Folgen
Vincent Lenders
Vincent Lenders
Cyber-Defence Campus, armasuisse
Bestätigte E-Mail-Adresse bei lenders.ch - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Deep learning models for wireless signal classification with distributed low-cost spectrum sensors
S Rajendran, W Meert, D Giustiniano, V Lenders, S Pollin
IEEE Transactions on Cognitive Communications and Networking 4 (3), 433-445, 2018
6432018
Bringing up OpenSky: A large-scale ADS-B sensor network for research
M Schäfer, M Strohmeier, V Lenders, I Martinovic, M Wilhelm
IPSN-14 Proceedings of the 13th International Symposium on Information …, 2014
4732014
A realistic evaluation and comparison of indoor location technologies: Experiences and lessons learned
D Lymberopoulos, J Liu, X Yang, RR Choudhury, V Handziski, S Sen
Proceedings of the 14th international conference on information processing …, 2015
4222015
Realities and challenges of nextgen air traffic management: the case of ADS-B
M Strohmeier, M Schäfer, V Lenders, I Martinovic
IEEE Communications Magazine 52 (5), 111-118, 2014
3382014
Short paper: Reactive jamming in wireless networks: How realistic is the threat?
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
Proceedings of the fourth ACM conference on Wireless network security, 47-52, 2011
3312011
On the security of the automatic dependent surveillance-broadcast protocol
M Strohmeier, V Lenders, I Martinovic
IEEE Communications Surveys & Tutorials 17 (2), 1066-1087, 2014
3292014
Wireless ad hoc podcasting
V Lenders, M May, G Karlsson, C Wacha
ACM SIGMOBILE Mobile Computing and Communications Review 12 (1), 65-67, 2008
2812008
Experimental analysis of attacks on next generation air traffic communication
M Schäfer, V Lenders, I Martinovic
Applied Cryptography and Network Security: 11th International Conference …, 2013
2012013
Location-based trust for mobile user-generated content: applications, challenges and implementations
V Lenders, E Koukoumidis, P Zhang, M Martonosi
Proceedings of the 9th workshop on Mobile computing systems and applications …, 2008
1762008
Service discovery in mobile ad hoc networks: A field theoretic approach
V Lenders, M May, B Plattner
Pervasive and Mobile Computing 1 (3), 343-370, 2005
1752005
Electrosense: Open and big spectrum data
S Rajendran, R Calvo-Palomino, M Fuchs, B Van den Bergh, H Cordobés, ...
IEEE Communications Magazine 56 (1), 210-217, 2017
1532017
On perception and reality in wireless air traffic communication security
M Strohmeier, M Schäfer, R Pinheiro, V Lenders, I Martinovic
IEEE transactions on intelligent transportation systems 18 (6), 1338-1357, 2016
1372016
Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks
K Jansen, M Schäfer, D Moser, V Lenders, C Pöpper, J Schmitt
2018 IEEE Symposium on Security and Privacy (SP), 1018-1031, 2018
1362018
Analyzing the impact of mobility in ad hoc networks
V Lenders, J Wagner, M May
Proceedings of the 2nd international workshop on Multi-hop ad hoc networks …, 2006
1232006
Multi-path routing protocols in wireless mobile ad hoc networks: A quantitative comparison
G Parissidis, V Lenders, M May, B Plattner
International Conference on Next Generation Wired/Wireless Networking, 313-326, 2006
1162006
Detection of reactive jamming in DSSS-based wireless communications
M Spuhler, D Giustiniano, V Lenders, M Wilhelm, JB Schmitt
IEEE Transactions on Wireless Communications 13 (3), 1593-1603, 2014
1132014
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
1052017
Delay-tolerant broadcasting
G Karlsson, V Lenders, M May
Proceedings of the 2006 SIGCOMM workshop on Challenged networks, 197-204, 2006
932006
An Automated Approach for Complementing Ad Blockers' Blacklists.
D Gugelmann, M Happe, B Ager, V Lenders
Proc. Priv. Enhancing Technol. 2015 (2), 282-298, 2015
832015
{NetHide}: Secure and practical network topology obfuscation
R Meier, P Tsankov, V Lenders, L Vanbever, M Vechev
27th USENIX Security Symposium (USENIX Security 18), 693-709, 2018
812018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20