2023 | |
75. |
Internet of Production: Fundamentals, Applications and Proceedings
of Interdisciplinary Excellence Accelerator Series
page 35-60.
Publisher: Springer,
February
2023
ISBN: 978-3-031-44496-8
|
2022 | |
74. |
Cybersecurity Artifacts Competition and Impact Award at 38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA
Publisher: ACSA,
December
2022
|
73. |
IEEE Transactions on Cloud Computing,
10(3):1661-1674
September
2022
ISSN: 2168-7161
|
72. |
Cyber Security Experimentation and Test Workshop (CSET 2022)
Virtual, August 8, 2022
Publisher: ACM, New York, NY, USA
August
2022
ISBN: 978-1-4503-9684-4/22/08
|
71. |
ACM Transactions on Internet of Things,
3(2)
May
2022
ISSN: 2691-1914
DOI: 10.1145/3502265
|
2021 | |
70. |
Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea, page 2411-2413.
Publisher: ACM,
November
2021
ISBN: 978-1-4503-8454-4/21/11
|
69. |
Insights on Data Sensitivity from the Technical, Legal and the Users' Perspectives
Computer Law Review International,
22(1):8-15
February
2021
ISSN: 1610-7608
|
68. |
INFORMATIK 2020, page 857-870.
Publisher: Gesellschaft für Informatik, Bonn
January
2021
DOI: 10.18420/inf2020_76
|
67. |
A Novel Receiver Design for Energy Packet‐Based Dispatching
Energy Technology,
9(2)
2021
|
2020 | |
66. |
Proceedings of the Passive and Active Measurement Conference (PAM '20)
Publisher: Springer,
March
2020
|
65. |
Mit "Digitalen Schatten" Daten verdichten und darstellen : Der Exzellenzcluster "Internet der Produktion" forscht über die Produktionstechnik hinaus
Der Profilbereich "Information & Communication Technology",
2020
ISSN: 0179-079X
|
2019 | |
64. |
IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2561-9
|
63. |
Improving Content and Service Distribution beyond Infrastructure Upgrades
Ph.D. Thesis
RWTH Aachen University, Shaker Verlag, Düren, Germany
September
2019
ISBN: 978-3-8440-6928-0
|
62. |
Technical Report
Report Number: arXiv:1904.00671 [cs.NI]
COMSYS, RWTH Aachen University, Ahornstr. 55, 52074 Aachen, Germany
April
2019
|
61. |
Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane
In Proceedings of the Passive and Active Measurement Conference (PAM '19)
Publisher: Springer,
March
2019
|
2018 | |
60. |
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete
Publisher: ACM,
December
2018
|
59. |
Proceedings of the 34rd Annual Computer Security Applications Conference, page 1-15.
Publisher: ACM, New York, NY, USA
December
2018
|
58. |
Proceedings of the Internet Measurement Conference (IMC '18)
Publisher: ACM,
October
2018
|
57. |
Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA
Publisher: ACM,
October
2018
|
56. |
Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria
Publisher: IEEE,
September
2018
|
55. |
Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018), page 364-370.
Publisher: IEEE,
April
2018
ISBN: 978-1-5386-5008-0
|
54. |
In Proceedings of the Passive and Active Measurement Conference (PAM '18), page 114-128.
Publisher: Springer, Cham,
March
2018
ISBN: 978-3-319-76480-1
|
53. |
Future Generation Computer Systems,
80:448-466
March
2018
ISSN: 0167-739X
|
52. |
Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao
Publisher: Springer,
February
2018
|
51. |
Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain
Publisher: ACM,
February
2018
ISBN: 978-0-9949886-2-1
|
2017 | |
50. |
Network Security and Privacy for Cyber-Physical Systems
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2,
page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November
2017
ISBN: 978-1-119-22604-8
|
49. |
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Melbourne, VIC, Australia, page 543-544.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
48. |
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia, page 262-271.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
47. |
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering
October
2017
ISBN: 978-1-5386-2684-9/17
|
46. |
ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017), Los Angeles, USA
Publisher: ACM,
August
2017
ISBN: 978-1-4503-5056-3
|
45. |
Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, NSW, Australia, page 185-192.
Publisher: IEEE,
August
2017
ISBN: 978-1-5090-4905-9
|
44. |
BMC Medical Genomics,
10(Suppl 2):29-42
July
2017
ISSN: 1755-8794
|
43. |
Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden
Publisher: IEEE,
June
2017
ISBN: 978-3-901882-94-4
|
42. |
Resource and Execution Control for Mobile Offloadee Devices
14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017), San Diego, USA
Publisher: IEEE,
June
2017
ISBN: 978-1-5090-6599-8
|
41. |
Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada, page 252-258.
Publisher: IEEE,
April
2017
DOI: 10.1109/IC2E.2017.32
ISBN: 978-1-5090-5817-4
|
40. |
Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA, page 83-94.
Publisher: ACM,
March
2017
ISBN: 978-1-4503-4523-1
|
39. |
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, Big Island, HI, USA
Publisher: IEEE,
March
2017
ISBN: 978-1-5090-4328-6
|
38. |
Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA, page 17-24.
