Marius Portmann

Orcid: 0000-0003-1852-3961

According to our database1, Marius Portmann authored at least 132 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Benchmarking the benchmark - Comparing synthetic and real-world Network IDS datasets.
J. Inf. Secur. Appl., February, 2024

2023
Efficient block contrastive learning via parameter-free meta-node approximation.
Neurocomputing, December, 2023

Exploring edge TPU for network intrusion detection in IoT.
J. Parallel Distributed Comput., September, 2023

Inspection-L: self-supervised GNN node embeddings for money laundering detection in bitcoin.
Appl. Intell., August, 2023

XG-BoT: An explainable deep graph neural network for botnet detection and forensics.
Internet Things, July, 2023

HARBIC: Human activity recognition using bi-stream convolutional neural network with dual joint time-frequency representation.
Internet Things, July, 2023

Exploring Edge TPU for deep feed-forward neural networks.
Internet Things, July, 2023

Light-Weight ML Aided Autonomous IoT Networks.
IEEE Commun. Mag., June, 2023

Explainable Cross-domain Evaluation of ML-based Network Intrusion Detection Systems.
Comput. Electr. Eng., May, 2023

DI-NIDS: Domain invariant network intrusion detection system.
Knowl. Based Syst., 2023

Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection.
J. Netw. Syst. Manag., 2023

From zero-shot machine learning to zero-day attack detection.
Int. J. Inf. Sec., 2023

FlowTransformer: A Transformer Framework for Flow-based Network Intrusion Detection Systems.
CoRR, 2023

Energy Aware Smart Sensing and Implementation in Green Air Pollution Monitoring System.
Proceedings of the IEEE International Conference on Communications, 2023

DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly Detection.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
Local Reference-Free In-Field Calibration of Low-Cost Air Pollution Monitoring Sensors.
IEEE Trans. Instrum. Meas., 2022

Edge Intelligence Framework for Data-Driven Dynamic Priority Sensing and Transmission.
IEEE Trans. Green Commun. Netw., 2022

Towards a Standard Feature Set for Network Intrusion Detection System Datasets.
Mob. Networks Appl., 2022

Anomal-E: A self-supervised network intrusion detection system based on graph neural networks.
Knowl. Based Syst., 2022

NBC-Softmax : Darkweb Author fingerprinting and migration tracking.
CoRR, 2022

XG-BoT: An Explainable Deep Graph Neural Network for Botnet Detection and Forensics.
CoRR, 2022

On Generalisability of Machine Learning-based Network Intrusion Detection Systems.
CoRR, 2022

SCGC : Self-Supervised Contrastive Graph Clustering.
CoRR, 2022

Inspection-L: Practical GNN-Based Money Laundering Detection System for Bitcoin.
CoRR, 2022

HBFL: A hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection.
Comput. Electr. Eng., 2022

Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-Based Network Intrusion Detection.
Big Data Res., 2022

E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Network Intrusion Detection System in a Light Bulb.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022

Graph Neural Network-based Android Malware Classification with Jumping Knowledge.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

FDGATII: Fast Dynamic Graph Attention with Initial Residual and Identity.
Proceedings of the AI 2022: Advances in Artificial Intelligence, 2022

2021
P-SCOR: Integration of Constraint Programming Orchestration and Programmable Data Plane.
IEEE Trans. Netw. Serv. Manag., 2021

Task Scheduling for Energy-Harvesting-Based IoT: A Survey and Critical Analysis.
IEEE Internet Things J., 2021

FDGATII : Fast Dynamic Graph Attention with Initial Residual and Identity Mapping.
CoRR, 2021

Exploring Deep Neural Networks on Edge TPU.
CoRR, 2021

Feature Analysis for ML-based IIoT Intrusion Detection.
CoRR, 2021

Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks.
CoRR, 2021

Benchmarking the Benchmark - Analysis of Synthetic NIDS Datasets.
CoRR, 2021

An Explainable Machine Learning-based Network Intrusion Detection System for Enabling Generalisability in Securing IoT Networks.
CoRR, 2021

E-GraphSAGE: A Graph Neural Network based Intrusion Detection System.
CoRR, 2021

Towards a Standard Feature Set of NIDS Datasets.
CoRR, 2021

Deep learning-based cattle behaviour classification using joint time-frequency data representation.
Comput. Electron. Agric., 2021

SolAR: Energy Positive Human Activity Recognition using Solar Cells.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications, 2021

Scaling Spectrogram Data Representation for Deep Learning on Edge TPU.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Learning-based Smart Sensing for Energy-Sustainable WSN.
Proceedings of the ICC 2021, 2021

FlowGAN - Synthetic Network Flow Generation using Generative Adversarial Networks.
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021

