Schäfer, Matthias
62  Ergebnisse:
?
1

OpenSky Report 2022: Evaluating Aviation Emissions Using Cr..:

, In: 2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC),
Sun, Junzi ; Basora, Luis ; Olive, Xavier... - p. 1-8 , 2022
 
?
2

Orbit-based authentication using TDOA signatures in satelli..:

, In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
 
?
3

Secure Location Verification: Why You Want Your Verifiers t..:

, In: Computer Security; Lecture Notes in Computer Science,
 
?
4

OpenSky Report 2020: Analysing in-flight emergencies using ..:

, In: 2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC),
 
?
5

SkySense : terrestrial and aerial spectrum use analysed ..:

, In: Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services,
Reynders, Brecht ; Minucci, Franco ; Perenda, Erma... - p. 352-363 , 2020
 
?
 
?
7

BlackWidow: Monitoring the Dark Web for Cyber Security Info..:

, In: 2019 11th International Conference on Cyber Conflict (CyCon),
 
?
8

Structural Data Compression for Embedded Long Prediction Ho..:

, In: 2019 1st International Conference on Electrical, Control and Instrumentation Engineering (ICECIE),
 
?
9

Surveying Aviation Professionals on the Security of the Air..:

, In: Security and Safety Interplay of Intelligent Software Systems; Lecture Notes in Computer Science,
 
?
10

OpenSky Report 2019: Analysing TCAS in the Real World using..:

, In: 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC),
 
?
11

Monitoring meteorological parameters with crowdsourced air ..:

, In: Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks,
 
?
13

Localization of Spoofing Devices using a Large-scale Air Tr..:

, In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security,
Jansen, Kai ; Schäfer, Matthias ; Lenders, Vincent.. - p. 914-916 , 2017
 
?
14

Assessing the impact of aviation security on cyber power:

, In: 2016 8th International Conference on Cyber Conflict (CyCon),
 
?
15

Secure Motion Verification using the Doppler Effect:

, In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks,
 
1-15