2021 | |
67. | INFORMATIK 2020, page 857-870.
Publisher: Gesellschaft für Informatik, Bonn
January
2021
DOI: 10.18420/inf2020_76 |
2020 | |
66. |
IEEE Transactions on Cloud Computing,
June
2020
ISSN: 2168-7161 |
65. | Proceedings of the Passive and Active Measurement Conference (PAM '20)
Publisher: Springer,
March
2020
|
2019 | |
64. | IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2561-9 |
63. | Improving Content and Service Distribution beyond Infrastructure Upgrades Ph.D. Thesis
RWTH Aachen University, Shaker Verlag, Düren, Germany
September
2019
ISBN: 978-3-8440-6928-0 |
62. | Technical Report Report Number: arXiv:1904.00671 [cs.NI]
COMSYS, RWTH Aachen University, Ahornstr. 55, 52074 Aachen, Germany
April
2019
|
61. | Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane In Proceedings of the Passive and Active Measurement Conference (PAM '19)
Publisher: Springer,
March
2019
|
2018 | |
60. | Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete
Publisher: ACM,
December
2018
|
59. | Proceedings of the 34rd Annual Computer Security Applications Conference, page 1-15.
Publisher: ACM, New York, NY, USA
December
2018
|
58. | Proceedings of the Internet Measurement Conference (IMC '18)
Publisher: ACM,
October
2018
|
57. | Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA
Publisher: ACM,
October
2018
|
56. | Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria
Publisher: IEEE,
September
2018
|
55. | Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018), page 364-370.
Publisher: IEEE,
April
2018
ISBN: 978-1-5386-5008-0 |
54. | In Proceedings of the Passive and Active Measurement Conference (PAM '18), page 114-128.
Publisher: Springer, Cham,
March
2018
ISBN: 978-3-319-76480-1 |
53. |
Future Generation Computer Systems,
80:448-466
March
2018
ISSN: 0167-739X |
52. | Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao
Publisher: Springer,
February
2018
|
51. | Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain
Publisher: ACM,
February
2018
ISBN: 978-0-9949886-2-1 |
2017 | |
50. | Network Security and Privacy for Cyber-Physical Systems
In Song, Houbing and Fink, Glenn A. and Jeschke, Sabina, editor,
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2,
page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November
2017
ISBN: 978-1-119-22604-8 |
49. | Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Melbourne, VIC, Australia, page 543-544.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7 |
48. | Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia, page 262-271.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7 |
47. | Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering
October
2017
ISBN: 978-1-5386-2684-9/17 |
46. | ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017), Los Angeles, USA
Publisher: ACM,
August
2017
ISBN: 978-1-4503-5056-3 |
45. | Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, NSW, Australia, page 185-192.
Publisher: IEEE,
August
2017
ISBN: 978-1-5090-4905-9 |
44. |
BMC Medical Genomics,
10(Suppl 2):29-42
July
2017
ISSN: 1755-8794 |
43. | Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden
Publisher: IEEE,
June
2017
ISBN: 978-3-901882-94-4 |
42. | Resource and Execution Control for Mobile Offloadee Devices 14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017), San Diego, USA
Publisher: IEEE,
June
2017
ISBN: 978-1-5090-6599-8 |
41. | Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada, page 252-258.
Publisher: IEEE,
April
2017
DOI: 10.1109/IC2E.2017.32 ISBN: 978-1-5090-5817-4 |
40. | Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA, page 83-94.
Publisher: ACM,
March
2017
ISBN: 978-1-4503-4523-1 |
39. | Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, Big Island, HI, USA
Publisher: IEEE,
March
2017
ISBN: 978-1-5090-4328-6 |
38. | Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA, page 17-24.
Publisher: IEEE,
February
2017
ISBN: 978-3-901882-88-3 |
37. | Communication and Networking for the Industrial Internet of Things
In Jeschke, Sabina and Brecher, Christian and Song, Houbing and Rawat, Danda B., editor,
Industrial Internet of Things
page 317-346.
Publisher: Springer,
2017
ISBN: 978-3-319-42558-0 |
36. | In Eibl, Maximilian and Gaedke, Martin, editor,INFORMATIK 2017, page 1073-1084.
