceedings of SoftCOM'04, International Conference on
Software, Telecommunications and Computer Networks, Croatia, October 2004.
[ bib ]
|
[5]
|
Ralf Steinmetz, Rainer Berbner, and Ivan Martinovic.
Web Services zur Unterstützung flexibler Geschäftsprozesse in
der Finanzwirtschaft.
In Z. Sokolovsky and S. Löschenkohl, editors, Handbuch
Industrialisierung der Finanzwirtschaft. Gabler Verlag, December 2004.
ISBN 3-409-12675-9.
[ bib ]
|
[6]
|
Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt.
Self-Coordination Mechanisms for Wireless Community Networks.
Technical Report 339/05, University of Kaiserslautern, Germany, July
2005.
[ bib |
.pdf ]
|
[7]
|
Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt.
Lower Bounds for Contention in CSMA/CA-based Wireless LANs.
Technical Report 338/05, University of Kaiserslautern, Germany, July
2005.
[ bib |
.pdf ]
|
[8]
|
Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt.
On Lower Bounds for MAC Layer Contention in CSMA/CA-Based Wireless
Networks.
In 3rd ACM/SIGMOBILE International Workshop on Foundations of
Mobile Computing (DIALM-POMC'05), pages 8--16, Cologne, Germany, September
2005.
[ bib |
.pdf ]
|
[9]
|
Jens Schmitt, Frank A. Zdarsky, and Ivan Martinovic.
Performance Bounds in Feed-Forward Networks under Blind
Multiplexing.
Technical Report 349/06, University of Kaiserslautern, Germany, April
2006.
[ bib |
.pdf ]
|
[10]
|
Ivan Martinovic, Frank A. Zdarsky, and Jens Schmitt.
On the Way to IEEE 802.11 DoS Resilience.
In Proceedings of IFIP NETWORKING 2006, Workshop on Security and
Privacy in Mobile and Wireless Networking, Coimbra, Portugal. Springer LNCS,
May 2006.
[ bib |
.pdf ]
|
[11]
|
Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt.
The Case for Virtualized Wireless Access Networks.
In Proceedings of the International Workshop on Self-Organizing
Systems (IWSOS 2006), Passau, Germany. Springer LNCS, September 2006.
[ bib ]
|
[12]
|
Ivan Martinovic, Christof Leng, Frank A. Zdarsky, Andreas Mauthe, Ralf
Steinmetz, and Jens Schmitt.
Self-Protection in P2P Networks: Choosing the Right Neighbourhood.
In Proceedings of the International Workshop on Self-Organizing
Systems (IWSOS 2006), Passau, Germany. Springer LNCS, September 2006.
[ bib |
.pdf ]
|
[13]
|
Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt.
On Self-coordination in Wireless Community Networks.
In Proceedings of the 11th IFIP International Conference on
Personal Wireless Communications (PWC'06), Albacete, Spain. Springer LNCS,
September 2006.
[ bib ]
|
[14]
|
Ivan Martinovic and Jens Schmitt.
Zu den Grenzen der Technik bei der Entwicklung von Konzepten zur
Online-Betrugs-Prävention (Invited Paper).
In Deutsches Forum für Kriminalprävention (DFK) Workshop
Internet-Devianz, Bonn, Germany. Deutsches Forum für Kriminalprävention,
October 2006.
[ bib ]
|
[15]
|
Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, and Jens Schmitt.
Introduction of IEEE 802.11i and Measuring its Security vs.
Performance Tradeoff.
Technical Report 351/06, University of Kaiserslautern, Germany,
October 2006.
[ bib |
.pdf ]
|
[16]
|
Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christan Jung, and Jens
Schmitt.
Phishing in the Wireless: Implementation and Analysis.
Technical Report 367/07, University of Kaiserslautern, Germany,
October 2006.
[ bib |
.pdf ]
|
[17]
|
Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, and Jens Schmitt.
Measurement and Analysis of Handover Latencies in IEEE 802.11i
Secured Networks.
In Proceedings of the 13th European Wireless Conference
(EW2007), Paris, France, April 2007.
[ bib |
.pdf ]
|
[18]
|
Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, and Jens
Schmitt.
Phishing in the Wireless: Implementation and Analysis.
