Sotabase
Home
Researchers
Career
·
Intern
,
Avidyne Corporation
2022–
·
Professor
,
University of Oxford Department of Computer Science
Publications
(232)
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
IEEE Transactions on Information Forensics and Security · 2012
865
cited
Bringing up OpenSky: A large-scale ADS-B sensor network for research
IPSN-14 Proceedings of the 13th International Symposium on Information Processing in Sensor Networks · 2014
432
cited
Robust Smartphone App Identification via Encrypted Network Traffic Analysis
IEEE Transactions on Information Forensics and Security · 2017
333
cited
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic
European Symposium on Security and Privacy · 2016
311
cited
Short paper: reactive jamming in wireless networks: how realistic is the threat?
Wireless Network Security · 2011
287
cited
Realities and challenges of nextgen air traffic management: the case of ADS-B
IEEE Communications Magazine · 2014
284
cited
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
IEEE Communications Surveys and Tutorials · 2013
241
cited
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces
USENIX Security Symposium · 2012
183
cited
99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms
USENIX Security Symposium · 2022
161
cited
Experimental Analysis of Attacks on Next Generation Air Traffic Communication
International Conference on Applied Cryptography and Network Security · 2013
160
cited
Who do you sync you are?: smartphone fingerprinting via application behaviour
Wireless Network Security · 2013
130
cited
On Perception and Reality in Wireless Air Traffic Communication Security
IEEE transactions on intelligent transportation systems (Print) · 2016
119
cited
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations
USENIX Security Symposium · 2020
118
cited
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics
ACM Asia Conference on Computer and Communications Security · 2017
96
cited
A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols
European Symposium on Research in Computer Security · 2012
90
cited
Using Reflexive Eye Movements for Fast Challenge-Response Authentication
Conference on Computer and Communications Security · 2016
90
cited
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
Network and Distributed System Security Symposium · 2015
84
cited
Broken Hearted: How To Attack ECG Biometrics
Network and Distributed System Security Symposium · 2017
82
cited
Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels
IEEE Journal on Selected Areas in Communications · 2010
81
cited
Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once
Messung, Modellierung und Bewertung von Rechen- und Kommunikationssystemen · 2011
78
cited
Show all 232 papers →
Sotabase