< Back to previous page
Researcher
Bram BONNE
- Keywords:Computer science (incl. applied informatics)
- Disciplines:Artificial intelligence, Computer architecture and networks, Distributed computing, Information sciences, Information systems, Scientific computing, Theoretical computer science, Visual computing, Computer theory, Signal processing
Affiliations
- Computer Sciences (Department)
Member
From1 Sep 2011 → 31 Aug 2018 - Applied Computer Science Lab (Research group)
Member
From1 Sep 2011 → 31 Aug 2018 - Expertise Centre for Digital Media (Research Center)
Member
From1 Sep 2011 → 31 Aug 2018 - Faculty of Sciences (Faculty)
Member
From1 Sep 2011 → 31 Aug 2018
Publications
1 - 10 of 10
- Non-cooperative 802.11 MAC layer fingerprinting and tracking of mobile devices(2017)
Authors: Pieter ROBYNS, Bram BONNE, Peter QUAX, Wim LAMOTTE
Pages: 1 - 21 - Exploring decision making with Android’s runtime permission dialogs using in-context surveys(2017)
Authors: Bram BONNE, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft
Pages: 195 - 210 - The Privacy API: Facilitating Insights in How One's Own User Data is Shared(2017)
Authors: Bram BONNE, Peter QUAX, Wim LAMOTTE
Pages: 72 - 75 - Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users(2017)
Authors: Bram BONNE, Gustavo ROVELO RUIZ, Peter QUAX, Wim LAMOTTE
Pages: 1 - 20 - Assessing and improving security and privacy for smartphone users(2017)
Authors: Bram BONNE, Wim LAMOTTE
Number of pages: 217 - POSTER: Assessing the Impact of 802.11 Vulnerabilities using Wicability(2016)
Authors: Pieter ROBYNS, Bram BONNE, Peter QUAX, Wim LAMOTTE
Pages: 217 - 218Number of pages: 2 - Your Mobile Phone is a Traitor! -- Raising Awareness on Ubiquitous Privacy Issues with SASQUATCH(2014)
Authors: Bram BONNE, Peter QUAX, Wim LAMOTTE
Pages: 38 - 53 - Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles(2014)
Authors: Pieter ROBYNS, Bram BONNE, Peter QUAX, Wim LAMOTTE
Pages: 189 - 194 - WiFiPi: Involuntary Tracking of Visitors at Mass Events(2013)
Authors: Bram BONNE, Arno BARZAN, Peter QUAX, Wim LAMOTTE
Pages: 1 - 6 - A Comparative Simulation of Opportunistic Routing Protocols Using Realistic Mobility Data Obtained From Mass Events(2013)
Authors: Arno BARZAN, Bram BONNE, Peter QUAX, Wim LAMOTTE, Mathias Versichele, Nico Van de Weghe
Pages: 1 - 6
Linked dataset
1 - 1 of 1