In Proceedings of the 22nd IFIP International Information
Security Conference (SEC 2007), Johannesburg, South Africa, volume Volume
232/2007, pages 145--156. Springer, May 2007.
[ bib |
.pdf ]
|
[19]
|
Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt.
Minimizing Contention through Cooperation between Densely-Deployed
Wireless LANs.
Wireless Networks, Springer, ISSN 1022-0038 (Print) 1572-8196
(Online), September 2007.
[ bib ]
|
[20]
|
Ivan Martinovic, Frank A. Zdarsky, and Jens Schmitt.
Regional-based Authentication Against DoS Attacks in Wireless
Networks.
In Proceedings of the 3rd ACM International Workshop on Quality
of Service & Security for Wireless and Mobile Networks (in conjunction with
ACM/IEEE MSWiM'07), Greece, October 2007.
[ bib |
.pdf ]
|
[21]
|
Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, and Jens Schmitt.
Security in IEEE 802.11-based UMA Networks.
In Y. Zhang, L. T. Yang, and J. Ma, editors, Unlicensed Mobile
Access Technology: Protocols, Architectures, Security, Standards and
Applications. Auerbach Publications, Taylor&Francis Group, 2008.
ISBN:1420055372.
[ bib ]
|
[22]
|
Frank A. Zdarsky and Ivan Martinovic.
Radio Resource Management in IEEE 802.11-based UMA Networks.
In Y. Zhang, L. T. Yang, and J. Ma, editors, Unlicensed Mobile
Access Technology: Protocols, Architectures, Security, Standards and
Applications. Auerbach Publications, Taylor&Francis Group, 2008.
ISBN:1420055372.
[ bib ]
|
[23]
|
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegmann, and
Jens Schmitt.
Wireless client puzzles in ieee 802.11 networks: Security by
wireless.
In Proceedings of the ACM Conference on Wireless Network
Security (WiSec 2008), pages 36--45, Alexandria, VA, USA, March 2008. ACM
Press.
[ bib |
.pdf ]
|
[24]
|
Nicos Gollan, Frank A. Zdarsky, Ivan Martinovic, and Jens Schmitt.
The disco network calculator.
In 14th GI/ITG Conference on Measurement, Modeling, and
Evaluation of Computer and Communication Systems (MMB 2008), Dortmund,
Germany, March 2008. GI/ITG.
[ bib |
.pdf ]
|
[25]
|
Jens Schmitt, Frank A. Zdarsky, and Ivan Martinovic.
Improving performance bounds in feed-forward networks by paying
multiplexing only once.
In 14th GI/ITG Conference on Measurement, Modeling, and
Evaluation of Computer and Communication Systems (MMB 2008), Dortmund,
Germany, March 2008. GI/ITG.
[ bib ]
|
[26]
|
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, and Jens
Schmitt.
Design, implementation, and performance analysis of discosec --
service pack for securing wlans.
In 9th IEEE International Symposium on a World of Wireless,
Mobile and Multimedia Networks (WOWMOM 2008), pages 1--10, Newport Beach,
CA, USA, June 2008.
Accepted as noteworthy contribution.
[ bib |
.pdf ]
|
[27]
|
Jens Schmitt, Nicos Gollan, and Ivan Martinovic.
End-to-End Worst-Case Analysis of Non-FIFO Systems.
Technical Report 370/08, University of Kaiserslautern, Germany,
August 2008.
[ bib |
.pdf ]
|
[28]
|
Ivan Martinovic and Jens Schmitt.
A Novel Approach for a Lightweight, Crypto-free Message
Authentication in Wireless Sensor Networks.
In Proceedings of the 7. GI/ITG KuVS Fachgespräch Drahtlose
Sensornetze, Berlin, Germany, September 2008.
[ bib ]
|
[29]
|
Ivan Martinovic, Nicos Gollan, and Jens Schmitt.
Firewalling wireless sensor networks: Security by wireless.
In Proceedings of the 33rd IEEE Conference on Local Computer
Networks (LCN): Workshop on Practical Issues in Building Sensor Network
Applications (SenseApp 2008), Montreal, Canada, October 2008.
[ bib |
.pdf ]
|
[30]
|
Adam Bachorek, Ivan Martinovic, and Jens Schmitt.
