Georg Carle

Orcid: 0000-0002-2347-1839

Affiliations:
  • Technical University Munich, Germany


According to our database1, Georg Carle authored at least 361 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings.
IACR Cryptol. ePrint Arch., 2024

The Pos Experiment Controller: Reproducible & Portable Network Experiments.
Proceedings of the 19th Wireless On-Demand Network Systems and Services Conference, 2024

QUIC Hunter: Finding QUIC Deployments and Identifying Server Libraries Across the Internet.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

2023

Trust and Performance in Future AI-Enabled, Open, Multi-Vendor Network Management Automation.
IEEE Trans. Netw. Serv. Manag., June, 2023

Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns.
PACMNET, 2023

Inter-Cell Network Slicing With Transfer Learning Empowered Multi-Agent Deep Reinforcement Learning.
IEEE Open J. Commun. Soc., 2023

How Low Can You Go? A Limbo Dance for Low-Latency Network Functions.
J. Netw. Syst. Manag., 2023

SRv6-based Time-Sensitive Networks (TSN) with low-overhead rerouting.
Int. J. Netw. Manag., 2023

Real-Time Performance of OPC UA.
CoRR, 2023

Multilayer Environment and Toolchain for Holistic NetwOrk Design and Analysis.
CoRR, 2023

EDGAR: An Autonomous Driving Research Platform - From Feature Development to Real-World Application.
CoRR, 2023

QUIC Library Hunter: Identifying Server Libraries Across the Internet.
CoRR, 2023

Deterministic Channel Access Using MU EDCA in OFDMA-based Wi-Fi Networks.
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023

Target Acquired? Evaluating Target Generation Algorithms for IPv6.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

Network Profiles for Detecting Application-Characteristic Behavior Using Linux eBPF.
Proceedings of the 1st Workshop on eBPF and Kernel Extensions, 2023

TSN Experiments Using COTS Hardware and Open-Source Solutions: Lessons Learned.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

Priority-aware Inter-Server Receive Side Scaling.
Proceedings of the 31st Euromicro International Conference on Parallel, 2023

DissecTLS: A Scalable Active Scanner for TLS Server Configurations, Capabilities, and TLS Fingerprinting.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

On the Accuracy of Active Capacity Estimation in the Internet.
Proceedings of the NOMS 2023, 2023

A Multi-Tenancy System Architecture for Online Examinations.
Proceedings of the NOMS 2023, 2023

Control Groups Added Latency in NFVs: An Update Needed?
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2023

Keeping up to Date with P4Runtime: An Analysis of Data Plane Updates on P4 Switches.
Proceedings of the IFIP Networking Conference, 2023

QUIC on the Highway: Evaluating Performance on High-rate Links.
Proceedings of the IFIP Networking Conference, 2023

Simulation and Practice: A Hybrid Experimentation Platform for TSN.
Proceedings of the IFIP Networking Conference, 2023

An Accuracy Study of Emulation Daemons for IEEE 802.11 Networks.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Distributing Intelligence for 6G Network Automation: Performance and Architectural Impact.
Proceedings of the IEEE International Conference on Communications, 2023

Predicting Latency Quantiles using Network Calculus-assisted GNNs.
Proceedings of the 2nd on Graph Neural Networking Workshop 2023, 2023

Advancing Federated Learning in 6G: A Trusted Architecture with Graph-Based Analysis.
Proceedings of the IEEE Global Communications Conference, 2023

Trustworthy Federated Learning via Decentralized Consensus Under Communication Constraints.
Proceedings of the IEEE Globecom Workshops 2023, 2023

Fast and Scalable Network Slicing by Integrating Deep Learning with Lagrangian Methods.
Proceedings of the IEEE Global Communications Conference, 2023

A First Look at SVCB and HTTPS DNS Resource Records in the Wild.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Coordination, Trust and Orchestration of Cognitive, Open, Multi-Vendor Network Automation Functions.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2023

The Performance of Post-Quantum TLS 1.3.
Proceedings of the Companion of the 19th International Conference on emerging Networking EXperiments and Technologies, 2023

Synthesizing and Scaling WAN Topologies Using Permutation-Invariant Graph Generative Models.
Proceedings of the 19th International Conference on Network and Service Management, 2023

Gotta Query 'Em All, Again!: Repeatable Name Resolution with Full Dependency Provenance.
Proceedings of the Applied Networking Research Workshop, 2023

Evaluating the Benefits: Quantifying the Effects of TCP Options, QUIC, and CDNs on Throughput.
Proceedings of the Applied Networking Research Workshop, 2023

