Vincent Lenders
According to our database1,
Vincent Lenders
authored at least 125 papers
between 2005 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2020
IEEE Trans. Cogn. Commun. Netw., 2020
QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband.
CoRR, 2020
Comput. Networks, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
SkySense: terrestrial and aerial spectrum use analysed using lightweight sensing technology with weather balloons.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
2019
IEEE Trans. Cogn. Commun. Netw., 2019
On the Applicability of Satellite-Based Air Traffic Control Communication for Security.
IEEE Commun. Mag., 2019
Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019
Proceedings of the 18th International Conference on Information Processing in Sensor Networks, 2019
Proceedings of the 18th ACM Workshop on Hot Topics in Networks, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Machine Learninģ-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defense Exercise.
Proceedings of the 11th International Conference on Cyber Conflict, 2019
Proceedings of the 11th International Conference on Cyber Conflict, 2019
Proceedings of the 11th International Conference on Cyber Conflict, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Deep Learning Models for Wireless Signal Classification With Distributed Low-Cost Spectrum Sensors.
IEEE Trans. Cogn. Commun. Netw., 2018
A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2018
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS).
Proc. Priv. Enhancing Technol., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018
Nanosecond-precision time-of-arrival estimation for aircraft signals with low-cost SDR receivers.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018
The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018
Proceedings of the 10th International Conference on Cyber Conflict, 2018
FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feeds.
Proceedings of the 10th International Conference on Cyber Conflict, 2018
Proceedings of the 10th International Conference on Cyber Conflict, 2018
2017
Filtering Noisy 802.11 Time-of-Flight Ranging Measurements From Commoditized WiFi Radios.
IEEE/ACM Trans. Netw., 2017
IEEE Trans. Intell. Transp. Syst., 2017
Distributed Deep Learning Models for Wireless Signal Classification with Low-Cost Spectrum Sensors.
CoRR, 2017
Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS).
CoRR, 2017
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017
LTESS-track: A Precise and Fast Frequency Offset Estimation for low-cost SDR Platforms.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS.
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Semantic Web - 14th International Conference, 2017
Proceedings of the 2017 IEEE International Symposium on Dynamic Spectrum Access Networks, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Proceedings of the 9th International Conference on Cyber Conflict, 2017
Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
ACM Trans. Priv. Secur., 2016
CoRR, 2016
CoRR, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 14th International Symposium on Modeling and Optimization in Mobile, 2016
Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 8th International Conference on Cyber Conflict, 2016
2015
Proc. Priv. Enhancing Technol., 2015
IEEE Secur. Priv., 2015
Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic?
IEEE Secur. Priv., 2015
Digit. Investig., 2015
IEEE Commun. Surv. Tutorials, 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 18th ACM International Conference on Modeling, 2015
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015
2014
IEEE Trans. Wirel. Commun., 2014
IEEE Trans. Wirel. Commun., 2014
IEEE Commun. Mag., 2014
Proceedings of the IPSN'14, 2014
Proceedings of the IPSN'14, 2014
Proceedings of the IPSN'14, 2014
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014
Proceedings of the 2014 CoNEXT on Student Workshop, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
CoRR, 2013
CoRR, 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the Workshop on Sensor Data Fusion: Trends, Solutions, Applications, 2013
Proceedings of the Wireless Sensor Networks - 10th European Conference, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 2012
2011
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
2009
IEEE Trans. Mob. Comput., 2009
2008
An empirical study of the impact of mobility on link failures in an 802.11 ad hoc network.
IEEE Wirel. Commun., 2008
IEEE/ACM Trans. Netw., 2008
Location-based trust for mobile user-generated content: applications, challenges and implementations.
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the IEEE 19th International Symposium on Personal, 2008
Proceedings of the Third Workshop on Challenged Networks, CHANTS 2008, San Francisco, 2008
2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
Proceedings of the Second Workshop on Challenged Networks, CHANTS 2007, Montréal, Québec, 2007
2006
PhD thesis, 2006
Proceedings of the 2006 International Symposium on a World of Wireless, 2006
Multi-path Routing Protocols in Wireless Mobile Ad Hoc Networks: A Quantitative Comparison.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006
Proceedings of the 2nd international workshop on Multi-hop ad hoc networks: from theory to reality, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
2005
Pervasive Mob. Comput., 2005
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005