Enabling Authentic Transmissions in WSNs -- Turning Jamming against
the Attacker.
In Proceedings of the IEEE ICNP 4th Annual Workshop on Secure
Network Protocols (NPSec 2008), pages 21--26, Orlando, FL, USA, October
2008.
[ bib |
.pdf ]
|
[31]
|
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, and Jens
Schmitt.
Bringing law and order to ieee 802.11 networks -- a case for
discosec.
Pervasive and Mobile Computing (PMC), Elsevier, 5(5):510 --
525, 2009.
[ bib ]
|
[32]
|
Ivan Martinovic, Luc Cappellaro, Nicos Gollan, and Jens Schmitt.
Chaotic Communication Improves Authentication: Protecting WSNs
Against Injection Attacks.
Security and Communication Networks, Special Issue on Security
in Wireless Sensor Networks, Wiley, 2(2):117--132, March 2009.
[ bib ]
|
[33]
|
Jens Schmitt, Nicos Gollan, and Ivan Martinovic.
A New Service Curve Model to Deal with Non-FIFO Systems.
In 16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen
(KiVS) 2009, Kassel, Germany, pages 143--154. Springer Informatik Aktuell,
March 2009.
[ bib ]
|
[34]
|
Ivan Martinovic and Jens Schmitt.
Turning The Tables: Using Wireless Communication Against An
Attacker.
In 16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen
(KiVS) 2009, Kassel, Germany, pages 205--216. Springer Informatik Aktuell,
March 2009.
[ bib ]
|
[35]
|
Ivan Martinovic, Paul Pichota, and Jens Schmitt.
Jamming for Good: A Fresh Approach to Authentic Communication in
WSNs.
In Proceedings of the ACM Conference on Wireless Network
Security (WiSec 2009), pages 161--168, Zurich, Switzerland, March 2009. ACM
Press.
[ bib |
.pdf ]
|
[36]
|
Jens Schmitt and Ivan Martinovic.
Demultiplexing in Network Calculus - A Stochastic Scaling Approach.
In Proceedings of the 6th International Conference on
Quantitative Evaluation of SysTems (QEST) 2009, pages 82--93, Budapest,
Hungary, September 2009. IEEE Computer Society.
[ bib |
DOI ]
|
[37]
|
Matthias Wilhelm, Ivan Martinovic, and Jens Schmitt.
On Key Agreement in Wireless Sensor Networks based on Radio
Transmission Properties.
In Proceedings of the 5th Annual Workshop on Secure Network
Protocols (NPSec) in conjunction with IEEE ICNP 2009, pages 37--42,
Princeton, New Jersey, USA, October 2009. IEEE Computer Society.
[ bib |
.pdf ]
|
[38]
|
Matthias Wilhelm, Ivan Martinovic, and Jens Schmitt.
Light-weight Key Generation based on Physical Properties of Wireless
Channels.
In Proceedings of the 11. Kryptotag der Gesellschaft für
Informatik e.V., page 4, University of Trier, Germany, November 2009.
[ bib |
.pdf ]
|
[39]
|
Ivan Martinovic.
Security by Wireless or Why Play Fairer than the Attacker?
In Proceedings of the 5th ACM SIGCOMM Asian Internet Engineering
Conference (AINTEC) 2009, Bangkok, Thailand, November 2009. ACM, invited
paper.
[ bib ]
|
[40]
|
Matthias Wilhelm, Ivan Martinovic, and Jens Schmitt.
Secret Keys from Entangled Sensor Motes: Implementation and
Analysis.
In Proceedings of the ACM Conference on Wireless Network
Security (WiSec 2010), pages 139--144, Hoboken, NJ, USA, March 2010. ACM
Press.
[ bib |
.pdf ]
|
[41]
|
Dennis Christmann and Ivan Martinovic.
Experimental Design and Analysis of Transmission Properties in an
Indoor Wireless Sensor Network.
In Proceedings of the 6th International Workshop on Wireless
Network Measurements (WiNMee), in conjunction with WiOpt 2010, Avignon,
France, May 2010. IEEE Computer Society.
[ bib ]
|
[42]
|
Matthias Wilhelm, Ivan Martinovic, and Jens Schmitt.
