This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-07-04
Creation time: 05-24-21
--- Number of references
45
inproceedings
2020-hiller-ccs-crosssigning
The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures
2020
11
11
1289-1306
PKI; X.509; SSL; TLS; cross-signing; cross certification
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-hiller-ccs-cross_signing.pdf
https://github.com/pki-xs-analysis
ACM
New York, NY, USA
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA.
Orlando, FL, USA
November 9-13, 2020
10.1145/3372297.3423345
1
JensHiller
JohannaAmann
OliverHohlfeld
article
2020-holz-ccr-tls13
Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization
ACM SIGCOMM Computer Communications Review (CCR)
2020
7
50
3
3-15
Selected for the 'Best of CCR' session at SIGCOMM 2021.
https://ccronline.sigcomm.org/wp-content/uploads/2020/08/sigcomm-ccr-paper430-with-open-review.pdf
Association for Computing Machinery
New York, NY, USA
10.1145/3411740.3411742
1
RalphHolz
JensHiller
JohannaAmann
AbbasRazaghpanah
ThomasJost
NarseoVallina-Rodriguez
OliverHohlfeld
inproceedings
2020-kosek-tcp-conformance
MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild
2020
3
30
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kosek-tcp-conformance-v2.pdf
https://arxiv.org/abs/2002.05400
Springer
Proceedings of the Passive and Active Measurement Conference (PAM '20)
Eugene, Oregon, USA
Passive and Active Measurement Conference (PAM 2020)
30.03.2020 - 31.03.2020
en
https://doi.org/10.1007/978-3-030-44081-7_8
1
MikeKosek
LeoBlöcher
JanRüth
TorstenZimmermann
OliverHohlfeld
article
2019-kunze-ccwild-tnsm
Congestion Control in the Wild - Investigating Content Provider Fairness
IEEE Transactions on Network and Service Management
2019
12
27
17
2
1224 - 1238
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-kunze-ccwild-tnsm.pdf
1932-4537
10.1109/TNSM.2019.2962607
1
IkeKunze
JanRüth
OliverHohlfeld
inproceedings
2019-rueth-quic-userstudy
Perceiving QUIC: Do Users Notice or Even Care?
2019
12
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-quic-userstudy.pdf
https://arxiv.org/abs/1910.07729
ACM
In Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '19)
Orlando, Florida, USA
International Conference on emerging Networking EXperiments and Technologies
9.12.2019-12.12.2019
10.1145/3359989.3365416
1
JanRüth
KonradWolsing
KlausWehrle
OliverHohlfeld
inproceedings
2019-hiller-lcn-sessionsharing
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads
2019
10
14
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hiller-lcn-case_for_tls_session_sharing.pdf
IEEE
IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany
Osnabrück, Germany
44th IEEE Conference on Local Computer Networks (LCN)
October 14-17, 2019
en
978-1-7281-2561-9
10.1109/LCNSymposium47956.2019.9000667
1
JensHiller
MartinHenze
TorstenZimmermann
OliverHohlfeld
KlausWehrle
inproceedings
2019-sander-depcci
DeePCCI: Deep Learning-based Passive Congestion Control Identification
2019
8
18
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-sander-deepcci.pdf
https://arxiv.org/abs/1907.02323
ACM
In Proceedings of the ACM SIGCOMM Workshop on Network Meets AI & ML (NetAI '19)
Beijing, China
Workshop on Network Meets AI & ML
18.08.2019
10.1145/3341216.3342211
1
ConstantinSander
JanRüth
OliverHohlfeld
KlausWehrle
inproceedings
2019-wolsing-quicperf
A Performance Perspective on Web Optimized Protocol Stacks: TCP+TLS+HTTP/2 vs. QUIC
2019
7
22
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-wolsing-quicperf.pdf
https://arxiv.org/abs/1906.07415
ACM
In Proceedings of the Applied Networking Research Workshop (ANRW '19)
Montreal, Quebec, Canada
Applied Networking Research Workshop at IETF-105
2019-07-22
10.1145/3340301.3341123
1
KonradWolsing
JanRüth
KlausWehrle
OliverHohlfeld
inproceedings
2019-hohlfeld-bpfperf
Demystifying the Performance of XDP BPF
2019
6
25
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-bpfperf.pdf
IEEE
IEEE International Conference on Network Softwarization (NetSoft)
IEEE International Conference on Network Softwarization
10.1109/NETSOFT.2019.8806651
1
OliverHohlfeld
JohannesKrude
Jens HelgeReelfs
JanRüth
KlausWehrle
inproceedings
2019-rueth-ccfness
An Empirical View on Content Provider Fairness
2019
6
19
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-ccfness.pdf
https://arxiv.org/abs/1905.07152
IFIP/IEEE
