% % This file was created by the TYPO3 extension % bib % --- Timezone: UTC % Creation date: 2024-12-03 % Creation time: 13-32-53 % --- Number of references % 16 % @Inproceedings { 2016-henze-cloudcom-trinics, title = {Towards Transparent Information on Individual Cloud Service Usage}, year = {2016}, month = {12}, day = {12}, pages = {366-370}, tags = {trinics}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-cloudcom-trinics.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg}, language = {en}, ISBN = {978-1-5090-1445-3}, DOI = {10.1109/CloudCom.2016.0064}, reviewed = {1}, author = {Henze, Martin and Kerpen, Daniel and Hiller, Jens and Eggert, Michael and Hellmanns, David and M{\"u}hmer, Erik and Renuli, Oussama and Maier, Henning and St{\"u}ble, Christian and H{\"a}u{\ss}ling, Roger and Wehrle, Klaus} } @Inproceedings { 2016-henze-wpes-cppl, title = {CPPL: Compact Privacy Policy Language}, year = {2016}, month = {10}, day = {24}, pages = {99-110}, tags = {ssiclops}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-wpes-cppl.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria}, language = {en}, ISBN = {978-1-4503-4569-9}, DOI = {10.1145/2994620.2994627}, reviewed = {1}, author = {Henze, Martin and Hiller, Jens and Schmerling, Sascha and Ziegeldorf, Jan Henrik and Wehrle, Klaus} } @Inproceedings { 2016-mitseva-ccs-fingerprinting, title = {POSTER: Fingerprinting Tor Hidden Services}, year = {2016}, month = {10}, day = {24}, pages = {1766-1768}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-mitseva-ccs-fingerprinting.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria}, language = {en}, ISBN = {978-1-4503-4139-4}, DOI = {10.1145/2976749.2989054}, reviewed = {1}, author = {Mitseva, Asya and Panchenko, Andriy and Lanze, Fabian and Henze, Martin and Wehrle, Klaus and Engel, Thomas} } @Inproceedings { 2016-matzutt-ccs-bitcoin, title = {POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store}, year = {2016}, month = {10}, day = {24}, pages = {1769-1771}, tags = {mynedata}, url = {/fileadmin/papers/2016/2016-matzutt-ccs-blockchaincontent.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria}, language = {en}, ISBN = {978-1-4503-4139-4}, DOI = {10.1145/2976749.2989059}, reviewed = {1}, author = {Matzutt, Roman and Hohlfeld, Oliver and Henze, Martin and Rawiel, Robin and Ziegeldorf, Jan Henrik and Wehrle, Klaus} } @Inproceedings { 2016-ackermann-healthcom-eeg-emotion, title = {EEG-based Automatic Emotion Recognition: Feature Extraction, Selection and Classification Methods}, year = {2016}, month = {9}, day = {14}, pages = {159--164}, abstract = {Automatic emotion recognition is an interdisciplinary research field which deals with the algorithmic detection of human affect, e.g. anger or sadness, from a variety of sources, such as speech or facial gestures. Apart from the obvious usage for industry applications in human-robot interaction, acquiring the emotional state of a person automatically also is of great potential for the health domain, especially in psychology and psychiatry. Here, evaluation of human emotion is often done using oral feedback or questionnaires during doctor-patient sessions. However, this can be perceived as intrusive by the patient. Furthermore, the evaluation can only be done in a non-continuous manner, e.g. once a week during therapy sessions. In contrast, using automatic emotion detection, the affect state of a person can be evaluated in a continuous non-intrusive manner, for example to detect early on-sets of depression. An additional benefit of automatic emotion recognition is the objectivity of such an approach, which is not influenced by the perception of the patient and the doctor. To reach the goal of objectivity, it is important, that the source of the emotion is not easily manipulable, e.g. as in the speech modality. To circumvent this caveat, novel approaches in emotion detection research the potential of using physiological measures, such as galvanic skin sensors or pulse meters. In this paper we outline a way of detecting emotion from brain waves, i.e., EEG data. While EEG allows for a continuous, real-time automatic emotion recognition, it furthermore has the charm of measuring the affect close to the point of emergence: the brain. Using EEG data for emotion detection is nevertheless a challenging task: Which features, EEG channel locations and frequency bands are best suited for is an issue of ongoing research. In this paper we evaluate the use of state of the art feature extraction, feature selection and classification algorithms for EEG emotion classification using data from the de facto standard dataset, DEAP. Moreover, we present results that help choose methods to enhance classification performance while simultaneously reducing computational complexity.