Publisher: Gesellschaft für Informatik, Bonn,
2017
DOI: 10.18420/in2017_109 ISBN: 978-3-88579-669-5 |
35. | Designing Digital Services with Cryptographic Guarantees for Data Security and Privacy
RWTH Aachen University,
2017
|
2016 | |
34. | Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 99-110.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4569-9 |
33. | Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 1769-1771.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4139-4 |
32. | STEAN: A Storage and Transformation Engine for Advanced Networking Context Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), Vienna, Austira
Publisher: IEEE,
May
2016
ISBN: 978-3-9018-8283-8 |
31. | ReMP TCP: Low Latency Multipath TCP Proceedings of the IEEE International Conference on Communications (ICC 2016), Kuala Lumpur, Malaysia
Publisher: IEEE,
May
2016
ISBN: 978-1-4799-6664-6 |
30. | Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA
Publisher: Internet Society,
February
2016
ISBN: 1-891562-41-X |
29. | 12th International Conference on Wireless On-demand Network Systems and Services (WONS), Cortina d'Ampezzo, Italy, page 25-32.
Publisher: IEEE,
January
2016
ISBN: 978-3-901882-80-7 |
28. |
Wiley Journal of Network Management,
26(1)
2016
|
27. | ERWIN - Enabling the Reproducible Investigation of Waiting Times for Arbitrary Workflows
IEEE QoMEX
2016
|
2015 | |
26. | 14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco Volume 9476of Lecture Notes in Computer Science, page 197-213.
Publisher: Springer,
December
2015
ISBN: 978-3-319-26822-4 |
25. | Remp TCP: Low latency Multipath TCP Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany
Publisher: ACM,
December
2015
|
24. | 40th IEEE Conference on Local Computer Networks (LCN), Clearwater Beach, USA, page 19-27.
Publisher: IEEE,
October
2015
|
23. | The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September
2015
ISBN: 978-3-319-29882-5 |
22. | The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), Las Vegas, NV, USA Volume 3, page 815--822.
Publisher: Elsevier,
July
2015
|
21. | 12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA, page 256-264.
Publisher: IEEE,
June
2015
|
20. | 2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA, page 198-205.
Publisher: IEEE,
May
2015
DOI: 10.1109/SPW.2015.9 |
19. | Protocol Virtualization through Dynamic Network Stacks SDNFlex Workshop (NetSys 2015)
Cottbus, March 2015, 9-12
Publisher: IEEE,
March
2015
|
18. | The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
Publisher: ACM,
March
2015
ISBN: 978-1-4503-3191-3 |
2014 | |
17. | Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols 1st KuVS Workshop on Anticipatory Networks
Stuttgart, September 29-30, 2014
September
2014
|
16. |
7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)
July
2014
|
15. | 15th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia
Publisher: IEEE,
June
2014
|
14. | Proceedings of the 1st International IEEE Workshop on Architectures and Technologies for Smart Cities (SmartCitiy'14), Dubai, UAE
Publisher: IEEE,
March
2014
|
13. | Proceedings of the 5th ACM Multimedia Systems Conference (MMSys 2014), Special Session on Mobile Multimedia Sensing, Singapore
Publisher: ACM,
March
2014
ISBN: 978-1-4503-2705-3 |
2013 | |
12. | In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany, page 1-10.
Publisher: IEEE,
October
2013
ISBN: 978-1-4799-1270-4 |
11. | Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013), Miami, USA, page 1--8.
Publisher: ACM,
September
2013
ISBN: 978-1-4503-2363-5 |
10. | Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA, page 65--72.
Publisher: ACM,
September
2013
|
9. |
Security and Communication Networks - Special Issue on 'Security in a Completely Interconnected World',
June
2013
DOI: 10.1002/sec.795 |
8. | RFRA: Random Forests Rate Adaptation for Vehicular Networks
Proceedings of the 14th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'13)
Publisher: IEEE,
June
2013
accepted |
7. | Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-2003-0 |
6. | Securing the IP-based Internet of Things with HIP and DTLS Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper), page 119--124.
Publisher: ACM,
April
2013
ISBN: 978-1-4503-1998-0 |
5. | HIP security architecture for the IP-based Internet of Things Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013, page 1331 - 1336.
Publisher: IEEE,
March
2013
|
4. |
In vde-verlag, editor,
Proceedings: European Wireless 2013
, page 8.
Publisher: vde-verlag, http://www.vde-verlag.de/
2013
|
2012 | |
3. | Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), page 525--532.
IEEE
June
2012
ISBN: 978-1-4673-2172-3 |
2011 | |
2. | IP address assignment in wireless mesh networks
Wireless Communications and Mobile Computing,
11(3):321-337
March
2011
DOI: 10.1002/wcm.982 |
2009 | |
1. | Model-driven Support for Source Code Variability in Automotive Software Engineering
Publisher: CEUR,
August
2009
|