In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '19)
Paris, France
Network Traffic Measurement and Analysis Conference
19.06.2019 - 21.06.2019
10.23919/TMA.2019.8784684
1
JanRüth
IkeKunze
OliverHohlfeld
inproceedings
2019_pennekamp_doppelganger
Hi Doppelgänger: Towards Detecting Manipulation in News Comments
2019
5
13
197-205
Public opinion manipulation is a serious threat to society, potentially influencing elections and the political situation even in established democracies. The prevalence of online media and the opportunity for users to express opinions in comments magnifies the problem. Governments, organizations, and companies can exploit this situation for biasing opinions. Typically, they deploy a large number of pseudonyms to create an impression of a crowd that supports specific opinions. Side channel information (such as IP addresses or identities of browsers) often allows a reliable detection of pseudonyms managed by a single person. However, while spoofing and anonymizing data that links these accounts is simple, a linking without is very challenging. In this paper, we evaluate whether stylometric features allow a detection of such doppelgängers within comment sections on news articles. To this end, we adapt a state-of-the-art doppelgängers detector to work on small texts (such as comments) and apply it on three popular news sites in two languages. Our results reveal that detecting potential doppelgängers based on linguistics is a promising approach even when no reliable side channel information is available. Preliminary results following an application in the wild shows indications for doppelgängers in real world data sets.
online manipulation; doppelgänger detection; stylometry
comtex
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-doppelganger.pdf
ACM
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 4th Workshop on Computational Methods in Online Misbehavior (CyberSafety '19), May 13–17, 2019, San Francisco, CA, USA
San Francisco, California, USA
May 13-17, 2019
978-1-4503-6675-5/19/05
10.1145/3308560.3316496
1
JanPennekamp
MartinHenze
OliverHohlfeld
AndriyPanchenko
inproceedings
ReelfsMHH2019
Hashtag Usage in a Geographically-Local Microblogging App
2019
5
13
919-927
Anonymous Messaging; Location Based Messaging; User Behavior and Engagement; Information Diffusion; Hashtag
comtex
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-reelfs-jodel-hashtags.pdf
ACM
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 9th International Workshop on Location and the Web (LocWeb '19), May 13–17, 2019, San Francisco, CA, USA
San Francisco, California, USA
International Workshop on Location and the Web
May 13–17, 2019
978-1-4503-6675-5/19/05
10.1145/3308560.3316537
1
HelgeReelfs
TimonMohaupt
OliverHohlfeld
NiklasHenckell
techreport
2019-rueth-blitzstart
Blitz-starting QUIC Connections
2019
5
8
arXiv:1905.03144 [cs.NI]
1--8
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-blitzstart.pdf
https://arxiv.org/abs/1905.03144
Online
COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University
Technical Report
en
JanRüth
KonradWolsing
MartinSerror
KlausWehrle
OliverHohlfeld
techreport
2019-hohlfeld-santa-tr
Application-Agnostic Offloading of Packet Processing
2019
4
1
arXiv:1904.00671 [cs.NI]
1--14
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf
https://arxiv.org/abs/1904.00671
Online
COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University
Technical Report
en
OliverHohlfeld
HelgeReelfs
JanRüth
FlorianSchmidt
TorstenZimmermann
JensHiller
KlausWehrle
inproceedings
2019-rueth-icmp
Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane
2019
3
27
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-icmp.pdf
https://arxiv.org/abs/1901.07265
Springer
In Proceedings of the Passive and Active Measurement Conference (PAM '19)
Puerto Varas, Chile
Passive and Active Measurement Conference (PAM 2019)
27.3.2018 - 29.3.2018
en
10.1007/978-3-030-15986-3_4
1
JanRüth
TorstenZimmermann
OliverHohlfeld
article
rueth:iw:TNSM19
TCP’s Initial Window – Deployment in the Wild and its Impact on Performance
IEEE Transactions on Network and Service Management
2019
1
30
16
2
389--402
maki
http://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-iwtnsm.pdf
1932-4537
10.1109/TNSM.2019.2896335
1
JanRüth
IkeKunze
OliverHohlfeld
inproceedings
2018-zimmermann-webready
Is the Web ready for HTTP/2 Server Push?