2022
Toward Control and Coordination in Cognitive Autonomous Networks.
IEEE Trans. Netw. Serv. Manag., 2022

EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks.
J. Netw. Syst. Manag., 2022

Waiting for QUIC: On the Opportunities of Passive Measurements to Understand QUIC Deployments.
CoRR, 2022

Recommendations for designing hybrid conferences.
Comput. Commun. Rev., 2022

Methodology and Infrastructure for TSN-Based Reproducible Network Experiments.
IEEE Access, 2022

Domain Parking: Largely Present, Rarely Considered!
Proceedings of the 6th Network Traffic Measurement and Analysis Conference, 2022

Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale.
Proceedings of the 6th Network Traffic Measurement and Analysis Conference, 2022

On-path vs off-path traffic steering, that is the question.
Proceedings of the FIRA@SIGCOMM 2022: Proceedings of the ACM SIGCOMM Workshop on Future of Internet Routing & Addressing, 2022

Slicing networks with P4 hardware and software targets.
Proceedings of the 5G-MeMU '22: Proceedings of the ACM SIGCOMM Workshop on 5G and Beyond Network Measurements, 2022

CRGC: A Practical Framework for Constructing Reusable Garbled Circuits.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

AC/DCIM: Acoustic Channels for Data Center Infrastructure Monitoring.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Robust Deep Learning against Corrupted Data in Cognitive Autonomous Networks.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Clustering Mobile Network Data with Decorrelating Adversarial Nets.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

SmartNIC-based Load Management and Network Health Monitoring for Time Sensitive Applications.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Towards the Classification of TCP Throughput Changes.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

CArDS: Dealing a New Hand in Reducing Service Request Completion Times.
Proceedings of the IFIP Networking Conference, 2022

Prototyping Prototyping Facilities: Developing and Bootstrapping Testbeds.
Proceedings of the IFIP Networking Conference, 2022

Contradiction Management in Intent-driven Cognitive Autonomous RAN.
Proceedings of the IFIP Networking Conference, 2022

BFT-Blocks: The Case for Analyzing Networking in Byzantine Fault Tolerant Consensus.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

Policy-based routing for Flying Adhoc Networks.
Proceedings of the DroNet@MobiSys 2022: Proceedings of the Eighth Workshop on Micro Aerial Vehicle Networks, 2022

Task Allocation in Industrial Edge Networks with Particle Swarm Optimization and Deep Reinforcement Learning.
Proceedings of the 12th International Conference on the Internet of Things, 2022

HVNet: Hardware-Assisted Virtual Networking on a Single Physical Host.
Proceedings of the IEEE INFOCOM 2022, 2022

Rusty clusters?: dusting an IPv6 research foundation.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Towards a tectonic traffic shift?: investigating Apple's new relay network.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Scalability of Distributed Intelligence Architecture for 6G Network Automation.
Proceedings of the IEEE International Conference on Communications, 2022

Inter-Cell Slicing Resource Partitioning via Coordinated Multi-Agent Deep Reinforcement Learning.
Proceedings of the IEEE International Conference on Communications, 2022

Improving Scalability of 6G Network Automation with Distributed Deep Q-Networks.
Proceedings of the IEEE Global Communications Conference, 2022

Network Slicing via Transfer Learning aided Distributed Deep Reinforcement Learning.
Proceedings of the IEEE Global Communications Conference, 2022

Modeling TCP performance using graph neural networks.
Proceedings of the 1st International Workshop on Graph Neural Networking, 2022

PTP Security Measures and their Impact on Synchronization Accuracy.
Proceedings of the 18th International Conference on Network and Service Management, 2022

Flow-level Tail Latency Estimation and Verification based on Extreme Value Theory.
Proceedings of the 18th International Conference on Network and Service Management, 2022

2021
On the implementation of Cognitive Autonomous Networks.
Internet Technol. Lett., 2021

Q-Learning for Conflict Resolution in B5G Network Automation.
CoRR, 2021

Decorrelating Adversarial Nets for Clustering Mobile Network Data.
CoRR, 2021

Neural Network-based Quantization for Network Automation.
CoRR, 2021

Demo: Environment for Generic In-vehicular Network Experiments - EnGINE.
Proceedings of the 13th IEEE Vehicular Networking Conference, 2021

Application of Network Calculus Models on Programmable Device Behavior.
Proceedings of the 33rd International Teletraffic Congress ITC 2021, Avignon, France, August 31, 2021

Adaptive Batching for Fast Packet Processing in Software Routers using Machine Learning.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

Failure Handling for Time-Sensitive Networks using SDN and Source Routing.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

