Frank Kargl

According to our database1, Frank Kargl authored at least 192 papers between 1999 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis.
IEEE Communications Surveys and Tutorials, 2019

Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems.
IEEE Communications Surveys and Tutorials, 2019

A Privacy-Aware V-Model for Software Development.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Detecting Anomalous Driving Behavior using Neural Networks.
Proceedings of the 2019 IEEE Intelligent Vehicles Symposium, 2019

Poster: Network Message Field Type Recognition.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Privacy of Connected Vehicles.
Proceedings of the Handbook of Mobile Data Privacy., 2018

An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios.
IEEE Trans. Intelligent Transportation Systems, 2018

uMine: a Blockchain based on Human Miners.
IACR Cryptology ePrint Archive, 2018

Mitigation of Flooding and Slow DDoS Attacks in a Software-Defined Network.
CoRR, 2018

An SDN-based Approach For Defending Against Reflective DDoS Attacks.
CoRR, 2018

A Flexible Network Approach to Privacy of Blockchain Transactions.
CoRR, 2018

Coloured Ring Confidential Transactions.
CoRR, 2018

Performance Evaluation in High-Speed Networks by the Example of Intrusion Detection.
CoRR, 2018

Multi-Source Fusion Operations in Subjective Logic.
CoRR, 2018

SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks.
CoRR, 2018

VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs.
CoRR, 2018

NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Robust Detection of Anomalous Driving Behavior.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

iRide: A Privacy-Preserving Architecture for Self-Driving Cabs Service.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2018

VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs.
Proceedings of the Security and Privacy in Communication Networks, 2018

What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

An SDN-based Approach For Defending Against Reflective DDoS Attacks.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Applications of Smart-Contracts: Anonymous Decentralized Insurances with IoT Sensors.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Secure Code Execution: A Generic PUF-Driven System Architecture.
Proceedings of the Information Security - 21st International Conference, 2018

uMine: A Blockchain Based on Human Miners.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

A Flexible Network Approach to Privacy of Blockchain Transactions.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Graphtides: a framework for evaluating stream-based graph processing platforms.
Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA), 2018

Multi-Source Fusion Operations in Subjective Logic.
Proceedings of the 21st International Conference on Information Fusion, 2018

Coloured Ring Confidential Transactions.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Performance Evaluation in High-Speed Networks by the Example of Intrusion Detection Systems.
Proceedings of the 11. DFN-Forum Kommunikationstechnologien, 2018

Retro-λ: An Event-sourced Platform for Serverless Applications with Retroactive Computing Support.
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, 2018

Performance Engineering in Distributed Event-sourced Systems.
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, 2018

Log Pruning in Distributed Event-sourced Systems.
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, 2018

2017
Security Challenges and Opportunities of Software-Defined Networking.
IEEE Security & Privacy, 2017

Towards an Economic Analysis of Routing in Payment Channel Networks.
CoRR, 2017

Blackchain: Scalability for Resource-Constrained Accountable Vehicle-to-X Communication.
CoRR, 2017

Analyzing Attacks on Cooperative Adaptive Cruise Control (CACC).
CoRR, 2017

Formal Analysis of V2X Revocation Protocols.
CoRR, 2017

Enhanced Position Verification for VANETs using Subjective Logic.
CoRR, 2017

Automated PCB Reverse Engineering.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Analyzing attacks on cooperative adaptive cruise control (CACC).
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Formal Analysis of V2X Revocation Protocols.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Blackchain: scalability for resource-constrained accountable vehicle-to-x communication.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017

Towards an economic analysis of routing in payment channel networks.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017

An Extensible Host-Agnostic Framework for SDN-Assisted DDoS-Mitigation.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

A Testing Framework for High-Speed Network and Security Devices.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Consistent retrospective snapshots in distributed event-sourced systems.
Proceedings of the 2017 International Conference on Networked Systems, 2017

Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Chronograph: A Distributed Processing Platform for Online and Batch Computations on Event-sourced Graphs.
Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems, 2017

A Testing Framework Architecture for Automotive Intrusion Detection Systems.
Proceedings of the Automotive - Safety & Security 2017, 2017

2016
Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns.
PoPETs, 2016

Network Attack Detection and Defense (Dagstuhl Seminar 16361).
Dagstuhl Reports, 2016

Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems.
CoRR, 2016

PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks.
Ad Hoc Networks, 2016

A resilient in-network aggregation mechanism for VANETs based on dissemination redundancy.
Ad Hoc Networks, 2016

Enhanced Position Verification for VANETs Using Subjective Logic.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

POSTER: Anomaly-based misbehaviour detection in connected car backends.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

Exploiting propagation effects for authentication and misbehavior detection in VANETs.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

Specification Mining for Intrusion Detection in Networked Control Systems.
Proceedings of the 25th USENIX Security Symposium, 2016

Automotive Ethernet: security opportunity or challenge?
Proceedings of the Sicherheit 2016: Sicherheit, 2016