Key Generation in Wireless Sensor Networks Based on
Frequency-selective Channels: Design, Implementation, and Analysis.
Technical Report arXiv:1005.0712v1 [cs.CR], ArXiv.org, May 2010.
[ bib |
http ]
|
[43]
|
Jens Schmitt, Nicos Gollan, Steffen Bondorf, and Ivan Martinovic.
Pay bursts only once holds for (some) non-fifo systems.
Technical Report 378/10, University of Kaiserslautern, Germany, July
2010.
[ bib |
.pdf ]
|
[44]
|
Matthias Wilhelm, Ivan Martinovic, Ersin Uzun, and Jens Schmitt.
SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors.
In Proceedings of the 6th Annual Workshop on Secure Network
Protocols (NPSec) in conjunction with IEEE ICNP 2010, Kyoto, Japan, October
2010. IEEE.
[ bib |
.pdf ]
|
[45]
|
Jens Schmitt, Hao Wang, and Ivan Martinovic.
A Self-Adversarial Approach to Delay Analysis under Arbitrary
Scheduling.
In Proceedings of 4th International Symposium On Leveraging
Applications of Formal Methods, Verification and Validation (ISoLA 2010).
Springer Verlag, October 2010.
[ bib |
.pdf ]
|
[46]
|
Paolo Barsocchi, Stefano Chessa, Ivan Martinovic, and Gabriele Oligeri.
AmbiSec: Securing Smart Spaces Using Entropy Harvesting.
In Proceedings of the First International Joint Conference on
Ambient Intelligence (AmI-10). Springer Verlag, November 2010.
[ bib ]
|
[47]
|
Dennis Christmann, Ivan Martinovic, and Jens Schmitt.
Analysis of transmission properties in an indoor wireless sensor
network based on a full-factorial design.
Special Issue on Wireless Sensor Networks - Designing for
Real-world Deployment and Deployment Experiences, Measurement Science and
Technology, Institute of Physics, 21(12), December 2010.
[ bib ]
|
[48]
|
Sebastian Wille, Norbert Wehn, Ivan Martinovic, Simon Kunz, and Peter Göhner.
AmICA - A flexible, compact, easy-to-program, and low-power WSN
platform.
In Proceedings of 7th International Conference on Mobile and
Ubiquitous Systems (Mobiquitous). Springer Verlag, December 2010.
[ bib ]
|
[49]
|
Hao Wang, Jens Schmitt, and Ivan Martinovic.
Dynamic demultiplexing in network calculus -- theory and application.
Performance Evaluation, Elsevier, 68(2):201--219, February
2011.
[ bib |
.pdf ]
|
[50]
|
Jens Schmitt, Nicos Gollan, Steffen Bondorf, and Ivan Martinovic.
Pay bursts only once holds for (some) non-fifo systems.
In The 30th IEEE International Conference on Computer
Communications (INFOCOM 2011), Shanghai, China, April 2011.
[ bib |
DOI |
.pdf ]
|
[51]
|
Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, and Vincent Lenders.
Reactive Jamming in Wireless Networks: How Realistic is the Threat?
In Proceedings of the Fourth ACM Conference on Wireless Network
Security (WiSec '11), pages 47--52, New York, NY, USA, June 2011. ACM.
[ bib |
http ]
|
[52]
|
Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, and Vincent Lenders.
WiFire: A firewall for wireless networks.
In Proceedings of the ACM SIGCOMM 2011 Conference on
Applications, Technologies, Architectures, and Protocols for Computer
Communications (SIGCOMM '11), pages 456--457, New York, NY, USA, August
2011. ACM.
[ bib |
.pdf ]
|
[53]
|
Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, and Vincent Lenders.
WiSec 2011 demo: RFReact---a real-time capable and channel-aware
jamming platform.
SIGMOBILE Mobile Computing and Communications Review,
15:41--42, November 2011.
[ bib |
DOI |
http ]
|
[54]
|
Simon Eberz, Martin Strohmeier, Matthias Wilhelm, and Ivan Martinovic.
A practical man-in-the-middle attack on signal-based key generation
protocols.
