420. |
Heuristic Header Recovery for Corrupted Network Packets
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
December
2015
ISBN: 978-3844041743
|
419. |
14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco Volume 9476of Lecture Notes in Computer Science, page 197-213.
Publisher: Springer,
December
2015
ISBN: 978-3-319-26822-4
|
418. |
Remp TCP: Low latency Multipath TCP
Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany
Publisher: ACM,
December
2015
|
417. |
IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in
Wireless Communications (GC'15 - ULTRA2), San Diego, USA
Publisher: IEEE,
December
2015
|
416. |
Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Cancún, Mexico (MSWiM'15), page 291-300.
Publisher: ACM, New York, NY
November
2015
|
415. |
40th IEEE Conference on Local Computer Networks (LCN), Clearwater Beach, USA, page 19-27.
Publisher: IEEE,
October
2015
|
414. |
ITG-Fachtagung "Zukunft der Netze 2015" – Poster Session, Tübingen, Germany
Publisher: VDE,
September
2015
|
413. |
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September
2015
ISBN: 978-3-319-29882-5
|
412. |
Autorisierungsmanagement für das Internet of Things
D•A•CH Security 2015
September
2015
Accepted
|
411. |
Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM '15), London, United Kingdom
Publisher: ACM,
August
2015
|
410. |
Internet-Draft
Document number: draft-moskowitz-hip-dex-04
Internet Engineering Task Force,
July
2015
|
409. |
Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany
The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), Las Vegas, NV, USA Volume 3, page 815--822.
Publisher: Elsevier,
July
2015
|
408. |
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
June
2015
ISBN: 978-3-8440-3755-5
|
407. |
12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA, page 256-264.
Publisher: IEEE,
June
2015
|
406. |
Internet-Draft
Document number: draft-moskowitz-hip-dex-03
Internet Engineering Task Force,
June
2015
|
405. |
16th IEEE International Symposium on a World of Wireless, Mobile and
Multimedia Networks: Demos (IEEE WoWMoM 2015 - Demos), Boston, USA
Publisher: IEEE,
June
2015
|
404. |
Proceedings of the 3rd ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’15), London, United Kingdom, page 73-74.
Publisher: ACM, New York, NY
June
2015
|
403. |
Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health Volume 211of Studies in Health Technology and Informatics, page 153 --159.
Publisher: IOS Press, Amsterdam
June
2015
ISBN: 978-1-61499-515-9
|
402. |
Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health Volume 211of Studies in Health Technology and Informatics, page 185 -- 190.
Publisher: IOS Press, Amsterdam
June
2015
ISBN: 978-1-61499-515-9
|
401. |
2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA, page 198-205.
Publisher: IEEE,
May
2015
DOI: 10.1109/SPW.2015.9
|
400. |
EchoRing: A Low-Latency, Reliable Token-Passing MAC Protocol for Wireless Industrial Networks
Proc. of 21st European Wireless Conference (EW15)
Publisher: IEEE,
May
2015
ISBN: 978-3-8007-3976-9
|
399. |
Proc. of the 14th International IFIP TC6 Networking Conference (NETWORKING'15), Toulouse, France
Publisher: IFIP, Laxenburg, Austria
May
2015
|
398. |
Protocol Virtualization through Dynamic Network Stacks
SDNFlex Workshop (NetSys 2015)
Cottbus, March 2015, 9-12
Publisher: IEEE,
March
2015
|
397. |
Proc. of 2nd International Conference on Networked Systems, Demonstrations (NetSys15), page 1--3.
Publisher: IEEE,
March
2015
|
396. |
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
Publisher: ACM,
March
2015
ISBN: 978-1-4503-3191-3
|
395. |
Proceedings of the 12th European Conference on Wireless Sensor Networks (EWSN 2015), Porto, Portugal
Publisher: Springer,
February
2015
ISBN: 978-3-319-15581-4
|
394. |
The Feasibility, Semantics, and Scope of Mobile Wireless Device-to-Device Networking
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
January
2015
ISBN: 978-3-8440-3367-0
|
393. |
The Role of Standards in Transatlantic Trade and Regulation. Proc. 20th EURAS Annual Standardisation Conference. EURAS contributions to standardisation research, vol. 9.
Publisher: Mainz Publishers,
2015
ISBN: 978-3-95886-035-3
|
392. |
Corporate ICT Standardisation Management – Lessons from the Literature and from Case Studies
Proc. 7th Annual Conference of the EuroMed Academy of Business, 2015, Verona, Italy
Publisher: EuroMed Press,
2015
|
391. |
Standardisation Management – Some Lessons to be Learnt
Proc. 20th EURAS Annual Standardisation Conference, 2015, Copenhagen, Denmark., page 175-190.
Publisher: Mainz Publishers,
2015
|
390. |
Resource-Conscious Network Security for the IP-Based Internet of Things
RWTH Aachen University,
2015
|
389. |
Optimizing 802.11 Wireless Communications with Machine Learning
RWTH Aachen University,
2015
|
388. |
Heuristic Header Error Recovery for Corrupted Network Packets
RWTH Aachen University,
2015
|