Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 306
1.
  • On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
    Strohmeier, Martin; Lenders, Vincent; Martinovic, Ivan IEEE Communications surveys and tutorials, 01/2015, Letnik: 17, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next-generation air transportation systems. As the heart of modern air traffic ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
2.
  • Touchalytics: On the Applic... Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
    Frank, M.; Biedert, R.; Ma, E. ... IEEE transactions on information forensics and security, 2013-Jan., 2013, 2013-1-00, 20130101, Letnik: 8, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    We investigate whether a classifier can continuously authenticate users based on the way they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch features that can ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
3.
  • Secure Key Generation in Se... Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels
    Wilhelm, M.; Martinovic, I.; Schmitt, J. B. IEEE journal on selected areas in communications, 09/2013, Letnik: 31, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Key management in wireless sensor networks faces several unique challenges. The scale, resource limitations, and new threats such as node capture suggest the use of in-network key generation. ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
4.
Celotno besedilo

PDF
5.
  • A Practical Man-In-The-Midd... A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols
    Eberz, Simon; Strohmeier, Martin; Wilhelm, Matthias ... Computer Security – ESORICS 2012
    Book Chapter
    Recenzirano
    Odprti dostop

    Generating secret keys using physical properties of the wireless channel has recently become a popular research area. The main security assumption of these protocols is that a sufficiently distant ...
Celotno besedilo

PDF
6.
  • A machine learning approach... A machine learning approach for time series forecasting with application to debt risk of the Montenegrin electricity industry
    Đukanović, Milena; Kašćelan, Ljiljana; Vuković, Sunčica ... Energy reports, September 2023, 2023-09-00, 2023-09-01, Letnik: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Level of customer electricity debts is a relevant information for the electricity production company, as it represents uncollected revenue for the provided service. Higher level of debts may affect ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
7.
  • Robust Smartphone App Ident... Robust Smartphone App Identification via Encrypted Network Traffic Analysis
    Taylor, Vincent F.; Spolaor, Riccardo; Conti, Mauro ... IEEE transactions on information forensics and security, 2018-Jan., 2018-1-00, Letnik: 13, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The apps installed on a smartphone can reveal much information about a user, such as their medical conditions, sexual orientation, or religious beliefs. In addition, the presence or absence of ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
8.
  • A k-NN-Based Localization A... A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks
    Strohmeier, Martin; Martinovic, Ivan; Lenders, Vincent IEEE transactions on aerospace and electronic systems, 2018-June, 2018-6-00, Letnik: 54, Številka: 3
    Journal Article
    Recenzirano

    In this paper, we argue that current state-of-the-art methods of aircraft localization such as multilateration are insufficient, in particular for modern crowdsourced air traffic networks with ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
9.
  • CipherTrace: automatic dete... CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware
    Hassanin, Mostafa AbdelMoez; Martinovic, Ivan Journal of cybersecurity (Oxford), 06/2024, Letnik: 10, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract In 2021, the largest US pipeline system for refined oil products suffered a 6-day shutdown due to a ransomware attack 1. In 2023, the sensitive systems of the US Marshals Service were ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
10.
  • Peeves Peeves
    Birnbach, Simon; Eberz, Simon; Martinovic, Ivan Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 11/2019
    Conference Proceeding

    With the rising availability of smart devices (e.g., smart thermostats, lights, locks, etc.), they are increasingly combined into "smart homes". A key component of smart homes are event sensors that ...
Celotno besedilo
Dostopno za: NUK, UL
1 2 3 4 5
zadetkov: 306

Nalaganje filtrov