Showing 1 - 20 results of 200 for search 'Martinovic, I', query time: 0.05s
Refine Results
-
1
Security by Wireless or Why Play Fairer than the Attacker? by Martinovic, I
Published 2009Conference item -
2
Demultiplexing in Network Calculus − A Stochastic Scaling Approach by Schmitt, J, Martinovic, I
Published 2009Conference item -
3
To update or not to update: Insights From a two-year study of Android app evolution by Taylor, V, Martinovic, I
Published 2017Conference item -
4
Turning The Tables: Using Wireless Communication Against An Attacker by Martinovic, I, Schmitt, J
Published 2009Conference item -
5
CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware by Hassanin, MA, Martinovic, I
Published 2024Journal article -
6
A longitudinal study of financial apps in the Google Play Store by Taylor, V, Martinovic, I
Published 2017Conference item -
7
-
8
The Cyber-ASAT: on the impact of cyber weapons in outer space by Pavur, JC, Martinovic, I
Published 2019Conference item -
9
Zu den Grenzen der Technik bei der Entwicklung von Konzepten zur Online−Betrugs−Prävention (Invited Paper) by Martinovic, I, Schmitt, J
Published 2006Conference item -
10
A Novel Approach for a Lightweight‚ Crypto−free Message Authentication in Wireless Sensor Networks by Martinovic, I, Schmitt, J
Published 2008Conference item -
11
DEMO: Starving permission-Hungry Android apps using SecuRank by Taylor, V, Martinovic, I
Published 2016Conference item -
12
Security and Privacy Impacts of a Unique Personal Identifier by Martin, A, Martinovic, I
Published 2016Working paper -
13
On detecting deception in space situational awareness by Pavur, J, Martinovic, I
Published 2021Conference item -
14
EMPower: Detecting Malicious Power Line Networks from EM Emissions by Baker, R, Martinovic, I
Published 2018Conference item -
15
Poster: Detecting False−Data Injection Attacks on Air Traffic Control Protocols by Strohmeier, M, Martinovic, I
Published 2014Conference item -
16
Radio Resource Management in IEEE 802.11−based UMA Networks by Zdarsky, F, Martinovic, I
Published 2008Book -
17
VisAuth: authentication over a visual channel using an embedded image by Sturgess, J, Martinovic, I
Published 2018Conference item -
18
Haunted house: physical smart home event verification in the presence of compromised sensors by Birnbach, S, Eberz, S, Martinovic, I
Published 2022Journal article -
19
Peeves: Physical Event Verification in Smart Homes by Birnbach, S, Eberz, S, Martinovic, I
Published 2019Conference item -
20
Losing the car keys: wireless PHY-layer insecurity in EV charging by Baker, R, Martinovic, I
Published 2019Conference item