In Proceedings of the 17th European Symposium on Research in
Computer Security (ESORICS '12). Springer, September 2012.
[ bib |
.pdf ]
|
[55]
|
Tim Stöber, Mario Frank, Jens Schmitt, and Ivan Martinovic.
Who do you sync you are?: smartphone fingerprinting via application
behaviour.
In ACM WiSec, pages 7--12, April 2013.
[ bib |
.pdf ]
|
[56]
|
Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, and Vincent Lenders.
Air dominance in sensor networks: Guarding sensor motes using
selective interference.
Technical Report arXiv:1305.4038, University of Kaiserslautern,
Germany, May 2013.
[ bib |
http ]
|
[57]
|
Matthias Schäfer, Vincent Lenders, and Ivan Martinovic.
Experimental analysis of attacks on next generation air traffic
communication.
In Applied Cryptography and Network Security (ACNS '13), volume
7954 of Lecture Notes in Computer Science, pages 253--271. Springer
Berlin Heidelberg, June 2013.
[ bib |
.pdf ]
|
[58]
|
Matthias Wilhelm, Ivan Martinovic, and Jens Schmitt.
Secure key generation in sensor networks based on frequency-selective
channels.
IEEE Journal on Selected Areas in Communications, 31(8),
September 2013.
[ bib ]
|
[59]
|
Martin Strohmeier, Ivan Martinovic, Utz Roedig, Karim El Defrawy, and Jens
Schmitt.
Neighborhood watch: On network coding throughput and key sharing.
In IEEE GLOBECOM, December 2013.
[ bib |
.pdf ]
|
[60]
|
Daniel S. Berger, Francesco Gringoli, Nicol`o Facchi, Ivan Martinovic, and
Jens Schmitt.
Gaining insight on friendly jamming in a real-world ieee 802.11
network.
In Proceedings of the 2014 ACM Conference on Security and
Privacy in Wireless & Mobile Networks, WiSec '14, pages 105--116, New York,
NY, USA, 2014. ACM.
[ bib |
DOI |
.pdf ]
|
[61]
|
Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, and
Matthias Wilhelm.
Bringing up opensky: A large-scale ads-b sensor network for research.
In Proceedings of the 13th International Symposium on
Information Processing in Sensor Networks (IPSN '14), pages 83--94,
Piscataway, NJ, USA, April 2014. IEEE Press.
[ bib |
http ]
|
[62]
|
Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, and
Matthias Wilhelm.
Demonstration abstract: Opensky: A large-scale ads-b sensor network
for research.
In Proceedings of the 13th International Symposium on
Information Processing in Sensor Networks (IPSN '14), pages 313--314,
Piscataway, NJ, USA, April 2014. IEEE Press.
[ bib |
http ]
|
[63]
|
Martin Strohmeier, Matthias Schäfer, Vincent Lenders, and Ivan Martinovic.
Realities and challenges of nextgen air traffic management: The case
of ads-b.
IEEE Communications Magazine, 52(5):111--118, May 2014.
[ bib |
.pdf ]
|
[64]
|
Martin Strohmeier, Matthias Schäfer, Markus Fuchs, Vincent Lenders, and Ivan
Martinovic.
Opensky: A swiss army knife for air traffic security research.
In IEEE/AIAA 34th Digital Avionics Systems Conference (DASC),
September 2015.
[ bib |
.pdf ]
|
[65]
|
Matthias Schäfer, Martin Strohmeier, Matthew Smith, Markus Fuchs, Rui
Pinheiro, Vincent Lenders, and Ivan Martinovic.
Opensky report 2016: Facts and figures on ssr mode s and ads-b usage.
In IEEE/AIAA 35th Digital Avionics Systems Conference (DASC),
2016.
[ bib |
.pdf ]
|
[66]
|
Martin Strohmeier, Matt Smith, Matthias Schäfer, Vincent Lenders, and Ivan
Martinovic.
Assessing the impact of aviation security on cyber power.
In International Conference on Cyber Conflict (CyCon), 2016.
[ bib |
.pdf ]
|
[67]
|
Martin Strohmeier, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, and Ivan
Martinovic.
On perception and reality in wireless air traffic communications
security.
arXiv:1602.08777 [cs.CR], February 2016.