Using conflict-free replicated data types for serverless mobile social applications.
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2016

Mobile triage management in disaster area networks using decentralized replication.
Proceedings of the Eleventh ACM Workshop on Challenged Networks, 2016

Chronograph: A Distributed Platform for Event-Sourced Graph Computing.
Proceedings of the Posters and Demos Session of the 17th International Middleware Conference, 2016

Setting Up a High-Speed TCP Benchmarking Environment - Lessons Learned.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

A Comparison of TCP Congestion Control Algorithms in 10G Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

KopperCoin - A Distributed File Storage with Financial Incentives.
Proceedings of the Information Security Practice and Experience, 2016

2015
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption.
IACR Cryptology ePrint Archive, 2015

Pseudonym Schemes in Vehicular Networks: A Survey.
IEEE Communications Surveys and Tutorials, 2015

A framework for evaluating pseudonym strategies in vehicular ad-hoc networks.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Decentralized enforcement of k-anonymity for location privacy using secret sharing.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

Context-adaptive detection of insider attacks in VANET information dissemination schemes.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

Wireless channel-based message authentication.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Modeling Message Sequences for Intrusion Detection in Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection IX, 2015

Formal Verification of Privacy Properties in Electric Vehicle Charging.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

A conceptual model for event-sourced graph computing.
Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems, 2015

Sequence-aware Intrusion Detection in Industrial Control Systems.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Concurrent programming in web applications.
it - Information Technology, 2014

Insights on the Security and Dependability of Industrial Control Systems.
IEEE Security & Privacy, 2014

Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292).
Dagstuhl Reports, 2014

In-Network Aggregation for Vehicular Ad Hoc Networks.
IEEE Communications Surveys and Tutorials, 2014

A flexible, subjective logic-based framework for misbehavior detection in V2V networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Revisiting attacker model for smart vehicles.
Proceedings of the 6th IEEE International Symposium on Wireless Vehicular Communications, 2014

PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET).
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Formal model of certificate omission schemes in VANET.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Combining discrete event simulations and event sourcing.
Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, 2014

Privacy implications of presence sharing in mobile messaging applications.
Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014

Dynamic packet-filtering in high-speed networks using NetFPGAs.
Proceedings of the Third International Conference on Future Generation Communication Technologies (FGCT 2014), 2014

A Security Assessment Methodology for Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols.
IEEE Trans. Vehicular Technology, 2013

On credibility improvements for automotive navigation systems.
Personal and Ubiquitous Computing, 2013

Differential privacy in intelligent transportation systems.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

SeDyA: secure dynamic aggregation in VANETs.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Electronic Decal: A Security Function Based on V2X Communication.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Impact of V2X privacy strategies on Intersection Collision Avoidance systems.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

The impact of security on cooperative awareness in VANET.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

Short paper: Towards data-similarity-based clustering for inter-vehicle communication.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

On the Feasibility of Device Fingerprinting in Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2013

POPCORN: privacy-preserving charging for emobility.
Proceedings of the CyCAR'13, 2013

Efficient and secure storage of private keys for pseudonymous vehicular communication.
Proceedings of the CyCAR'13, 2013

2012
Towards security in nano-communication: Challenges and opportunities.
Nano Comm. Netw., 2012

Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502).
Dagstuhl Reports, 2012

On the potential of PUF for pseudonym generation in vehicular networks.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Understanding vehicle related crime to elaborate on countermeasures based on ADAS and V2X communication.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Evaluation of congestion-based certificate omission in VANETs.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Towards context adaptive privacy decisions in ubiquitous computing.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Congestion-based certificate omission in VANETs.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

Analyzing dissemination redundancy to achieve data consistency in VANETs.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

Security in nano communication: Challenges and open research issues.
Proceedings of IEEE International Conference on Communications, 2012

Privacy context model for dynamic privacy adaptation in ubiquitous computing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

2011
ACM WiSec 2011 poster and demo session.
Mobile Computing and Communications Review, 2011

Research challenges in intervehicular communication: lessons of the 2010 Dagstuhl Seminar.
IEEE Communications Magazine, 2011

Modeling in-network aggregation in VANETs.
IEEE Communications Magazine, 2011

Privacy-by-design in ITS applications.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Spoofed data detection in VANETs using dynamic thresholds.
Proceedings of the 2011 IEEE Vehicular Networking Conference, 2011

Advanced carrier sensing to resolve local channel congestion.
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011

Privacy Verification Using Ontologies.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Decentralized position verification in geographic ad hoc routing.
Security and Communication Networks, 2010

Exploration of adaptive beaconing for efficient intervehicle safety communication.
IEEE Network, 2010

Resilient secure aggregation for vehicular networks.
IEEE Network, 2010

Measuring long-term location privacy in vehicular communication systems.
Computer Communications, 2010

On the efficiency of secure beaconing in VANETs.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

V-Tokens for Conditional Pseudonymity in VANETs.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

On the potential of generic modeling for VANET data aggregation protocols.
Proceedings of the Second IEEE Vehicular Networking Conference, 2010

