Toni Perkovic

Orcid: 0000-0001-8826-4905

According to our database1, Toni Perkovic authored at least 32 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Privacy leakage of LoRaWAN smart parking occupancy sensors.
Future Gener. Comput. Syst., 2023

An Investigation of a Replay Attack on LoRaWAN Wearable Devices.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2023

Ontology-Based Cybersecurity for Well-Being, Aging and Health: A Scoping Review.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2023

2022
Machine Learning and Soil Humidity Sensing: Signal Strength Approach.
ACM Trans. Internet Techn., 2022

Self-Sensing Antenna for Soil Moisture: Beacon Approach.
Sensors, 2022

Towards Ontology-Based Requirements Engineering for IoT-Supported Well-Being, Aging and Health.
Proceedings of the 30th IEEE International Requirements Engineering Conference Workshops, 2022

Low-cost BLE bracelet as patients monitoring platform: range restrictions.
Proceedings of the IEEE International Conference on E-health Networking, 2022

An Industrial IoT-Based Ontology Development for Well-Being, Aging and Health: A Scoping Review.
Proceedings of the IEEE International Conference on E-health Networking, 2022

2021
IoT-Ready Energy-Autonomous Parking Sensor Device.
IEEE Internet Things J., 2021

Geometry from Thin Air: Theremin as a Playful Learning Device.
Proceedings of the 16th International Conference on Telecommunications, 2021

2020
Analysis of Passive RFID Applicability in a Retail Store: What Can We Expect?
Sensors, 2020

On WPA2-Enterprise Privacy in High Education and Science.
Secur. Commun. Networks, 2020

IoT Wallet: Machine Learning-based Sensor Portfolio Application.
CoRR, 2020

Global Communications Newsletter.
IEEE Commun. Mag., 2020

Towards linking social media profiles with user's WiFi preferred network list.
Ad Hoc Networks, 2020

2019
Proof of Presence: Novel Vehicle Detection System.
IEEE Wirel. Commun., 2019

LISA: Visible light based initialization and SMS based authentication of constrained IoT devices.
Future Gener. Comput. Syst., 2019

Smart Parking Sensor Performance Evaluation.
Proceedings of the 2019 International Conference on Software, 2019

Comparing RFID Tags Performance through Software Defined Radio.
Proceedings of the IEEE International Conference on RFID Technology and Applications, 2019

Meeting Challenges in IoT: Sensing, Energy Efficiency, and the Implementation.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

2018
BlinkComm: Initialization of IoT Devices Using Visible Light Communication.
Wirel. Commun. Mob. Comput., 2018

SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists.
Wirel. Commun. Mob. Comput., 2018

Global Communications Newsletter.
IEEE Commun. Mag., 2018

Towards reliable IoT: Testing LoRa communication.
Proceedings of the 26th International Conference on Software, 2018

2016
Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices.
Secur. Commun. Networks, 2016

2015
Timing Attacks on Cognitive Authentication Schemes.
IEEE Trans. Inf. Forensics Secur., 2015

Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks.
Pervasive Mob. Comput., 2015

2013
LIRA: A new key deployment scheme for Wireless Body Area Networks.
Proceedings of the 21st International Conference on Software, 2013

2012
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User.
IEEE Trans. Mob. Comput., 2012

2011
Breaking undercover: exploiting design flaws and nonuniform human behavior.
Proceedings of the Symposium On Usable Privacy and Security, 2011

2010
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009


  Loading...