default search action
Toni Perkovic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j17]Lea Dujic Rodic, Toni Perkovic, Maja Skiljo, Petar Solic:
Privacy leakage of LoRaWAN smart parking occupancy sensors. Future Gener. Comput. Syst. 138: 142-159 (2023) - 2022
- [j16]Maja Skiljo, Zoran Blazevic, Lea Dujic Rodic, Toni Perkovic, Petar Solic:
Self-Sensing Antenna for Soil Moisture: Beacon Approach. Sensors 22(24): 9863 (2022) - [j15]Lea Dujic Rodic, Tomislav Zupanovic, Toni Perkovic, Petar Solic, Joel J. P. C. Rodrigues:
Machine Learning and Soil Humidity Sensing: Signal Strength Approach. ACM Trans. Internet Techn. 22(2): 39:1-39:21 (2022) - 2021
- [j14]Petar Solic, Alfiero Leoni, Riccardo Colella, Toni Perkovic, Luca Catarinucci, Vincenzo Stornelli:
IoT-Ready Energy-Autonomous Parking Sensor Device. IEEE Internet Things J. 8(6): 4830-4840 (2021) - 2020
- [j13]Ante Dagelic, Mario Cagalj, Toni Perkovic, Marin Bilos:
Towards linking social media profiles with user's WiFi preferred network list. Ad Hoc Networks 107: 102244 (2020) - [j12]Edward Smith, Toni Perkovic, Petar Solic, Sandro Nizetic, Ana Culic, Luigi Patrono, Joel J. P. C. Rodrigues, Oscar Martínez Bonastre, Mohab A. Mangoud:
Global Communications Newsletter. IEEE Commun. Mag. 58(2): 7-10 (2020) - [j11]Toni Perkovic, Ante Dagelic, Marin Bugaric, Mario Cagalj:
On WPA2-Enterprise Privacy in High Education and Science. Secur. Commun. Networks 2020: 3731529:1-3731529:11 (2020) - [j10]Maja Skiljo, Petar Solic, Zoran Blazevic, Toni Perkovic:
Analysis of Passive RFID Applicability in a Retail Store: What Can We Expect? Sensors 20(7): 2038 (2020) - 2019
- [j9]Toni Perkovic, Mario Cagalj, Tonko Kovacevic:
LISA: Visible light based initialization and SMS based authentication of constrained IoT devices. Future Gener. Comput. Syst. 97: 105-118 (2019) - [j8]Petar Solic, Riccardo Colella, Luca Catarinucci, Toni Perkovic, Luigi Patrono:
Proof of Presence: Novel Vehicle Detection System. IEEE Wirel. Commun. 26(6): 44-49 (2019) - 2018
- [j7]Stefano Bregni, Octavia A. Dobre, Dinko Begusic, Nikola Rozic, Pascal Lorenz, Josko Radic, Katarina Rados, Toni Perkovic, Petar Solic, Sandro Nizetic, Katarina Vukojevic, Luigi Patrono, Joel J. P. C. Rodrigues:
Global Communications Newsletter. IEEE Commun. Mag. 56(6): 7-10 (2018) - [j6]Ante Dagelic, Toni Perkovic, Bojan Vujatovic, Mario Cagalj:
SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists. Wirel. Commun. Mob. Comput. 2018: 5153265:1-5153265:15 (2018) - [j5]Toni Perkovic, Tonko Kovacevic, Mario Cagalj:
BlinkComm: Initialization of IoT Devices Using Visible Light Communication. Wirel. Commun. Mob. Comput. 2018: 8523078:1-8523078:16 (2018) - 2016
- [j4]Tonko Kovacevic, Toni Perkovic, Mario Cagalj:
Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices. Secur. Commun. Networks 9(10): 1050-1071 (2016) - 2015
- [j3]Mario Cagalj, Toni Perkovic, Marin Bugaric, Shujun Li:
Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive Mob. Comput. 20: 64-81 (2015) - [j2]Mario Cagalj, Toni Perkovic, Marin Bugaric:
Timing Attacks on Cognitive Authentication Schemes. IEEE Trans. Inf. Forensics Secur. 10(3): 584-596 (2015) - 2012