Dependable and secure geocast in vehicular networks.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010

10402 Report - Working Group on Security and Privacy.
Proceedings of the Inter-Vehicular Communication, 03.10. - 06.10.2010, 2010

10402 Abstracts Collection and Executive Summary - Inter-Vehicular Communication.
Proceedings of the Inter-Vehicular Communication, 03.10. - 06.10.2010, 2010

Interaction weaknesses of personal navigation devices.
Proceedings of 2nd International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2010

Towards Territorial Privacy in Smart Environments.
Proceedings of the Intelligent Information Privacy Management, 2010

Mandatory Enforcement of Privacy Policies using Trusted Computing Principles.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
Editorial on Special Issue "Mobile Ad-hoc Networks".
Praxis der Informationsverarbeitung und Kommunikation, 2009

Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges
CoRR, 2009

Secure Vehicular Communication Systems: Design and Architecture
CoRR, 2009

A VANET-based emergency vehicle warning system.
Proceedings of the IEEE Vehicular Networking Conference, 2009

A fuzzy logic based approach for structure-free aggregation in vehicular ad-hoc networks.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009

Measuring location privacy in V2X communication systems with accumulated information.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Privacy Requirements in Vehicular Communication Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
On the security of context-adaptive information dissemination.
Security and Communication Networks, 2008

Communication patterns in VANETs.
IEEE Communications Magazine, 2008

Secure vehicular communication systems: design and architecture.
IEEE Communications Magazine, 2008

Secure vehicular communication systems: implementation, performance, and research challenges.
IEEE Communications Magazine, 2008

U2VAS: A Research Communication Stack for Vehicular Networks.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Optimized Position Based Gossiping in VANETs.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Simulation of ad hoc networks: ns-2 compared to JiST/SWANS.
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008

Evaluation of Position Based Gossiping for VANETs in an Intersection Scenario.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Secure and efficient beaconing for vehicular networks.
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008

Cyclic Data Synchronization through Reusing SyncML.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

Implementing and Validating an Environmental and Health Monitoring System.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

SNMP-Proxy for Wireless Sensor Network.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Advanced Adaptive Gossiping Using 2-Hop Neighborhood Information.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
The Effects of the Ajax Technology on Web Application Usability.
Proceedings of the WEBIST 2007, 2007

The iNAV Indoor Navigation System.
Proceedings of the Ubiquitous Computing Systems, 4th International Symposium, 2007

Adaptive Topology Based Gossiping in VANETs Using Position Information.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

2006
Position Verification Approaches for Vehicular Ad Hoc Networks.
IEEE Wireless Commun., 2006

Semantic Information Retrieval in the COMPASS Location System.
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006

BigNurse: A Wireless Ad Hoc Network for Patient Monitoring.
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006

Improved security in geographic ad hoc routing through autonomous position verification.
Proceedings of the Third International Workshop on Vehicular Ad Hoc Networks, 2006

Location Tracking Attack in Ad hoc Networks based on Topology Information.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Re-identifying Anonymous Nodes.
Proceedings of the Location- and Context-Awareness, Second International Workshop, 2006

Identification in Ad Hoc Networks.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Minitrack Introduction.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Impact of Pseudonym Changes on Geographic Routing in VANETs.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Sensors for Detection of Misbehaving Nodes in MANETs.
Praxis der Informationsverarbeitung und Kommunikation, 2005

Short paper: Random IDs for preserving location privacy.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

The COMPASS Location System.
Proceedings of the Location- and Context-Awareness, First International Workshop, 2005

Minitrack Chair's Introduction: Wireless Personal Area and Ad-Hoc Networks.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Secure Dynamic Source Routing.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Identitäten in mobilen Ad hoc Netzwerken.
Proceedings of the INFORMATIK 2005, 2005

2004
Wireless Personal Area Networks: Minitrack Introduction.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Integrierte Sicherheit für Mobile Ad-hoc Netzwerke.
Proceedings of the INFORMATIK 2004, 2004

Securing Ad hoc Routing Protocols.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

Sensors for Detection of Misbehaving Nodes in MANETs.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004

2003
Sicherheit in Mobilen Ad hoc Netzwerken.
PhD thesis, 2003

Bluetooth-based Ad-Hoc Networks for Voice Transmission.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
Ein Framework für MANET Routing Protokolle.
Proceedings of the Mobile Ad-Hoc Netzwerke, 2002

2001
Protecting web servers from distributed denial of service attacks.
Proceedings of the Tenth International World Wide Web Conference, 2001

Transparent Migration of Mobile Agents Using the Java Platform Debugger Architecture.
Proceedings of the Mobile Agents, 5th International Conference, 2001

1999
Dynamic User Interfaces with Java.
Proceedings of WebNet 99, 1999

Evaluation of Java Messaging Middleware as a Platform for Software Agent Communication.
Proceedings of the JIT '99, 1999

CIA - a collaboration and coordination infrastructure for personal agents (short paper).
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999


  Loading...