It's over 9000: analyzing early QUIC deployments with the standardization on the horizon.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Scalable TCP Throughput Limitation Monitoring.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Optimal configuration determination in Cognitive Autonomous Networks.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Understanding Exploration and Exploitation of Q-Learning Agents in B5G Network Management.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

Precise real-time monitoring of time-critical flows.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

The pos framework: a methodology and toolchain for reproducible network experiments.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

EnGINE: Developing a Flexible Research Infrastructure for Reliable and Scalable Intra-Vehicular TSN Networks.
Proceedings of the 17th International Conference on Network and Service Management, 2021

Ducked Tails: Trimming the Tail Latency of(f) Packet Processing Systems.
Proceedings of the 17th International Conference on Network and Service Management, 2021

An Intent-Driven Orchestration of Cognitive Autonomous Networks for RAN management.
Proceedings of the 17th International Conference on Network and Service Management, 2021

On Detection of Manipulative Cognitive Functions in Cognitive Autonomous Networks.
Proceedings of the 17th International Conference on Network and Service Management, 2021

Open-Source MQTT Evaluation.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

On the evolution of internet flow characteristics.
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021

High-Performance Match-Action Table Updates from within Programmable Software Data Planes.
Proceedings of the ANCS '21: Symposium on Architectures for Networking and Communications Systems, Layfette, IN, USA, December 13, 2021

A Framework for Reproducible Data Plane Performance Modeling.
Proceedings of the ANCS '21: Symposium on Architectures for Networking and Communications Systems, Layfette, IN, USA, December 13, 2021

2020
Optimally Self-Healing IoT Choreographies.
ACM Trans. Internet Techn., 2020

RAN Cognitive Controller.
CoRR, 2020

Digital Contact Tracing Service: An improved decentralized design for privacy and effectiveness.
CoRR, 2020

Me Love (SYN-)Cookies: SYN Flood Mitigation in Programmable Data Planes.
CoRR, 2020

On the Necessity and Design of Coordination Mechanism for Cognitive Autonomous Networks.
CoRR, 2020

5G URLLC: A Case Study on Low-Latency Intrusion Prevention.
IEEE Commun. Mag., 2020

Key Properties of Programmable Data Plane Targets.
Proceedings of the 32nd International Teletraffic Congress, 2020

Game theoretic Conflict Resolution Mechanism for Cognitive Autonomous Networks.
Proceedings of the 2020 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2020

Environment Modeling and Abstraction of Network States for Cognitive Functions.
Proceedings of the NOMS 2020, 2020

Hardening X.509 Certificate Issuance using Distributed Ledger Technology.
Proceedings of the NOMS 2020, 2020

Deep Clustering of Mobile Network Data with Sparse Autoencoders.
Proceedings of the NOMS 2020, 2020

5G QoS: Impact of Security Functions on Latency.
Proceedings of the NOMS 2020, 2020

Online Monitoring of TCP Throughput Limitations.
Proceedings of the NOMS 2020, 2020

Performance Analysis of VPN Gateways.
Proceedings of the 2020 IFIP Networking Conference, 2020

Open-Source OPC UA Security and Scalability.
Proceedings of the 25th IEEE International Conference on Emerging Technologies and Factory Automation, 2020

SYN Flood Defense in Programmable Data Planes.
Proceedings of the EuroP4@CoNEXT 2020: Proceedings of the 3rd P4 Workshop in Europe, 2020

NCSbench Demo: Reproducible Benchmarking Platform for Networked Control Systems.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

NCSbench: Reproducible Benchmarking Platform for Networked Control Systems.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Agile Network Access Control in the Container Age.
IEEE Trans. Netw. Serv. Manag., 2019

Galois Field Arithmetics for Linear Network Coding using AVX512 Instruction Set Extensions.
CoRR, 2019

Next Generation Resilient Cyber-Physical Systems.
CoRR, 2019

DTLS Performance - How Expensive is Security?
CoRR, 2019

Writing User Space Network Drivers.
CoRR, 2019

Data Querying and Access Control for Secure Multiparty Computation.
CoRR, 2019

Reproducible measurements of TCP BBR congestion control.
Comput. Commun., 2019

Demonstrating the Cost of Collecting In-Network Measurements for High-Speed VNFs.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2019

FitSDN: Flexible Integrated Transactional SDN.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019

Bidirectional Network Coding in Wireless Networks.
Proceedings of the 2019 International Conference on Networked Systems, 2019

Performance Perspective on Private Distributed Ledger Technologies for Industrial Networks.
Proceedings of the 2019 International Conference on Networked Systems, 2019