[ bib |
http ]
|
[68]
|
D. S. Berger, F. Gringoli, N. Facchi, I. Martinovic, and J. B. Schmitt.
Friendly jamming on access points: Analysis and real-world
measurements.
IEEE Transactions on Wireless Communications, PP(99), June
2016.
[ bib |
.pdf ]
|
[69]
|
Martin Strohmeier, Matt Smith, Matthias Schäfer, Vincent Lenders, and Ivan
Martinovic.
Crowdsourcing Security for Wireless Air Traffic Communications.
In Proceedings of the 9th International Conference on Cyber
Conflict (CyCon), May 2017.
[ bib |
.pdf ]
|
[70]
|
Martin Strohmeier, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, and Ivan
Martinovic.
On perception and reality in wireless air traffic communication
security.
IEEE Transactions on Intelligent Transportation Systems,
18(6):1338--1357, June 2017.
[ bib |
.pdf ]
|
[71]
|
Matthias Schäfer, Martin Strohmeier, Matthew Smith, Markus Fuchs, Vincent
Lenders, Marc Liechti, and Ivan Martinovic.
Opensky report 2017: Mode s and ads-b usage of military and other
state aircraft.
In IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),
September 2017.
[ bib |
.pdf ]
|
[72]
|
Martin Strohmeier, Anna K. Niedbala, Matthias Schäfer, Vincent, Lenders, and
Ivan Martinovic.
Surveying aviation professionals on the security of the air traffic
control system.
In International Workshop on Cyber Security for Intelligent
Transportation Systems (CSITS), 2018.
[ bib |
.pdf ]
|
[73]
|
Martin Strohmeier, Matt Smith, Daniel Moser, Matthias Schäfer, Vincent
Lenders, and Ivan Martinovic.
Utilizing air traffic communications for osint on state and
government aircraft.
In 10th International Conference on Cyber Conflict (CyCon),
pages 299--320, May 2018.
[ bib |
.pdf ]
|
[74]
|
Matthias Schäfer, Martin Strohmeier, Matthew Smith, Markus Fuchs, Vincent
Lenders, and Ivan Martinovic.
Opensky report 2018: Assessing the integrity of crowdsourced mode s
and ads-b data.
In Digital Avionics Systems Conference (DASC), 2018 IEEE/AIAA
37th, September 2018.
[ bib |
.pdf ]
|
[75]
|
Matthias Schäfer, Xavier Olive, Martin Strohmeier, Matthew Smith, Vincent
Lenders, and Ivan Martinovic.
Opensky report 2019: Analysing tcas in the real world using big data.
In IEEE/AIAA 38th Digital Avionics Systems Conference (DASC),
September 2019.
[ bib |
.pdf ]
|
[76]
|
Martin Strohmeier, Daniel Moser, Matthias Schäfer, Vincent Lenders, and Ivan
Martinovic.
On the applicability of satellite-based air traffic control
communication for security.
IEEE Communications Magazine, 57(9), September 2019.
[ bib |
.pdf ]
|
[77]
|
Xavier Olive, Axel Tanner, Martin Strohmeier, Matthias Schäfer, Metin
Feridun, Allan Tart, Ivan Martinovic, and Vincent Lenders.
Opensky report 2020: Analysing in-flight emergencies using big data.
In 2020 AIAA/IEEE 39th Digital Avionics Systems Conference
(DASC), 2020.
[ bib |
DOI ]
|
[78]
|
Junzi Sun, Xavier Olive, Martin Strohmeier, Matthias Schäfer, Ivan Martinovic,
and Vincent Lenders.
Opensky report 2021: Insights on ads-b mandate and fleet deployment
in times of crisis.
In 2021 AIAA/IEEE 39th Digital Avionics Systems Conference
(DASC), 2021.
[ bib ]
|
[79]
|
Junzi Sun, Luis Basora, Xavier Olive, Martin Strohmeier, Matthias Schäfer,
Ivan Martinovic, and Vincent Lenders.
Opensky report 2022: Evaluating aviation emissions using crowdsourced
open flight data.
In 2022 IEEE/AIAA 41st Digital Avionics Systems Conference
(DASC), pages 1--8, 2022.
[ bib |
DOI ]
|