Search for persons
X
?
2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC) ,
1
OpenSky Report 2022: Evaluating Aviation Emissions Using Cr..:
, In:
?
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
2
Orbit-based authentication using TDOA signatures in satelli..:
, In:
?
Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services ,
3
SkySense : terrestrial and aerial spectrum use analysed ..:
, In:
?
Computer Security; Lecture Notes in Computer Science ,
4
Secure Location Verification: Why You Want Your Verifiers t..:
, In:
?
2020 IEEE Vehicular Networking Conference (VNC) ,
5
Experimental Evaluation of the N-Ray Ground Interference Mo..:
, In:
?
2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC) ,
6
OpenSky Report 2020: Analysing in-flight emergencies using ..:
, In:
?
Security and Safety Interplay of Intelligent Software Systems; Lecture Notes in Computer Science ,
7
Surveying Aviation Professionals on the Security of the Air..:
, In:
?
2019 1st International Conference on Electrical, Control and Instrumentation Engineering (ICECIE) ,
8
Structural Data Compression for Embedded Long Prediction Ho..:
, In:
?
2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC) ,
9
OpenSky Report 2019: Analysing TCAS in the Real World using..:
, In:
?
2019 11th International Conference on Cyber Conflict (CyCon) ,
10
BlackWidow: Monitoring the Dark Web for Cyber Security Info..:
, In:
?
Advances in Production Research ,
11
Behavior of the Amplitude Signal by Testing Fiber-Reinforce..:
, In:
?
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks ,
12
Monitoring meteorological parameters with crowdsourced air ..:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
13
Localization of Spoofing Devices using a Large-scale Air Tr..:
, In:
?
2016 8th International Conference on Cyber Conflict (CyCon) ,
14
Assessing the impact of aviation security on cyber power:
, In:
?
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks ,
15