Clock Error Analysis of Common Time of Flight based Positioning Methods.
Proceedings of the 2019 International Conference on Indoor Positioning and Indoor Navigation, 2019

A Generalized TDoA/ToA Model for ToF Positioning.
Proceedings of the 2019 International Conference on Indoor Positioning and Indoor Navigation, 2019

Prefix Top Lists: Gaining Insights with Prefixes from Domain-based Top Lists on DNS Deployment.
Proceedings of the Internet Measurement Conference, 2019

Adaptive Network Management for Safety-Critical Systems.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Data Querying and Access Control for Secure Multiparty Computation.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Multi-party authorization and conflict mediation for decentralized configuration management processes.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Comparison of Optimization Goals for Resilient Routing.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

Enabling Wireless Network Support for Gain Scheduled Control.
Proceedings of the 2nd International Workshop on Edge Systems, Analytics and Networking, 2019

Cryptographic Hashing in P4 Data Planes.
Proceedings of the 2019 ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2019

The Case for Writing Network Drivers in High-Level Programming Languages.
Proceedings of the 2019 ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2019

User Space Network Drivers.
Proceedings of the 2019 ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2019

2018
Throughput and Latency of Virtual Switching with Open vSwitch: A Quantitative Analysis.
J. Netw. Syst. Manag., 2018

Verified iptables Firewall Analysis and Verification.
J. Autom. Reason., 2018

Design of a Networked Controller for a Two-Wheeled Inverted Pendulum Robot.
CoRR, 2018

A Performance and Resource Consumption Assessment of Secure Multiparty Computation.
CoRR, 2018

Structure and Stability of Internet Top Lists.
CoRR, 2018

A First Look at Certification Authority Authorization (CAA).
Comput. Commun. Rev., 2018

Performance Implications of Packet Filtering with Linux eBPF.
Proceedings of the 30th International Teletraffic Congress, 2018

The Case for a Network Calculus Heuristic: Using Insights from Data for Tighter Bounds.
Proceedings of the 30th International Teletraffic Congress, 2018

Leveraging interconnections for performance: the serving infrastructure of a large CDN.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

Learning and Generating Distributed Routing Protocols Using Graph-Based Deep Learning.
Proceedings of the 2018 Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, 2018

In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

A management framework for secure multiparty computation in dynamic environments.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Trustworthy configuration management for networked devices using distributed ledgers.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Equal-volume quantization of mobile network data using bounding spheres and boxes.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Towards a Deeper Understanding of TCP BBR Congestion Control.
Proceedings of the 17th International IFIP TC6 Networking Conference, 2018

Leveraging Secure Multiparty Computation in the Internet of Things.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

RockFS: Cloud-backed File System Resilience to Client-Side Attacks.
Proceedings of the 19th International Middleware Conference, 2018

Building a Traffic Policer for DDoS Mitigation on Top of Commodity Hardware.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem.
Proceedings of the Internet Measurement Conference 2018, 2018

Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists.
Proceedings of the Internet Measurement Conference 2018, 2018

Evaluation of algorithms for multipath route selection over the Internet.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

An Experimental Performance Analysis of the Cryptographic Database ZeroDB.
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 2018

Transactional Network Updates in SDN.
Proceedings of the 2018 European Conference on Networks and Communications, 2018

A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Benchmarking Networked Control Systems.
Proceedings of the Workshop on Benchmarking Cyber-Physical Networks and Systems, 2018

High-performance packet processing and measurements.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

Efficient Dynamic Flow Tracking for Packet Analyzers.
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018

Intra-Node Resource Isolation for SFC with SR-IOV.
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018

Measuring Adoption of Security Additions to the HTTPS Ecosystem.
Proceedings of the Applied Networking Research Workshop, 2018

User Space Network Drivers.
Proceedings of the Applied Networking Research Workshop, 2018

Behind the scenes: what device benchmarks can tell us.
Proceedings of the Applied Networking Research Workshop, 2018

2017
The Amplification Threat Posed by PubliclyReachable BACnet Devices.
J. Cyber Secur. Mobil., 2017

Software Distribution Transparency and Auditability.
CoRR, 2017

Push away your privacy: Precise user tracking based on TLS client certificate authentication.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

HLOC: Hints-based geolocation leveraging multiple measurement frameworks.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

Large-scale classification of IPv6-IPv4 siblings with variable clock skew.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

Security Implications of Publicly Reachable Building Automation Systems.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Towards an Ecosystem for Reproducible Research in Computer Networking.
Proceedings of the Reproducibility Workshop, 2017

FlowScope: Efficient packet capture and storage in 100 Gbit/s networks.
Proceedings of the 2017 IFIP Networking Conference, 2017