Publisher: IEEE,
February
2017
ISBN: 978-3-901882-88-3
|
37. |
Communication and Networking for the Industrial Internet of Things
Industrial Internet of Things
page 317-346.
Publisher: Springer,
2017
ISBN: 978-3-319-42558-0
|
36. |
INFORMATIK 2017, page 1073-1084.
Publisher: Gesellschaft für Informatik, Bonn,
2017
DOI: 10.18420/in2017_109
ISBN: 978-3-88579-669-5
|
35. |
Designing Digital Services with Cryptographic Guarantees for Data Security and Privacy
RWTH Aachen University,
2017
|
2016 | |
34. |
Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 99-110.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4569-9
|
33. |
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 1769-1771.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4139-4
|
32. |
STEAN: A Storage and Transformation Engine for Advanced Networking Context
Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), Vienna, Austira
Publisher: IEEE,
May
2016
ISBN: 978-3-9018-8283-8
|
31. |
ReMP TCP: Low Latency Multipath TCP
Proceedings of the IEEE International Conference on Communications (ICC 2016), Kuala Lumpur, Malaysia
Publisher: IEEE,
May
2016
ISBN: 978-1-4799-6664-6
|
30. |
Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA
Publisher: Internet Society,
February
2016
ISBN: 978-1-891562-41-9
|
29. |
12th International Conference on Wireless On-demand Network Systems and Services (WONS), Cortina d'Ampezzo, Italy, page 25-32.
Publisher: IEEE,
January
2016
ISBN: 978-3-901882-80-7
|
28. |
Wiley Journal of Network Management,
26(1)
2016
|
27. |
ERWIN - Enabling the Reproducible Investigation of Waiting Times for Arbitrary Workflows
IEEE QoMEX
2016
|
2015 | |
26. |
14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco Volume 9476of Lecture Notes in Computer Science, page 197-213.
Publisher: Springer,
December
2015
ISBN: 978-3-319-26822-4
|
25. |
Remp TCP: Low latency Multipath TCP
Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany
Publisher: ACM,
December
2015
|
24. |
40th IEEE Conference on Local Computer Networks (LCN), Clearwater Beach, USA, page 19-27.
Publisher: IEEE,
October
2015
|
23. |
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September
2015
ISBN: 978-3-319-29882-5
|
22. |
Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany
The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), Las Vegas, NV, USA Volume 3, page 815--822.
Publisher: Elsevier,
July
2015
|
21. |
12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA, page 256-264.
Publisher: IEEE,
June
2015
|
20. |
2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA, page 198-205.
Publisher: IEEE,
May
2015
DOI: 10.1109/SPW.2015.9
|
19. |
Protocol Virtualization through Dynamic Network Stacks
SDNFlex Workshop (NetSys 2015)
Cottbus, March 2015, 9-12
Publisher: IEEE,
March
2015
|
18. |
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
Publisher: ACM,
March
2015
ISBN: 978-1-4503-3191-3
|
2014 | |
17. |
Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols
1st KuVS Workshop on Anticipatory Networks
Stuttgart, September 29-30, 2014
September
2014
|
16. |
7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)
July
2014
|
15. |
15th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia
Publisher: IEEE,
June
2014
|
14. |
Proceedings of the 1st International IEEE Workshop on Architectures and Technologies for Smart Cities (SmartCitiy'14), Dubai, UAE
Publisher: IEEE,
March
2014
|
13. |
Proceedings of the 5th ACM Multimedia Systems Conference (MMSys 2014), Special Session on Mobile Multimedia Sensing, Singapore
Publisher: ACM,
March
2014
ISBN: 978-1-4503-2705-3
|
2013 | |
12. |
In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany, page 1-10.
Publisher: IEEE,
October
2013
ISBN: 978-1-4799-1270-4
|
11. |
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013), Miami, USA, page 1--8.
Publisher: ACM,
September
2013
ISBN: 978-1-4503-2363-5
|
10. |
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA, page 65--72.
Publisher: ACM,
September
2013
|
9. |
Security and Communication Networks - Special Issue on 'Security in a Completely Interconnected World',
June
2013
DOI: 10.1002/sec.795
|
8. |
RFRA: Random Forests Rate Adaptation for Vehicular Networks
Proceedings of the 14th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'13)
Publisher: IEEE,
June
2013
Accepted
|
7. |
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-2003-0
|
6. |
Securing the IP-based Internet of Things with HIP and DTLS
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper), page 119--124.
Publisher: ACM,
April
2013
ISBN: 978-1-4503-1998-0
|
5. |
HIP security architecture for the IP-based Internet of Things
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013, page 1331 - 1336.
Publisher: IEEE,
March
2013
|
4. |
Proceedings: European Wireless 2013
, page 8.
Publisher: vde-verlag, http://www.vde-verlag.de/
2013
|
2012 | |
3. |
Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), page 525--532.
IEEE
June
2012
ISBN: 978-1-4673-2172-3
|
2011 | |
2. |
IP address assignment in wireless mesh networks
Wireless Communications and Mobile Computing,
11(3):321-337
March
2011
DOI: 10.1002/wcm.982
|
2009 | |
1. |
Model-driven Support for Source Code Variability in Automotive Software Engineering
Publisher: CEUR,
August
2009
|