Ivan Martinovic
Ivan Martinovic
Professor of Computer Science, University of Oxford, UK
Verified email at - Homepage
Cited by
Cited by
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
M Frank, R Biedert, E Ma, I Martinovic, D Song
IEEE transactions on information forensics and security 8 (1), 136-148, 2012
Bringing up OpenSky: A large-scale ADS-B sensor network for research
M Schäfer, M Strohmeier, V Lenders, I Martinovic, M Wilhelm
IPSN-14 Proceedings of the 13th International Symposium on Information …, 2014
Robust smartphone app identification via encrypted network traffic analysis
VF Taylor, R Spolaor, M Conti, I Martinovic
IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic
VF Taylor, R Spolaor, M Conti, I Martinovic
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016
Realities and challenges of nextgen air traffic management: the case of ADS-B
M Strohmeier, M Schäfer, V Lenders, I Martinovic
IEEE communications magazine 52 (5), 111-118, 2014
On the security of the automatic dependent surveillance-broadcast protocol
M Strohmeier, V Lenders, I Martinovic
IEEE Communications Surveys & Tutorials 17 (2), 1066-1087, 2014
Short paper: Reactive jamming in wireless networks: How realistic is the threat?
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
Proceedings of the fourth ACM conference on Wireless network security, 47-52, 2011
On the feasibility of {Side-Channel} attacks with {Brain-Computer} interfaces
I Martinovic, D Davies, M Frank, D Perito, T Ros, D Song
21st USENIX Security Symposium (USENIX Security 12), 143-158, 2012
Experimental analysis of attacks on next generation air traffic communication
M Schäfer, V Lenders, I Martinovic
Applied Cryptography and Network Security: 11th International Conference …, 2013
Who do you sync you are? smartphone fingerprinting via application behaviour
T Stöber, M Frank, J Schmitt, I Martinovic
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
On perception and reality in wireless air traffic communication security
M Strohmeier, M Schäfer, R Pinheiro, V Lenders, I Martinovic
IEEE transactions on intelligent transportation systems 18 (6), 1338-1357, 2016
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
A practical man-in-the-middle attack on signal-based key generation protocols
S Eberz, M Strohmeier, M Wilhelm, I Martinovic
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
Broken hearted: How to attack ECG biometrics
S Eberz, N Paoletti, M Roeschlin, M Kwiatkowska, I Martinovic, A Patané
Network and Distributed System Security Symposium 2017, 2017
Using reflexive eye movements for fast challenge-response authentication
I Sluganovic, M Roeschlin, KB Rasmussen, I Martinovic
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Secure key generation in sensor networks based on frequency-selective channels
M Wilhelm, I Martinovic, JB Schmitt
IEEE Journal on Selected Areas in Communications 31 (9), 1779-1790, 2013
Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics
S Eberz, K Rasmussen, V Lenders, I Martinovic
Network and Distributed System Security (NDSS) Symposium, 2015
To update or not to update: Insights from a two-year study of android app evolution
VF Taylor, I Martinovic
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Improving performance bounds in feed-forward networks by paying multiplexing only once
JB Schmitt, FA Zdarsky, I Martinovic
14th GI/ITG Conference-Measurement, Modelling and Evalutation of Computer …, 2008
Intrusion detection for airborne communication using PHY-layer information
M Strohmeier, V Lenders, I Martinovic
International Conference on Detection of Intrusions and Malware, and …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20