Information Mining from Public Mailing Lists: A Case Study on IETF Mailing Lists.
Proceedings of the Internet Science - 4th International Conference, 2017

Mission accomplished?: HTTPS security after diginotar.
Proceedings of the 2017 Internet Measurement Conference, 2017

An experimental system for verifying topology changes in mobile communication networks.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Privacy Assessment Using Static Taint Analysis (Tool Paper).
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2017

SDN on ACIDs.
Proceedings of the 2nd Workshop on Cloud-Assisted Networking, 2017

Performance implications for intra-node placement of network function chains.
Proceedings of the 6th IEEE International Conference on Cloud Networking, 2017

Building Fast but Flexible Software Routers.
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017

Mind the Gap - A Comparison of Software Packet Generators.
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017

Achieving Reproducible Network Environments with INSALATA.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
Verification of Configuration Management Changes in Self-Organizing Networks.
IEEE Trans. Netw. Serv. Manag., 2016

HEAP: Reliable Assessment of BGP Hijacking Attacks.
IEEE J. Sel. Areas Commun., 2016

CAIR: Using Formal Languages to Study Routing, Leaking, and Interception in BGP.
CoRR, 2016

Large-Scale Classification of IPv4-IPv6 Siblings with Nonlinear Clock Skew.
CoRR, 2016

Carrier-Grade Anomaly Detection Using Time-to-Live Header Information.
CoRR, 2016

Taint Analysis for System-Wide Privacy Audits: A Framework and Real-World Case Studies.
CoRR, 2016

TinyIPFIX: An efficient application protocol for data exchange in cyber physical systems.
Comput. Commun., 2016

Network engineering for real-time networks: comparison of automotive and aeronautic industries approaches.
IEEE Commun. Mag., 2016

Scanning the IPv6 Internet: Towards a Comprehensive Hitlist.
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016

Digging for Dark IPMI Devices: Advancing BMC Detection and Evaluating Operational Security.
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016

Building a Low Latency Linux Software Router.
Proceedings of the 28th International Teletraffic Congress, 2016

sKnock: Port-Knocking for Masses.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems Workshops, 2016

GPLMT: A Lightweight Experimentation and Testbed Management Framework.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

Analyzing Locality of Mobile Messaging Traffic using the MATAdOR Framework.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

A minimum spanning tree-based approach for reducing verification collisions in self-organizing networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Distributed smart space orchestration.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Anomaly detection for SOME/IP using complex event processing.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

FLOWer - Device benchmarking beyond 100 Gbit/s.
Proceedings of the 2016 IFIP Networking Conference, 2016

Verified iptables firewall analysis.
Proceedings of the 2016 IFIP Networking Conference, 2016

Rate-Adaptive Link Quality Estimation for Coded Packet Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

An Analysis of IETF Activities Using Mailing Lists and Social Media.
Proceedings of the Internet Science - Third International Conference, 2016

An Optimal Metric-Aware Response Selection Strategy for Intrusion Response Systems.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

A Steiner tree-based verification approach for handling topology changes in self-organizing networks.
Proceedings of the 12th International Conference on Network and Service Management, 2016

Efficient Serving of VPN Endpoints on COTS Server Hardware.
Proceedings of the 5th IEEE International Conference on Cloud Networking, 2016

Collaborative Incident Handling Based on the Blackboard-Pattern.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

Revisiting Benchmarking Methodology for Interconnect Devices.
Proceedings of the 2016 Applied Networking Research Workshop, 2016

2015
Optimal Design of Resilient Virtual Networks [Invited].
JOCN, 2015

Towards Low Latency Software Routers.
J. Networks, 2015

Towards carrier grade SDNs.
Comput. Networks, 2015

Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

DoS Amplification Attacks - Protocol-Agnostic Detection of Service Abuse in Amplifier Networks.
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015

Optimizing latency and CPU load in packet processing systems.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2015

Adaptive suppression of inter-packet delay variations in coded packet networks.
Proceedings of the 2015 International Symposium on Network Coding, 2015

A study of networking software induced latency.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

MoonGen: A Scriptable High-Speed Packet Generator.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

A graph coloring approach for scheduling undo actions in self-organizing networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

A Constraint Optimization-Based Resolution of Verification Collisions in Self-Organizing Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Semantics-Preserving Simplification of Real-World Firewall Rule Sets.
Proceedings of the FM 2015: Formal Methods, 2015

Performance benchmarking of a software-based LTE SGW.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Certifying spoofing-protection of firewalls.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Demonstrating topoS: Theorem-prover-based synthesis of secure network configurations.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Comparison of Frameworks for High-Performance Packet IO.
Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems, 2015

2014
A preamble-based approach for providing quality of service support in wireless sensor networks.
Telecommun. Syst., 2014

Validated Model-Based Performance Prediction of Multi-Core Software Routers.
Prax. Inf.verarb. Kommun., 2014

MoonGen: A Scriptable High-Speed Packet Generator.
CoRR, 2014

Directed Security Policies: A Stateful Network Implementation.
Proceedings of the Proceedings Third International Workshop on Engineering Safety and Security Systems, 2014

Flow-inspector: a framework for visualizing network flow data using current web technologies.
Computing, 2014

Network virtualization for disaster resilience of cloud services.
IEEE Commun. Mag., 2014

Detection and resolution of ineffective function behavior in Self-Organizing Networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

PETFEN: A Performance Evaluation Tool for Flow-Level Network Modeling of Ethernet Networks.
Proceedings of the 8th International Conference on Performance Evaluation Methodologies and Tools, 2014

Low latency packet processing in software routers.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2014

Privacy Preserving Energy Management.
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014

Crowdsourced context-modeling as key to future smart spaces.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Analysis of injection capabilities and media access of IEEE 802.11 hardware in monitor mode.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A deeper understanding of SSH: Results from Internet-wide scans.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A study of network stack latency for game servers.
Proceedings of the 13th Annual Workshop on Network and Systems Support for Games, 2014

A Post-Action Verification Approach for Automatic Configuration Parameter Changes in Self-Organizing Networks.
Proceedings of the Mobile Networks and Management - 6th International Conference, 2014

Operational Troubleshooting-Enabled Coordination in Self-Organizing Networks.
Proceedings of the Mobile Networks and Management - 6th International Conference, 2014

Towards stochastic flow-level network modeling: Performance evaluation of short TCP flows.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

An experimental system for SON verification.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

A configuration management assessment method for SON verification.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

Malicious BGP hijacks: Appearances can be deceiving.
Proceedings of the IEEE International Conference on Communications, 2014

Verifying Security Policies Using Host Attributes.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2014

MonSamp: an SDN Application for QoS Monitoring.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

Performance characteristics of virtual switching.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

2013
The Critical Internet Infrastructure (Dagstuhl Seminar 13322).
Dagstuhl Reports, 2013

A forensic case study on as hijacking: the attacker's perspective.
Comput. Commun. Rev., 2013

DTLS based security and two-way authentication for the Internet of Things.
Ad Hoc Networks, 2013

Practical performance evaluation of ethernet networks with flow-level network modeling.
Proceedings of the 7th International Conference on Performance Evaluation Methodologies and Tools, 2013

RENETO, a realistic network traffic generator for OMNeT++/INET.
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013

The missing layer - Virtualizing smart spaces.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Failure coverage in optimal virtual networks.
Proceedings of the 2013 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC), 2013

Adaptive load-aware sampling for network monitoring on multicore commodity hardware.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Enabling sustainable smart neighborhoods.
Proceedings of the Sustainable Internet and ICT for Sustainability, 2013

QoS-aware optimal resilient virtual networks.
Proceedings of IEEE International Conference on Communications, 2013

Shared protection in virtual networks.
Proceedings of the IEEE International Conference on Communications, 2013

Taking smart space users into the development loop: an architecture for community based software development for smart spaces.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Optimal design of virtual networks for resilient cloud services.
Proceedings of the 9th International Conference on the Design of Reliable Communication Networks, 2013

Analysis and topology-based traversal of cascaded large scale NATs.
Proceedings of the 2013 workshop on Hot topics in middleboxes and network function virtualization, 2013

CoMaDa: An adaptive framework with graphical support for Configuration, Management, and Data handling tasks for wireless sensor networks.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Iterative multi-party agreement negotiation for establishing collaborations.
Serv. Oriented Comput. Appl., 2012

Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061).
Dagstuhl Reports, 2012

Charging and Billing in Modern Communications Networks - A Comprehensive Survey of the State of the Art and Future Requirements.
IEEE Commun. Surv. Tutorials, 2012

DIMTOOL: A platform for determining worst case latencies in switched queuing networks.
Proceedings of the 6th International ICST Conference on Performance Evaluation Methodologies and Tools, 2012

Virtual Network Simulator Architecture.
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012

Spring-based geolocation.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Analyzing caching benefits for YouTube traffic in edge networks - A measurement-based evaluation.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Resilient Virtual Network Design for End-to-End Cloud Services.
Proceedings of the NETWORKING 2012, 2012

A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Network Calculus and mixed-integer LP applied to a switched aircraft cabin network.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

Delay Performance of Resilient Cloud Services over Networks.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle.
Proceedings of the Computer Security - ESORICS 2012, 2012

How to prevent AS hijacking attacks.
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 2012

2011
Data collection in future mobile networks.
Telecommun. Syst., 2011

On Using TPM for Secure Identities in Future Home Networks.
Future Internet, 2011

A simple distributed mechanism for accounting system self-configuration in next-generation charging and billing.
Comput. Commun., 2011

Wide-Area Virtual Machine Migration as Resilience Mechanism.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

Securing the internet of things with DTLS.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

Collecting router information for error diagnosis and troubleshooting in home networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Improving Markov-based TCP Traffic Classification.
Proceedings of the 17th GI/ITG Conference on Communication in Distributed Systems, 2011

The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Detecting incidents in wireless mesh networks using flow and routing information.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Investigating the OpenPGP Web of Trust.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
A decentralised service composition approach for peer-to-peer video delivery.
Peer-to-Peer Netw. Appl., 2010

TCP-Verkehrsklassifizierung mit Markov-Modellen.
Prax. Inf.verarb. Kommun., 2010

Lasttransformation durch Rekonstruktion von Auftragslängen anhand von Paketdaten.
Prax. Inf.verarb. Kommun., 2010

Resilience: Widerstandsfähigkeit des Internets gegen Störungen - Stand der Forschung und Entwicklung.
Inform. Spektrum, 2010

TCP Traffic Classification Using Markov Models.
Proceedings of the Traffic Monitoring and Analysis, Second International Workshop, 2010

A secure service infrastructure for interconnecting future home networks based on DPWS and XACML.
Proceedings of the 2010 ACM SIGCOMM workshop on Home networks, 2010

Packet sampling for worm and botnet detection in TCP connections.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Optimized network configuration parameter assignment based on graph coloring.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Policy-driven workflows for mobile network management automation.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Collecting sensor data using compressed IPFIX.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

Comparing and improving current packet capturing solutions based on commodity hardware.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Efficient Protection in Single-Domain Networks Using Network Coding.
Proceedings of the Global Communications Conference, 2010

Gathering Sensor Data in Home Networks with IPFIX.
Proceedings of the Wireless Sensor Networks, 7th European Conference, 2010

2009
Information Model for Packet Sampling Exports.
RFC, March, 2009

Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008.
Comput. Sci. Res. Dev., 2009

IPFIX for wireless sensors in home networks.
Proceedings of the 2nd IFIP Wireless Days, 2009

Knowledge-based middleware for future home networks.
Proceedings of the 2nd IFIP Wireless Days, 2009

An assisted device registration and service access system for future home networks.
Proceedings of the 2nd IFIP Wireless Days, 2009

Data Collection for Heterogeneous Handover Decisions in beyond 3G Networks.
Proceedings of the Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, 2009

Pluggable Authorization and Distributed Enforcement with pam_xacml.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

Graph coloring based physical-cell-ID assignment for LTE networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

ANTS - A Framework for Knowledge Based NAT Traversal.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

On Using Home Networks and Cloud Computing for a Future Internet of Things.
Proceedings of the Future Internet - FIS 2009, Second Future Internet Symposium, 2009

Preventing identity theft with electronic identity cards and the trusted platform module.
Proceedings of the Second European Workshop on System Security, 2009

Cloud computing for the masses.
Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, 2009

2008
Behavior and classification of NAT devices and implications for NAT traversal.
IEEE Netw., 2008

Clustering players for load balancing in virtual worlds.
Int. J. Adv. Media Commun., 2008

Adaptive encryption for the realization of real-time transmission of sensitive medical video streams.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

On the Applicability of Knowledge Based NAT-Traversal for Home Networks.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Towards Autonomic Service Control in Next Generation Networks.
Proceedings of the Fourth International Conference on Autonomic and Autonomous Systems, 2008

Trust-Rated Authentication for Domain-Structured Distributed Systems.
Proceedings of the Public Key Infrastructure, 2008

08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Working Group -- Measurement Requirements.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2007
CoSIP - a hybrid architecture for reliable and secure SIP services.
Prax. Inf.verarb. Kommun., 2007

Internet-Telefonie - Voice over IP.
Prax. Inf.verarb. Kommun., 2007

Wired/wireless internet communications.
Comput. Commun., 2007

Charging in the IP Multimedia Subsystem: A Tutorial.
IEEE Commun. Mag., 2007

Automated Real Time Performance Management for Mobile Networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Automated Trust Negotiation in Autonomic Environments.
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007

CSP, Cooperative Service Provisioning Using Peer-to-Peer Principles.
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007

A cooperative SIP infrastructure for highly reliable telecommunication services.
Proceedings of the Principles, 2007

Real-time Analysis of Flow Data for Network Attack Detection.
Proceedings of the Integrated Network Management, 2007

Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks.
Proceedings of the Global Communications Conference, 2007

Peer-to-Peer-Based Infrastructure Support for Massively Multiplayer Online Games.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Wired/wireless Internet communications.
Comput. Commun., 2006

An architecture for autonomic security adaptation.
Ann. des Télécommunications, 2006

Foreword - Automatic communication towards new paradigms for network adaptation and control.
Ann. des Télécommunications, 2006

Using Netconf for Configuring Monitoring Probes.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

The networking perspective of security performance - A measurement study.
Proceedings of the Proceedings 13th GI/ITG Conference on Measuring, 2006

2005
On the Distribution of Nodes in Distributed Hash Tables.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

04411 Abtracts Collection -- Service Management and Self-Organization in IP-based Networks.
Proceedings of the Service Management and Self-Organization in IP-based Networks, 2005

04411 Preface - Service Management and Self-Organization in IP-based Networks.
Proceedings of the Service Management and Self-Organization in IP-based Networks, 2005

2002
Policy-Based Accounting.
RFC, October, 2002

High Quality IP Video Streaming with Adaptive Packet Marking.
Proceedings of the From QoS Provisioning to QoS Charging, 2002

An MPEG performance model and its application to adaptive forward error correction.
Proceedings of the 10th ACM International Conference on Multimedia 2002, 2002

2001
Intra-flow loss recovery and control for VoIP.
Proceedings of the 9th ACM International Conference on Multimedia 2001, Ottawa, Ontario, Canada, September 30, 2001

Policy-basiertes Metering für IP-Netze.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2001

Deploying an Active Voice Application on a Three-Level Active Network Node Architecture.
Proceedings of the Active Networks, IFIP-TC6 Third International Working Conference, 2001

2000
Adaptive Hybrid Error Control for IP-Based Continuous Media Multicast Services.
Proceedings of the Quality of Future Internet Services, 2000

Panel: Charging for QoS.
Proceedings of the Quality of Future Internet Services, 2000

Active Concealment for Internet Speech Transmission.
Proceedings of the Active Networks, Second International Working Conference, 2000

1999
Charging and Accounting for QoS-Enhanced IP Multicast.
Proceedings of the Protocols for High Speed Networks VI, 1999

Lastabhängige Tarifierung von IP Multicast-Diensten mit Dienstgüteunterstützung.
Proceedings of the Kommunikation in Verteilten Systemen, 1999

A queue management algorithm for intra-flow service differentiation in the "best effort" Internet.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

Policy-Based Billing Architecture for Internet Differentiated Services.
Proceedings of the Broadband Communications: Convergence of Network Technologies, 1999

1998
Dienstqualitätsunterstützung für Audio- und Videodienste im Internet.
Prax. Inf.verarb. Kommun., 1998

How Bad is Reliable Multicast without Local Recovery?
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

RTMC: An Error Control Protocol for IP-based Audio-Visual Multicast Applications.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

Semi-Automated Design of High-Performance Communication Subsystems.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Multipath FEC scheme for the ATM adaptation layer AAL5.
Proceedings of the Broadband Communications: The future of telecommunications, 1998

1997
Zuverlässige Gruppenkommunikationsdienste in ATM-Netzen.
PhD thesis, 1997

Survey of error recovery techniques for IP-based audio-visual multicast applications.
IEEE Netw., 1997

Hochleistungsfähige Implementierung von Protokollen mit zellenbasierten Fehlerkontrollmechanismen für ATM-Netze.
Proceedings of the Kommunikation in Verteilten Systemen, 1997

1995
Framework with Scalable Error Control for Reliable Multipoint Services in ATM Networks.
Proceedings of the International Conference on Multimedia Networking, 1995

Enabling High Bandwidth Applications By High-Performance Multicast Transfer Protocol Processing.
Proceedings of the Data Communications and their Performance, 1995

High performance group communication services in ATM networks.
Proceedings of the High-Speed Networking for Multimedia Applications [2nd Int. Workshop on Architecture and Protocols for High Performance Networks, 1995

1994
Adaption Layer and Group Communication Server for Reliable Multipoint Services in ATM Networks.
Proceedings of the Multimedia: Advanced Teleservices and High-Speed Communication Architectures, 1994

Support for High-Performance Multipoint Multimedia Services.
Proceedings of the Multimedia Transport and Teleservices, 1994


  Loading...