}, url = {/fileadmin/papers/2016/2016-ackermann-healthcom-emorec.pdf}, web_url2 = {http://ieeehealthcom2016.com/}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)}, event_place = {Munich, Germany}, event_name = {2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)}, event_date = {September 14-17, 2016}, language = {en}, ISBN = {978-1-5090-3370-6}, reviewed = {1}, author = {Ackermann, Pascal and Kohlschein, Christian and Bitsch Link, J{\'o} Agila and Wehrle, Klaus and Jeschke, Sabina} } @Article { 2015-cheng-piap-jmu, title = {Psychologist in a Pocket: Lexicon Development and Content Validation of a Mobile-Based App for Depression Screening}, journal = {JMIR Mhealth Uhealth}, year = {2016}, month = {7}, day = {20}, volume = {4}, number = {3}, pages = {e88}, tags = {piap}, web_url = {http://mhealth.jmir.org/2016/3/e88/}, web_url2 = {http://www.ncbi.nlm.nih.gov/pubmed/27439444}, misc2 = {Online}, language = {en}, ISSN = {2291-5222}, DOI = {10.2196/mhealth.5284}, reviewed = {1}, author = {Cheng, Paula Glenda Ferrer and Ramos, Roann Munoz and Bitsch Link, J{\'o} Agila and Jonas, Stephan Michael and Ix, Tim and See, Portia Lynn Quetulio and Wehrle, Klaus} } @Techreport { 2016-henze-aib-sensorcloud, title = {The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud}, year = {2016}, month = {7}, day = {11}, number = {AIB-2016-06}, number2 = {arXiv:1607.03239 [cs.NI]}, pages = {1--24}, tags = {sensorcloud}, url = {fileadmin/papers/2016/2016-henze-aib-sensorcloud.pdf}, misc2 = {Online}, publisher = {Department of Computer Science, RWTH Aachen University}, address = {Ahornstr. 55, 52074 Aachen, Germany}, institution = {Department of Computer Science, RWTH Aachen University}, type = {Technical Report}, language = {en}, ISSN = {0935-3232}, author = {Henze, Martin and Hummen, Ren{\'e} and Matzutt, Roman and Wehrle, Klaus} } @Inproceedings { 2016-serror-wowmom-arq, title = {Performance Analysis of Cooperative ARQ Systems for Wireless Industrial Networks}, year = {2016}, month = {6}, day = {21}, tags = {koi}, publisher = {IEEE}, howpublished = {online}, booktitle = {17th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2016), Coimbra, Portugal}, event_place = {Coimbra, Portugal}, language = {en}, DOI = {10.1109/WoWMoM.2016.7523534}, reviewed = {1}, author = {Serror, Martin and Hu, Yulin and Dombrowski, Christian and Wehrle, Klaus and Gross, James} } @Inproceedings { 2016-werner-networking-stean, title = {STEAN: A Storage and Transformation Engine for Advanced Networking Context}, year = {2016}, month = {5}, day = {17}, tags = {maki}, publisher = {IEEE}, booktitle = {Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), Vienna, Austira}, event_place = {Vienna, Austria}, event_name = {IFIP Networking 2016}, event_date = {17.-19.5.2016}, ISBN = {978-3-9018-8283-8}, DOI = {10.1109/IFIPNetworking.2016.7497203}, reviewed = {1}, author = {Werner, Marc and Schwandtke, Johannes and Hollick, Matthias and Hohlfeld, Oliver and Zimmermann, Torsten and Wehrle, Klaus} } @Inproceedings { 2016-stoffers-pads-memo, title = {Automated Memoization for Parameter Studies Implemented in Impure Languages}, year = {2016}, month = {5}, day = {15}, pages = {221-232}, note = {Best Paper Award}, keywords = {Automatic Memoization; Accelerating Parameter Studies; Impure Languages}, tags = {memosim,symbiosys}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-stoffers-pads-memoization.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY}, booktitle = {Proceedings of the 4th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’16), Banff, AB, Canada}, event_place = {Banff, AB, Canada}, language = {en}, DOI = {10.1145/2901378.2901386}, reviewed = {1}, author = {Stoffers, Mirko and Schemmel, Daniel and Soria Dustmann, Oscar and Wehrle, Klaus} } @Inproceedings { 2016-zimmermann-remp, title = {ReMP TCP: Low Latency Multipath TCP}, year = {2016}, month = {5}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications (ICC 2016), Kuala Lumpur, Malaysia}, event_place = {Kuala Lumpur, Malaysia}, event_name = {ICC 2016}, event_date = {23.-27.5.2016}, ISBN = {978-1-4799-6664-6}, ISSN = {1938-1883}, DOI = {10.1109/ICC.2016.7510787}, reviewed = {1}, author = {Fr{\"o}mmgen, Alexander and Erbsh{\"a}user, Tobias and Zimmermann, Torsten and Wehrle, Klaus and Buchmann, Alejandro} } @Inproceedings { 2016-henze-claw-dpc, title = {Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds}, year = {2016}, month = {4}, day = {8}, pages = {130-135}, tags = {ssiclops}, url = {/fileadmin/papers/2016/2016-henze-claw-dpc.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the Second International Workshop on Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), co-located with the 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany}, language = {en}, ISBN = {978-1-5090-3684-4}, DOI = {10.1109/IC2EW.2016.24}, reviewed = {1}, author = {Henze, Martin and Hiller, Jens and Hohlfeld, Oliver and Wehrle, Klaus} } @Article { 2016-fgcs-henze-iotprivacy, title = {A Comprehensive Approach to Privacy in the Cloud-based Internet of Things}, journal = {Future Generation Computer Systems}, year = {2016}, month = {3}, volume = {56}, pages = {701-718}, tags = {ipacs}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-fgcs-iotprivacy.pdf}, misc2 = {Online}, publisher = {Elsevier}, language = {en}, ISSN = {0167-739X}, DOI = {10.1016/j.future.2015.09.016}, reviewed = {1}, author = {Henze, Martin and Hermerschmidt, Lars and Kerpen, Daniel and H{\"a}u{\ss}ling, Roger and Rumpe, Bernhard and Wehrle, Klaus} } @Inproceedings { 2016-panchenko-ndss-fingerprinting, title = {Website Fingerprinting at Internet Scale}, year = {2016}, month = {2}, day = {21}, abstract = {The website fingerprinting attack aims to identify the content (i.e., a webpage accessed by a client) of encrypted and anonymized connections by observing patterns of data flows such as packet size and direction. This attack can be performed by a local passive eavesdropper – one of the weakest adversaries in the attacker model of anonymization networks such as Tor. In this paper, we present a novel website fingerprinting attack. Based on a simple and comprehensible idea, our approach outperforms all state-of-the-art methods in terms of classification accuracy while being computationally dramatically more efficient. In order to evaluate the severity of the website fingerprinting attack in reality, we collected the most representative dataset that has ever been built, where we avoid simplified assumptions made in the related work regarding selection and type of webpages and the size of the universe. Using this data, we explore the practical limits of website fingerprinting at Internet scale. Although our novel approach is by orders of magnitude computationally more efficient and superior in terms of detection accuracy, for the first time we show that no existing method – including our own – scales when applied in realistic settings. With our analysis, we explore neglected aspects of the attack and investigate the realistic probability of success for different strategies a real-world adversary may follow.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-panchenko-ndss-fingerprinting.pdf}, web_url = {https://www.informatik.tu-cottbus.de/\verb=~=andriy/zwiebelfreunde/}, publisher = {Internet Society}, booktitle = {Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA}, event_place = {San Diego, CA, USA}, event_date = {February 21-24, 2016}, ISBN = {978-1-891562-41-9}, DOI = {10.14722/ndss.2016.23477}, reviewed = {1}, author = {Panchenko, Andriy and Lanze, Fabian and Zinnen, Andreas and Henze, Martin and Pennekamp, Jan and Wehrle, Klaus and Engel, Thomas} } @Article { 2016-kunz-tomacs-horizon, title = {Parallel Expanded Event Simulation of Tightly Coupled Systems}, journal = {ACM Transactions on Modeling and Computer Simulation (TOMACS)}, year = {2016}, month = {1}, volume = {26}, number = {2}, pages = {12:1--12:26}, abstract = {The technical evolution of wireless communication technology and the need for accurately modeling these increasingly complex systems causes a steady growth in the complexity of simulation models. At the same time, multi-core systems have become the de facto standard hardware platform. Unfortunately, wireless systems pose a particular challenge for parallel execution due to a tight coupling of network entities in space and time. Moreover, model developers are often domain experts with no in-depth understanding of parallel and distributed simulation. In combination, both aspects severely limit the performance and the efficiency of existing parallelization techniques. We address these challenges by presenting parallel expanded event simulation, a novel modeling paradigm that extends discrete events with durations which span a period in simulated time. The resulting expanded events form the basis for a conservative synchronization scheme that considers overlapping expanded events eligible for parallel processing. We furthermore put these concepts into practice by implementing Horizon, a parallel expanded event simulation framework specifically tailored to the characteristics of multi-core systems. Our evaluation shows that Horizon achieves considerable speedups in synthetic as well as real-world simulation models and considerably outperforms the current state-of-the-art in distributed simulation.}, keywords = {Parallel discrete event simulation, Multi-core Systems, Wireless Systems, Simulation Modeling Paradigm, Conservative Synchronization}, tags = {horizon}, publisher = {ACM}, language = {en}, DOI = {10.1145/2832909}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Landsiedel, Olaf and Wehrle, Klaus and Gross, James} } @Inproceedings { 2016-zimmermann-wons-mirco, title = {Maintaining Integrity and Reputation in Content Offloading}, year = {2016}, month = {1}, pages = {25-32}, tags = {maki}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-zimmermann-wons-mirco.pdf}, publisher = {IEEE}, booktitle = {12th International Conference on Wireless On-demand Network Systems and Services (WONS), Cortina d'Ampezzo, Italy}, event_place = {Cortina d'Ampezzo, Italy}, event_name = {12th International Conference on Wireless On-demand Network Systems and Services (WONS)}, event_date = {January 20 - 22 2016}, language = {en}, ISBN = {978-3-901882-80-7}, reviewed = {1}, author = {Zimmermann, Torsten and R{\"u}th, Jan and Wirtz, Hanno and Wehrle, Klaus} }