Follow
Ivan Martinovic
Ivan Martinovic
Professor, Computer Science Department, University of Oxford, UK
Verified email at cs.ox.ac.uk - Homepage
Title
Cited by
Cited by
Year
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
M Frank, R Biedert, E Ma, I Martinovic, D Song
IEEE transactions on information forensics and security 8 (1), 136-148, 2012
10572012
Bringing up OpenSky: A large-scale ADS-B sensor network for research
M Schäfer, M Strohmeier, V Lenders, I Martinovic, M Wilhelm
IPSN-14 Proceedings of the 13th International Symposium on Information …, 2014
5232014
Robust smartphone app identification via encrypted network traffic analysis
VF Taylor, R Spolaor, M Conti, I Martinovic
IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017
4072017
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic
VF Taylor, R Spolaor, M Conti, I Martinovic
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016
3772016
Realities and challenges of nextgen air traffic management: the case of ADS-B
M Strohmeier, M Schäfer, V Lenders, I Martinovic
IEEE communications magazine 52 (5), 111-118, 2014
3652014
On the security of the automatic dependent surveillance-broadcast protocol
M Strohmeier, V Lenders, I Martinovic
IEEE Communications Surveys & Tutorials 17 (2), 1066-1087, 2014
3492014
Short paper: Reactive jamming in wireless networks: How realistic is the threat?
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
Proceedings of the fourth ACM conference on Wireless network security, 47-52, 2011
3392011
On the feasibility of {Side-Channel} attacks with {Brain-Computer} interfaces
I Martinovic, D Davies, M Frank, D Perito, T Ros, D Song
21st USENIX Security Symposium (USENIX Security 12), 143-158, 2012
2202012
Experimental analysis of attacks on next generation air traffic communication
M Schäfer, V Lenders, I Martinovic
Applied Cryptography and Network Security: 11th International Conference …, 2013
2102013
Who do you sync you are? smartphone fingerprinting via application behaviour
T Stöber, M Frank, J Schmitt, I Martinovic
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
1742013
On perception and reality in wireless air traffic communication security
M Strohmeier, M Schäfer, R Pinheiro, V Lenders, I Martinovic
IEEE transactions on intelligent transportation systems 18 (6), 1338-1357, 2016
1482016
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
1152017
Using reflexive eye movements for fast challenge-response authentication
I Sluganovic, M Roeschlin, KB Rasmussen, I Martinovic
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1102016
99% false positives: A qualitative study of {SOC} analysts' perspectives on security alarms
BA Alahmadi, L Axon, I Martinovic
31st USENIX Security Symposium (USENIX Security 22), 2783-2800, 2022
1092022
A practical man-in-the-middle attack on signal-based key generation protocols
S Eberz, M Strohmeier, M Wilhelm, I Martinovic
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
1092012
Broken hearted: How to attack ECG biometrics
S Eberz, N Paoletti, M Roeschlin, M Kwiatkowska, I Martinovic, A Patané
Network and Distributed System Security Symposium 2017, 2017
1042017
{SLAP}: Improving physical adversarial examples with {Short-Lived} adversarial perturbations
G Lovisotto, H Turner, I Sluganovic, M Strohmeier, I Martinovic
30th USENIX Security Symposium (USENIX Security 21), 1865-1882, 2021
1022021
Secure key generation in sensor networks based on frequency-selective channels
M Wilhelm, I Martinovic, JB Schmitt
IEEE Journal on Selected Areas in Communications 31 (9), 1779-1790, 2013
952013
Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics
S Eberz, K Rasmussen, V Lenders, I Martinovic
Network and Distributed System Security (NDSS) Symposium, 2015
932015
Intrusion detection for airborne communication using PHY-layer information
M Strohmeier, V Lenders, I Martinovic
International Conference on Detection of Intrusions and Malware, and …, 2015
882015
The system can't perform the operation now. Try again later.
Articles 1–20