2018
12
4
maki
https://dl.acm.org/citation.cfm?id=3281434
https://arxiv.org/abs/1810.05554
https://http2.netray.io/interleaving.html
ACM
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete
Crete, Greece
CoNEXT 2018
4.12.18 - 7.12.18
en
10.1145/3281411.3281434
1
TorstenZimmermann
BenediktWolters
OliverHohlfeld
KlausWehrle
inproceedings
2018-rueth-mining
Digging into Browser-based Crypto Mining
2018
10
31
maki,internet-measurements
http://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-mining.pdf
https://arxiv.org/abs/1808.00811
ACM
Proceedings of the Internet Measurement Conference (IMC '18)
Boston, US
Internet Measurement Conference 2018
31.10.18 - 2.11.18
en
10.1145/3278532.3278539
1
JanRüth
TorstenZimmermann
KonradWolsing
OliverHohlfeld
inproceedings
2018-tzimmermann-toplists
A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists
2018
10
31
maki
https://dl.acm.org/citation.cfm?id=3278574
https://arxiv.org/abs/1805.11506
ACM
Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA
Boston, US
Internet Measurement Conference 2018
31.10.18 - 2.11.18
en
10.1145/3278532.3278574
1
QuirinScheitle
OliverHohlfeld
JulienGamba
JonasJelten
TorstenZimmermann
Stephen D.Strowes
NarseoVallina-Rodriguez
inproceedings
2018-hohlfeld-santa
Application-Agnostic Offloading of Datagram Processing
2018
9
3
maki,ssiclops,reflexes
https://ieeexplore.ieee.org/document/8493053
IEEE
Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria
Vienna, Austria
International Teletraffic Congress ITC 30
03.09.2018 - 07-09.2018
en
10.1109/ITC30.2018.00015
1
OliverHohlfeld
Jens HelgeReelfs
JanRüth
FlorianSchmidt
TorstenZimmermann
JensHiller
KlausWehrle
inproceedings
2018-rueth-iwcdns
Demystifying TCP Initial Window Configurations of Content Distribution Networks
2018
6
26
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-iwcdns.pdf
https://arxiv.org/abs/1902.08937
http://tma.ifip.org/2018/wp-content/uploads/sites/3/2018/06/tma2018_paper13.pdf
In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '18)
Vienna, Austria
Network Traffic Measurement and Analysis Conference (TMA'18)
26.06.2018 - 29.06.2018
10.23919/TMA.2018.8506549
1
JanRüth
OliverHohlfeld
inproceedings
2018-hiller-ic2e-cpplintegration
Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud
2018
4
19
241-249
ssiclops,iop
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-ic2e-policy-aware-cloud.pdf
https://ieeexplore.ieee.org/document/8360335
IEEE
Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA
Orlando, Florida, USA
2018 IEEE International Conference on Cloud Engineering (IC2E 2018)
2018-04-19
978-1-5386-5008-0
10.1109/IC2E.2018.00050
1
JensHiller
MaelKimmerlin
MaxPlauth
SeppoHeikkila
StefanKlauck
VilleLindfors
FelixEberhardt
DariuszBursztynowski
Jesus LlorenteSantos
OliverHohlfeld
KlausWehrle
article
2018-scheitle-ccr-caa
A First Look at Certification Authority Authorization (CAA)
ACM SIGCOMM Computer Communications Review (CCR)
2018
4
48
10-23
https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/caa17.pdf
internet-measurements
https://ccronline.sigcomm.org/wp-content/uploads/2018/05/sigcomm-ccr-final163.pdf
https://ccronline.sigcomm.org/2018/a-first-look-at-certification-authority-authorization-caa/
2018-06-05
10.1145/3213232.3213235
1
QuirinScheitle
TaejoongChung
JensHiller
OliverGasser
JohannesNaab
Rolandvan Rijswijk-Deij
OliverHohlfeld
RalphHolz
DaveChoffnes
AlanMislove
GeorgCarle
inproceedings
2018-rueth-quicadoptionstudy
A First Look at QUIC in the Wild
2018
3
26
255-268
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-quicadoptionstudy.pdf
https://arxiv.org/abs/1801.05168
Springer, Cham
In Proceedings of the Passive and Active Measurement Conference (PAM '18)
Berlin, Germany
Passive and Active Measurement Conference (PAM 2018)
26.3.2018 - 27.3.2018
en
978-3-319-76481-8
10.1007/978-3-319-76481-8_19
1
JanRüth
IngmarPoese
ChristophDietzel
OliverHohlfeld
inproceedings
2018-tzimmermann-metacdn
Characterizing a Meta-CDN
2018
3
26
114-128
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hohlfeld-metacdn.pdf
https://arxiv.org/abs/1803.09990
Springer, Cham
In Proceedings of the Passive and Active Measurement Conference (PAM '18)
Berlin, Germany
Passive and Active Measurement Conference (PAM 2018)
26.3.2018 - 27.3.2018
en
978-3-319-76480-1
10.1007/978-3-319-76481-8_9
1
OliverHohlfeld
JanRüth
KonradWolsing
TorstenZimmermann
inproceedings
2018-matzutt-bitcoin-content
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
2018
2
26
Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin's blockchain. Although most data originates from benign extensions to Bitcoin's protocol, our analysis reveals more than 1600 files on the blockchain, over 99% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly.
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018_matzutt_bitcoin-contents_preproceedings-version.pdf
2018-01-07
Online
Springer
Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao
Nieuwpoort, Curaçao
Financial Cryptography and Data Security 2018
en
10.1007/978-3-662-58387-6_23
1
RomanMatzutt
JensHiller
MartinHenze
Jan HenrikZiegeldorf
DirkMüllmann
OliverHohlfeld
KlausWehrle
inproceedings
2017-rueth-iwmeasure
Large-Scale Scanning of TCP’s Initial Window
2017
11
1
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rueth-iwmeasure.pdf
ACM
In Proceedings of the Internet Measurement Conference (IMC '17)
London, UK
Proceedings of the 2017 Internet Measurement Conference
01.11.2017 - 03.11.2017
en
10.1145/3131365.3131370
1
JanRüth
ChristianBormann
OliverHohlfeld
proceedings
2017-SymPerfPoster
SymPerf: Predicting Network Function Performance
2017
8
21
spp,erc,symbiosys,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rath-sym-perf-poster.pdf
ACM
Los Angeles, USA
ACM SIGCOMM 2017 Poster
21.8.2017 - 25.8.2017
en
978-1-4503-5057-0/17/08
10.1145/3123878.3131977
1
FelixRath
JohannesKrude
JanRüth
DanielSchemmel
OliverHohlfeld
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2017-zimmermann-qoe
A QoE Perspective on HTTP/2 Server Push
2017
8
21
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-internetqoe-push.pdf
ACM
ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017), Los Angeles, USA
Los Angeles, USA
ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017)
21.8.2017 - 25.8.2017
en
978-1-4503-5056-3
10.1145/3098603.3098604
1
TorstenZimmermann
BenediktWolters
OliverHohlfeld
inproceedings
2017-henze-tma-cloudemail
Veiled in Clouds? Assessing the Prevalence of Cloud Computing in the Email Landscape
2017
6
21
trinics, ssiclops
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-tma-cloudemail.pdf
Online
IEEE / IFIP
Proceedings of the 2017 Network Traffic Measurement and Analysis Conference (TMA 2017), Dublin, Ireland
en
978-3-901882-95-1
10.23919/TMA.2017.8002910
1
MartinHenze
Mary PeytonSanford
OliverHohlfeld
inproceedings
2017-zimmermann-networking-http2
How HTTP/2 Pushes the Web: An Empirical Study of HTTP/2 Server Push
2017
6
12
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-networking-push.pdf
IEEE
Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden
Stockholm, Sweden
IFIP Networking 2017
12.-16.6.2017
978-3-901882-94-4
10.23919/IFIPNetworking.2017.8264830
1
TorstenZimmermann
JanRüth
BenediktWolters
OliverHohlfeld
article
2017-comnet-lru
Performance Evaluation for New Web Caching Strategies Combining LRU with Score Based Object Selection
Elsevier Computer Networks
2017
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/COMNET-D-16-957R1-Updated-Submit.pdf
accepted
GerhardHasslinger
KonstantinosNtougias
FrankHasslinger
OliverHohlfeld
inproceedings
2016-matzutt-ccs-bitcoin
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
2016
10
24
1769-1771
mynedata
/fileadmin/papers/2016/2016-matzutt-ccs-blockchaincontent.pdf
Online
ACM
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria
en
978-1-4503-4139-4
10.1145/2976749.2989059
1
RomanMatzutt
OliverHohlfeld
MartinHenze
RobinRawiel
Jan HenrikZiegeldorf
KlausWehrle
conference
2016-itc-caching
Performance Evaluation for New Web Caching Strategies Combining RU with Score Based Object Selection
2016
9
ITC 28
ITC 28
GerhardHasslinger
KostasNtougias
FrankHasslinger
OliverHohlfeld
conference
2016-hohlfeld-qcman
Insensitivity to Network Delay: Minecraft Gaming Experience of Casual Gamers
2016
9
Assessing the impact of network delay on perceived quality of gaming has been subject to many studies involving different genres ranging from fast-paced first-person shooters to strategy games. This paper assesses the impact of network latency on the Quality of Experience (QoE) of casual gamers playing Minecraft. It is based on a user study involving 12 casual gamers with no prior experience with Minecraft. QoE is assessed using the Game Experience Questionnaire (GEQ) and dedicated questions for the overall perceived quality and experienced gameplay interruptions. The main finding is that casual Minecraft players are rather insensitive to network delay of up to 1 sec.
https://i-teletraffic.org/_Resources/Persistent/bc99ba4324ebc7cf1369f09a6caa334c0203943f/Hohlfeld2016.pdf
http://ieeexplore.ieee.org/abstract/document/7810715/?reload=true
IEEE QCMan
IEEE QCMan
10.1109/ITC-28.2016.313
OliverHohlfeld
HannesFiedler
EnricPujol
DennisGuse
article
2016-hohlfeld-nfv_ccr
New Kid on the Block: Network Functions Virtualization: From Big Boxes to Carrier Clouds
ACM SIGCOMM CCR
2016
7
http://ccracmsigcomm.info.ucl.ac.be/wp-content/uploads/2016/07/sigcomm-ccr-paper29.pdf
LeonhardNobach
OliverHohlfeld
DavidHausheer
inproceedings
2016-werner-networking-stean
STEAN: A Storage and Transformation Engine for Advanced Networking Context
2016
5
17
maki
IEEE
Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), Vienna, Austira
Vienna, Austria
IFIP Networking 2016
17.-19.5.2016
978-3-9018-8283-8
10.1109/IFIPNetworking.2016.7497203
1
MarcWerner
JohannesSchwandtke
MatthiasHollick
OliverHohlfeld
TorstenZimmermann
KlausWehrle
inproceedings
2016-henze-claw-dpc
Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds
2016
4
8
130-135
ssiclops
/fileadmin/papers/2016/2016-henze-claw-dpc.pdf
Online
IEEE
Proceedings of the Second International Workshop on
Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), co-located with the 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany
en
978-1-5090-3684-4
10.1109/IC2EW.2016.24
1
MartinHenze
JensHiller
OliverHohlfeld
KlausWehrle
article
2016-sdnflex_si
Editorial: Special issue on Software-Defined Networking and Network Functions Virtualization for flexible network management
Wiley Journal of Network Management
2016
26
1
http://onlinelibrary.wiley.com/doi/10.1002/nem.1915/pdf
OliverHohlfeld
ThomasZinner
TheophilusBenson
DavidHausheer
conference
2016-erwin
ERWIN - Enabling the Reproducible Investigation of Waiting Times for Arbitrary Workflows
2016
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7498938&tag=1
IEEE QoMEX
IEEE QoMEX
10.1109/QoMEX.2016.7498938
ThomasZinner
MatthiasHirth
ValentinFischer
OliverHohlfeld
inproceedings
2015-schmidt-santa
Santa: Faster Packet Delivery for Commonly Wished Replies [Poster Abstract]
2015
8
19
ssiclops
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-sigcomm-santa.pdf
Online
ACM
Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM '15), London, United Kingdom
London, United Kingdom
43rd ACM SIGCOMM Conference (SIGCOMM '15)
17–21 August, 2015
en
10.1145/2785956.2790014
1
FlorianSchmidt
OliverHohlfeld
RenéGlebke
KlausWehrle
conference
HohlfeldIMC
A QoE Perspective on Sizing Network Buffers
2014
11
ACM Internet Measurement Conference
accepted
OliverHohlfeld
EnricPujol
FlorinCiucu
AnjaFeldmann
PaulBarford
conference
2014-hohlfeld-harvester
The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape
2014
6
http://downloads.ohohlfeld.com/paper/harvesters-asiaccs2014.pdf
http://asiaccs2014.nict.go.jp/
ACM
9th ACM Symposium on Information, Computer and Communications Security
10.1145/2590296.2590302
1
GianlucaStringhini
OliverHohlfeld
ChristopherKruegel
GiovanniVigna
conference
CiucuPH2014
On Capacity Dimensioning in Dynamic Scenarios: The Key Role of Peak Values
2014
5
http://www.ieee-lanman.org/
IEEE
IEEE LANMAN
Reno, NV, USA
1
FlorinCiucu
FelixPoloczek
OliverHohlfeld
article
HohlfeldCCR14
An Internet census taken by an illegal botnet - A qualitative assessment of published measurements
ACM SIGCOMM Computer Communication Review
2014
44
3
http://www.sigcomm.org/sites/default/files/ccr/papers/2014/July/0000000-0000013.pdf
http://www.sigcomm.org/ccr/papers/2014/July
ThomasKrenc
OliverHohlfeld
AnjaFeldmann