- [j1]Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh Saxena, Dinko Begusic:
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User. IEEE Trans. Mob. Comput. 11(2): 337-351 (2012)
Conference and Workshop Papers
- 2023
- [c14]Toni Perkovic, Josip Sabic, Kristina Zovko, Petar Solic:
An Investigation of a Replay Attack on LoRaWAN Wearable Devices. MeditCom 2023: 45-49 - [c13]Hrvoje Belani, Petar Solic, Toni Perkovic, Kristina Zovko:
Ontology-Based Cybersecurity for Well-Being, Aging and Health: A Scoping Review. MeditCom 2023: 50-55 - 2022
- [c12]Kristina Zovko, Dinko Begusic, Petar Solic, Toni Perkovic:
Low-cost BLE bracelet as patients monitoring platform: range restrictions. HealthCom 2022: 119-123 - [c11]Hrvoje Belani, Petar Solic, Toni Perkovic:
An Industrial IoT-Based Ontology Development for Well-Being, Aging and Health: A Scoping Review. HealthCom 2022: 179-185 - [c10]Hrvoje Belani, Petar Solic, Toni Perkovic:
Towards Ontology-Based Requirements Engineering for IoT-Supported Well-Being, Aging and Health. RE Workshops 2022: 65-74 - 2021
- [c9]Duje Coko, Lea Dujic Rodic, Toni Perkovic, Petar Solic:
Geometry from Thin Air: Theremin as a Playful Learning Device. ConTEL 2021: 89-96 - 2019
- [c8]Toni Perkovic, Slaven Damjanovic, Petar Solic, Luigi Patrono, Joel J. P. C. Rodrigues:
Meeting Challenges in IoT: Sensing, Energy Efficiency, and the Implementation. ICICT (1) 2019: 419-430 - [c7]Hamid Zargariasl, Petar Solic, Katarina Rados, Toni Perkovic, Zoran Blazevic, Joel J. P. C. Rodrigues:
Comparing RFID Tags Performance through Software Defined Radio. RFID-TA 2019: 494-498 - [c6]Petar Solic, Toni Perkovic, Toni Konsa, Hamid Zargariasl, Luigi Patrono:
Smart Parking Sensor Performance Evaluation. SoftCOM 2019: 1-6 - 2018
- [c5]Hrvoje Rudes, Ivana Nizetic Kosovic, Toni Perkovic, Mario Cagalj:
Towards reliable IoT: Testing LoRa communication. SoftCOM 2018: 1-3 - 2013
- [c4]Tonko Kovacevic, Toni Perkovic, Mario Cagalj:
LIRA: A new key deployment scheme for Wireless Body Area Networks. SoftCOM 2013: 1-6 - 2011
- [c3]Toni Perkovic, Shujun Li, Asma Mumtaz, Syed Ali Khayam, Yousra Javed, Mario Cagalj:
Breaking undercover: exploiting design flaws and nonuniform human behavior. SOUPS 2011: 5 - 2010
- [c2]Toni Perkovic, Mario Cagalj, Nitesh Saxena:
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model. Financial Cryptography 2010: 351-358 - 2009
- [c1]Toni Perkovic, Ivo Stancic, Luka Malisa, Mario Cagalj:
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks. SecureComm 2009: 228-247
Informal and Other Publications
- 2022
- [i3]Hrvoje Belani, Petar Solic, Toni Perkovic:
Towards Ontology-Based Requirements Engineering for IoT-Supported Well-Being, Aging and Health. CoRR abs/2211.10735 (2022) - 2020
- [i2]Petar Solic, Ante Lojic Kapetanovic, Tomislav Zupanovic, Ivo Kovacevic, Toni Perkovic, Petar Popovski:
IoT Wallet: Machine Learning-based Sensor Portfolio Application. CoRR abs/2011.06861 (2020) - [i1]Lea Dujic Rodic, Tomislav Zupanovic, Toni Perkovic, Petar Solic, Joel J. P. C. Rodrigues:
Machine Learning and Soil Humidity Sensing: Signal Strength Approach. CoRR abs/2011.08273 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint