This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-07-04 Creation time: 05-24-21 --- Number of references 45 inproceedings 2020-hiller-ccs-crosssigning The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures 2020 11 11 1289-1306 PKI; X.509; SSL; TLS; cross-signing; cross certification https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-hiller-ccs-cross_signing.pdf https://github.com/pki-xs-analysis ACM
New York, NY, USA
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA. Orlando, FL, USA November 9-13, 2020 10.1145/3372297.3423345 1 JensHiller JohannaAmann OliverHohlfeld
article 2020-holz-ccr-tls13 Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization ACM SIGCOMM Computer Communications Review (CCR) 2020 7 50 3 3-15 Selected for the 'Best of CCR' session at SIGCOMM 2021. https://ccronline.sigcomm.org/wp-content/uploads/2020/08/sigcomm-ccr-paper430-with-open-review.pdf Association for Computing Machinery
New York, NY, USA
10.1145/3411740.3411742 1 RalphHolz JensHiller JohannaAmann AbbasRazaghpanah ThomasJost NarseoVallina-Rodriguez OliverHohlfeld
inproceedings 2020-kosek-tcp-conformance MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild 2020 3 30 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kosek-tcp-conformance-v2.pdf https://arxiv.org/abs/2002.05400 Springer Proceedings of the Passive and Active Measurement Conference (PAM '20) Eugene, Oregon, USA Passive and Active Measurement Conference (PAM 2020) 30.03.2020 - 31.03.2020 en https://doi.org/10.1007/978-3-030-44081-7_8 1 MikeKosek LeoBlöcher JanRüth TorstenZimmermann OliverHohlfeld article 2019-kunze-ccwild-tnsm Congestion Control in the Wild - Investigating Content Provider Fairness IEEE Transactions on Network and Service Management 2019 12 27 17 2 1224 - 1238 https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-kunze-ccwild-tnsm.pdf 1932-4537 10.1109/TNSM.2019.2962607 1 IkeKunze JanRüth OliverHohlfeld inproceedings 2019-rueth-quic-userstudy Perceiving QUIC: Do Users Notice or Even Care? 2019 12 maki,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-quic-userstudy.pdf https://arxiv.org/abs/1910.07729 ACM In Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '19) Orlando, Florida, USA International Conference on emerging Networking EXperiments and Technologies 9.12.2019-12.12.2019 10.1145/3359989.3365416 1 JanRüth KonradWolsing KlausWehrle OliverHohlfeld inproceedings 2019-hiller-lcn-sessionsharing The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads 2019 10 14 internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hiller-lcn-case_for_tls_session_sharing.pdf IEEE IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany Osnabrück, Germany 44th IEEE Conference on Local Computer Networks (LCN) October 14-17, 2019 en 978-1-7281-2561-9 10.1109/LCNSymposium47956.2019.9000667 1 JensHiller MartinHenze TorstenZimmermann OliverHohlfeld KlausWehrle inproceedings 2019-sander-depcci DeePCCI: Deep Learning-based Passive Congestion Control Identification 2019 8 18 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-sander-deepcci.pdf https://arxiv.org/abs/1907.02323 ACM In Proceedings of the ACM SIGCOMM Workshop on Network Meets AI & ML (NetAI '19) Beijing, China Workshop on Network Meets AI & ML 18.08.2019 10.1145/3341216.3342211 1 ConstantinSander JanRüth OliverHohlfeld KlausWehrle inproceedings 2019-wolsing-quicperf A Performance Perspective on Web Optimized Protocol Stacks: TCP+TLS+HTTP/2 vs. QUIC 2019 7 22 maki,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-wolsing-quicperf.pdf https://arxiv.org/abs/1906.07415 ACM In Proceedings of the Applied Networking Research Workshop (ANRW '19) Montreal, Quebec, Canada Applied Networking Research Workshop at IETF-105 2019-07-22 10.1145/3340301.3341123 1 KonradWolsing JanRüth KlausWehrle OliverHohlfeld inproceedings 2019-hohlfeld-bpfperf Demystifying the Performance of XDP BPF 2019 6 25 maki,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-bpfperf.pdf IEEE IEEE International Conference on Network Softwarization (NetSoft) IEEE International Conference on Network Softwarization 10.1109/NETSOFT.2019.8806651 1 OliverHohlfeld JohannesKrude Jens HelgeReelfs JanRüth KlausWehrle inproceedings 2019-rueth-ccfness An Empirical View on Content Provider Fairness 2019 6 19 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-ccfness.pdf https://arxiv.org/abs/1905.07152 IFIP/IEEE In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '19) Paris, France Network Traffic Measurement and Analysis Conference 19.06.2019 - 21.06.2019 10.23919/TMA.2019.8784684 1 JanRüth IkeKunze OliverHohlfeld inproceedings 2019_pennekamp_doppelganger Hi Doppelgänger: Towards Detecting Manipulation in News Comments 2019 5 13 197-205 Public opinion manipulation is a serious threat to society, potentially influencing elections and the political situation even in established democracies. The prevalence of online media and the opportunity for users to express opinions in comments magnifies the problem. Governments, organizations, and companies can exploit this situation for biasing opinions. Typically, they deploy a large number of pseudonyms to create an impression of a crowd that supports specific opinions. Side channel information (such as IP addresses or identities of browsers) often allows a reliable detection of pseudonyms managed by a single person. However, while spoofing and anonymizing data that links these accounts is simple, a linking without is very challenging. In this paper, we evaluate whether stylometric features allow a detection of such doppelgängers within comment sections on news articles. To this end, we adapt a state-of-the-art doppelgängers detector to work on small texts (such as comments) and apply it on three popular news sites in two languages. Our results reveal that detecting potential doppelgängers based on linguistics is a promising approach even when no reliable side channel information is available. Preliminary results following an application in the wild shows indications for doppelgängers in real world data sets. online manipulation; doppelgänger detection; stylometry comtex https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-doppelganger.pdf ACM Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 4th Workshop on Computational Methods in Online Misbehavior (CyberSafety '19), May 13–17, 2019, San Francisco, CA, USA San Francisco, California, USA May 13-17, 2019 978-1-4503-6675-5/19/05 10.1145/3308560.3316496 1 JanPennekamp MartinHenze OliverHohlfeld AndriyPanchenko inproceedings ReelfsMHH2019 Hashtag Usage in a Geographically-Local Microblogging App 2019 5 13 919-927 Anonymous Messaging; Location Based Messaging; User Behavior and Engagement; Information Diffusion; Hashtag comtex https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-reelfs-jodel-hashtags.pdf ACM Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 9th International Workshop on Location and the Web (LocWeb '19), May 13–17, 2019, San Francisco, CA, USA San Francisco, California, USA International Workshop on Location and the Web May 13–17, 2019 978-1-4503-6675-5/19/05 10.1145/3308560.3316537 1 HelgeReelfs TimonMohaupt OliverHohlfeld NiklasHenckell techreport 2019-rueth-blitzstart Blitz-starting QUIC Connections 2019 5 8 arXiv:1905.03144 [cs.NI] 1--8 https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-blitzstart.pdf https://arxiv.org/abs/1905.03144 Online COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University Technical Report en JanRüth KonradWolsing MartinSerror KlausWehrle OliverHohlfeld
techreport 2019-hohlfeld-santa-tr Application-Agnostic Offloading of Packet Processing 2019 4 1 arXiv:1904.00671 [cs.NI] 1--14 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf https://arxiv.org/abs/1904.00671 Online COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University Technical Report en OliverHohlfeld HelgeReelfs JanRüth FlorianSchmidt TorstenZimmermann JensHiller KlausWehrle
inproceedings 2019-rueth-icmp Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane 2019 3 27 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-icmp.pdf https://arxiv.org/abs/1901.07265 Springer In Proceedings of the Passive and Active Measurement Conference (PAM '19) Puerto Varas, Chile Passive and Active Measurement Conference (PAM 2019) 27.3.2018 - 29.3.2018 en 10.1007/978-3-030-15986-3_4 1 JanRüth TorstenZimmermann OliverHohlfeld article rueth:iw:TNSM19 TCP’s Initial Window – Deployment in the Wild and its Impact on Performance IEEE Transactions on Network and Service Management 2019 1 30 16 2 389--402 maki http://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-iwtnsm.pdf 1932-4537 10.1109/TNSM.2019.2896335 1 JanRüth IkeKunze OliverHohlfeld inproceedings 2018-zimmermann-webready Is the Web ready for HTTP/2 Server Push? 2018 12 4 maki https://dl.acm.org/citation.cfm?id=3281434 https://arxiv.org/abs/1810.05554 https://http2.netray.io/interleaving.html ACM Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete Crete, Greece CoNEXT 2018 4.12.18 - 7.12.18 en 10.1145/3281411.3281434 1 TorstenZimmermann BenediktWolters OliverHohlfeld KlausWehrle inproceedings 2018-rueth-mining Digging into Browser-based Crypto Mining 2018 10 31 maki,internet-measurements http://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-mining.pdf https://arxiv.org/abs/1808.00811 ACM Proceedings of the Internet Measurement Conference (IMC '18) Boston, US Internet Measurement Conference 2018 31.10.18 - 2.11.18 en 10.1145/3278532.3278539 1 JanRüth TorstenZimmermann KonradWolsing OliverHohlfeld inproceedings 2018-tzimmermann-toplists A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists 2018 10 31 maki https://dl.acm.org/citation.cfm?id=3278574 https://arxiv.org/abs/1805.11506 ACM Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA Boston, US Internet Measurement Conference 2018 31.10.18 - 2.11.18 en 10.1145/3278532.3278574 1 QuirinScheitle OliverHohlfeld JulienGamba JonasJelten TorstenZimmermann Stephen D.Strowes NarseoVallina-Rodriguez inproceedings 2018-hohlfeld-santa Application-Agnostic Offloading of Datagram Processing 2018 9 3 maki,ssiclops,reflexes https://ieeexplore.ieee.org/document/8493053 IEEE Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria Vienna, Austria International Teletraffic Congress ITC 30 03.09.2018 - 07-09.2018 en 10.1109/ITC30.2018.00015 1 OliverHohlfeld Jens HelgeReelfs JanRüth FlorianSchmidt TorstenZimmermann JensHiller KlausWehrle inproceedings 2018-rueth-iwcdns Demystifying TCP Initial Window Configurations of Content Distribution Networks 2018 6 26 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-iwcdns.pdf https://arxiv.org/abs/1902.08937 http://tma.ifip.org/2018/wp-content/uploads/sites/3/2018/06/tma2018_paper13.pdf In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '18) Vienna, Austria Network Traffic Measurement and Analysis Conference (TMA'18) 26.06.2018 - 29.06.2018 10.23919/TMA.2018.8506549 1 JanRüth OliverHohlfeld inproceedings 2018-hiller-ic2e-cpplintegration Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud 2018 4 19 241-249 ssiclops,iop https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-ic2e-policy-aware-cloud.pdf https://ieeexplore.ieee.org/document/8360335 IEEE Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA Orlando, Florida, USA 2018 IEEE International Conference on Cloud Engineering (IC2E 2018) 2018-04-19 978-1-5386-5008-0 10.1109/IC2E.2018.00050 1 JensHiller MaelKimmerlin MaxPlauth SeppoHeikkila StefanKlauck VilleLindfors FelixEberhardt DariuszBursztynowski Jesus LlorenteSantos OliverHohlfeld KlausWehrle article 2018-scheitle-ccr-caa A First Look at Certification Authority Authorization (CAA) ACM SIGCOMM Computer Communications Review (CCR) 2018 4 48 10-23 https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/caa17.pdf internet-measurements https://ccronline.sigcomm.org/wp-content/uploads/2018/05/sigcomm-ccr-final163.pdf https://ccronline.sigcomm.org/2018/a-first-look-at-certification-authority-authorization-caa/ 2018-06-05 10.1145/3213232.3213235 1 QuirinScheitle TaejoongChung JensHiller OliverGasser JohannesNaab Rolandvan Rijswijk-Deij OliverHohlfeld RalphHolz DaveChoffnes AlanMislove GeorgCarle inproceedings 2018-rueth-quicadoptionstudy A First Look at QUIC in the Wild 2018 3 26 255-268 maki,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-quicadoptionstudy.pdf https://arxiv.org/abs/1801.05168 Springer, Cham In Proceedings of the Passive and Active Measurement Conference (PAM '18) Berlin, Germany Passive and Active Measurement Conference (PAM 2018) 26.3.2018 - 27.3.2018 en 978-3-319-76481-8 10.1007/978-3-319-76481-8_19 1 JanRüth IngmarPoese ChristophDietzel OliverHohlfeld inproceedings 2018-tzimmermann-metacdn Characterizing a Meta-CDN 2018 3 26 114-128 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hohlfeld-metacdn.pdf https://arxiv.org/abs/1803.09990 Springer, Cham In Proceedings of the Passive and Active Measurement Conference (PAM '18) Berlin, Germany Passive and Active Measurement Conference (PAM 2018) 26.3.2018 - 27.3.2018 en 978-3-319-76480-1 10.1007/978-3-319-76481-8_9 1 OliverHohlfeld JanRüth KonradWolsing TorstenZimmermann inproceedings 2018-matzutt-bitcoin-content A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin 2018 2 26 Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin's blockchain. Although most data originates from benign extensions to Bitcoin's protocol, our analysis reveals more than 1600 files on the blockchain, over 99% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly. mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018_matzutt_bitcoin-contents_preproceedings-version.pdf 2018-01-07 Online Springer Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao Nieuwpoort, Curaçao Financial Cryptography and Data Security 2018 en 10.1007/978-3-662-58387-6_23 1 RomanMatzutt JensHiller MartinHenze Jan HenrikZiegeldorf DirkMüllmann OliverHohlfeld KlausWehrle inproceedings 2017-rueth-iwmeasure Large-Scale Scanning of TCP’s Initial Window 2017 11 1 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rueth-iwmeasure.pdf ACM In Proceedings of the Internet Measurement Conference (IMC '17) London, UK Proceedings of the 2017 Internet Measurement Conference 01.11.2017 - 03.11.2017 en 10.1145/3131365.3131370 1 JanRüth ChristianBormann OliverHohlfeld proceedings 2017-SymPerfPoster SymPerf: Predicting Network Function Performance 2017 8 21 spp,erc,symbiosys,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rath-sym-perf-poster.pdf ACM Los Angeles, USA ACM SIGCOMM 2017 Poster 21.8.2017 - 25.8.2017 en 978-1-4503-5057-0/17/08 10.1145/3123878.3131977 1 FelixRath JohannesKrude JanRüth DanielSchemmel OliverHohlfeld Jó AgilaBitsch Link KlausWehrle inproceedings 2017-zimmermann-qoe A QoE Perspective on HTTP/2 Server Push 2017 8 21 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-internetqoe-push.pdf ACM ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017), Los Angeles, USA Los Angeles, USA ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017) 21.8.2017 - 25.8.2017 en 978-1-4503-5056-3 10.1145/3098603.3098604 1 TorstenZimmermann BenediktWolters OliverHohlfeld inproceedings 2017-henze-tma-cloudemail Veiled in Clouds? Assessing the Prevalence of Cloud Computing in the Email Landscape 2017 6 21 trinics, ssiclops https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-tma-cloudemail.pdf Online IEEE / IFIP Proceedings of the 2017 Network Traffic Measurement and Analysis Conference (TMA 2017), Dublin, Ireland en 978-3-901882-95-1 10.23919/TMA.2017.8002910 1 MartinHenze Mary PeytonSanford OliverHohlfeld inproceedings 2017-zimmermann-networking-http2 How HTTP/2 Pushes the Web: An Empirical Study of HTTP/2 Server Push 2017 6 12 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-networking-push.pdf IEEE Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden Stockholm, Sweden IFIP Networking 2017 12.-16.6.2017 978-3-901882-94-4 10.23919/IFIPNetworking.2017.8264830 1 TorstenZimmermann JanRüth BenediktWolters OliverHohlfeld article 2017-comnet-lru Performance Evaluation for New Web Caching Strategies Combining LRU with Score Based Object Selection Elsevier Computer Networks 2017 https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/COMNET-D-16-957R1-Updated-Submit.pdf accepted GerhardHasslinger KonstantinosNtougias FrankHasslinger OliverHohlfeld inproceedings 2016-matzutt-ccs-bitcoin POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store 2016 10 24 1769-1771 mynedata /fileadmin/papers/2016/2016-matzutt-ccs-blockchaincontent.pdf Online ACM Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria en 978-1-4503-4139-4 10.1145/2976749.2989059 1 RomanMatzutt OliverHohlfeld MartinHenze RobinRawiel Jan HenrikZiegeldorf KlausWehrle conference 2016-itc-caching Performance Evaluation for New Web Caching Strategies Combining RU with Score Based Object Selection 2016 9 ITC 28 ITC 28 GerhardHasslinger KostasNtougias FrankHasslinger OliverHohlfeld conference 2016-hohlfeld-qcman Insensitivity to Network Delay: Minecraft Gaming Experience of Casual Gamers 2016 9 Assessing the impact of network delay on perceived quality of gaming has been subject to many studies involving different genres ranging from fast-paced first-person shooters to strategy games. This paper assesses the impact of network latency on the Quality of Experience (QoE) of casual gamers playing Minecraft. It is based on a user study involving 12 casual gamers with no prior experience with Minecraft. QoE is assessed using the Game Experience Questionnaire (GEQ) and dedicated questions for the overall perceived quality and experienced gameplay interruptions. The main finding is that casual Minecraft players are rather insensitive to network delay of up to 1 sec. https://i-teletraffic.org/_Resources/Persistent/bc99ba4324ebc7cf1369f09a6caa334c0203943f/Hohlfeld2016.pdf http://ieeexplore.ieee.org/abstract/document/7810715/?reload=true IEEE QCMan IEEE QCMan 10.1109/ITC-28.2016.313 OliverHohlfeld HannesFiedler EnricPujol DennisGuse article 2016-hohlfeld-nfv_ccr New Kid on the Block: Network Functions Virtualization: From Big Boxes to Carrier Clouds ACM SIGCOMM CCR 2016 7 http://ccracmsigcomm.info.ucl.ac.be/wp-content/uploads/2016/07/sigcomm-ccr-paper29.pdf LeonhardNobach OliverHohlfeld DavidHausheer inproceedings 2016-werner-networking-stean STEAN: A Storage and Transformation Engine for Advanced Networking Context 2016 5 17 maki IEEE Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), Vienna, Austira Vienna, Austria IFIP Networking 2016 17.-19.5.2016 978-3-9018-8283-8 10.1109/IFIPNetworking.2016.7497203 1 MarcWerner JohannesSchwandtke MatthiasHollick OliverHohlfeld TorstenZimmermann KlausWehrle inproceedings 2016-henze-claw-dpc Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds 2016 4 8 130-135 ssiclops /fileadmin/papers/2016/2016-henze-claw-dpc.pdf Online IEEE Proceedings of the Second International Workshop on Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), co-located with the 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany en 978-1-5090-3684-4 10.1109/IC2EW.2016.24 1 MartinHenze JensHiller OliverHohlfeld KlausWehrle article 2016-sdnflex_si Editorial: Special issue on Software-Defined Networking and Network Functions Virtualization for flexible network management Wiley Journal of Network Management 2016 26 1 http://onlinelibrary.wiley.com/doi/10.1002/nem.1915/pdf OliverHohlfeld ThomasZinner TheophilusBenson DavidHausheer conference 2016-erwin ERWIN - Enabling the Reproducible Investigation of Waiting Times for Arbitrary Workflows 2016 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7498938&tag=1 IEEE QoMEX IEEE QoMEX 10.1109/QoMEX.2016.7498938 ThomasZinner MatthiasHirth ValentinFischer OliverHohlfeld inproceedings 2015-schmidt-santa Santa: Faster Packet Delivery for Commonly Wished Replies [Poster Abstract] 2015 8 19 ssiclops https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-sigcomm-santa.pdf Online ACM Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM '15), London, United Kingdom London, United Kingdom 43rd ACM SIGCOMM Conference (SIGCOMM '15) 17–21 August, 2015 en 10.1145/2785956.2790014 1 FlorianSchmidt OliverHohlfeld RenéGlebke KlausWehrle conference HohlfeldIMC A QoE Perspective on Sizing Network Buffers 2014 11 ACM Internet Measurement Conference accepted OliverHohlfeld EnricPujol FlorinCiucu AnjaFeldmann PaulBarford conference 2014-hohlfeld-harvester The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape 2014 6 http://downloads.ohohlfeld.com/paper/harvesters-asiaccs2014.pdf http://asiaccs2014.nict.go.jp/ ACM 9th ACM Symposium on Information, Computer and Communications Security 10.1145/2590296.2590302 1 GianlucaStringhini OliverHohlfeld ChristopherKruegel GiovanniVigna conference CiucuPH2014 On Capacity Dimensioning in Dynamic Scenarios: The Key Role of Peak Values 2014 5 http://www.ieee-lanman.org/ IEEE IEEE LANMAN Reno, NV, USA 1 FlorinCiucu FelixPoloczek OliverHohlfeld article HohlfeldCCR14 An Internet census taken by an illegal botnet - A qualitative assessment of published measurements ACM SIGCOMM Computer Communication Review 2014 44 3 http://www.sigcomm.org/sites/default/files/ccr/papers/2014/July/0000000-0000013.pdf http://www.sigcomm.org/ccr/papers/2014/July ThomasKrenc OliverHohlfeld AnjaFeldmann