2020
MAC-layer rate control for 802.11 networks: a survey.
Wirel. Networks, 2020

Joint QoS-control and handover optimization in backhaul aware SDN-based LTE networks.
Wirel. Networks, 2020

Network traffic control for multi-homed end-hosts via SDN.
IET Commun., 2020

Deep Learning-based Cattle Activity Classification Using Joint Time-frequency Data Representation.
CoRR, 2020

NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems.
Proceedings of the Big Data Technologies and Applications, 2020

Towards Optimal Kinetic Energy Harvesting for the Batteryless IoT.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020

Towards Energy Positive Sensing using Kinetic Energy Harvesters.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications, 2020

2019
The (In)Security of Virtualization in Software Defined Networks.
IEEE Access, 2019

A Model for Reliable Uplink Transmissions in LoRaWAN.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

2018
MAC-Layer Rate Control for 802.11 Networks: Lesson Learned and Looking Forward.
CoRR, 2018

R2Lab Testbed Evaluation for Wireless Mesh Network Experiments.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

Experimental Evaluation of LoRaWAN in NS-3.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

Enhancing Quality of Experience of VoIP Traffic in SDN based End-hosts.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

2017
Experimental evaluation of the impact of DoS attacks in SDN.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Flow-based load balancing of web traffic using OpenFlow.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Backhaul, QoS, and channel-aware load balancing optimization in SDN-based LTE networks.
Proceedings of the 11th International Conference on Signal Processing and Communication Systems, 2017

2016
An Efficient Hybrid MANET-DTN Routing Scheme for OLSR.
Wirel. Pers. Commun., 2016

Modelling and verifying the AODV routing protocol.
Distributed Comput., 2016

SCOR: Software-defined Constrained Optimal Routing Platform for SDN.
CoRR, 2016

Efficient topology discovery in OpenFlow-based Software Defined Networks.
Comput. Commun., 2016

Pushing SDN to the end-host, network load balancing using OpenFlow.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Securing ARP in Software Defined Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Evaluation of Mininet-WiFi integration via ns-3.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

SCOR: Constraint Programming-based Northbound Interface for SDN.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

SProxy ARP - efficient ARP handling in SDN.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

A system-level architecture for software-defined LTE networks.
Proceedings of the 10th International Conference on Signal Processing and Communication Systems, 2016

Link capacity estimation in SDN-based end-hosts.
Proceedings of the 10th International Conference on Signal Processing and Communication Systems, 2016

2015
Modelling and Analysis of AODV in UPPAAL.
CoRR, 2015

The (in)security of Topology Discovery in Software Defined Networks.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Link capacity estimation in wireless software defined networks.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

2014
Multi-Source-Destination Distributed Wireless Networks: Pareto-Efficient Dynamic Power Control Game With Rapid Convergence.
IEEE Trans. Veh. Technol., 2014

Editorial.
Pervasive Mob. Comput., 2014

Analytical model for approximating node throughputs in wireless mesh networks.
Int. J. Commun. Syst., 2014

Development of Collaborative Video Streaming for Mobile Networks: From Overview to Prototype.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

2013
A Process Algebra for Wireless Mesh Networks used for Modelling, Verifying and Analysing AODV.
CoRR, 2013

Specification versus reality: Experimental evaluation of link capacity estimation in IEEE 802.11.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

VoIP Spam Prevention.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Towards efficient opportunistic communications: A hybrid approach.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Sequence numbers do not guarantee loop freedom: AODV can yield routing loops.
Proceedings of the 16th ACM International Conference on Modeling, 2013

A performance study of hybrid protocols for opportunistic communications.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Protocol for efficient opportunistic communication.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Stochastic Local Search Based Channel Assignment in Wireless Mesh Networks.
Proceedings of the Principles and Practice of Constraint Programming, 2013

2012
Experimental evaluation of measurement-based SINR interference models.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

SNR-Based Link Quality Estimation.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Automated Analysis of AODV Using UPPAAL.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Share your view: Wireless multi-hop video streaming using Android phones.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

A rigorous analysis of AODV and its variants.
Proceedings of the 15th ACM International Conference on Modeling, 2012

Robust MAC-layer rate control mechanism for 802.11 wireless networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Time-based and low-cost bandwidth estimation for IEEE 802.11 links.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

A Process Algebra for Wireless Mesh Networks.
Proceedings of the Programming Languages and Systems, 2012

2011
Insecurity in Public-Safety Communications: APCO Project 25.
Proceedings of the Security and Privacy in Communication Networks, 2011

Analysis of link break detection using HELLO messages.
Proceedings of the 14th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2011

A Systematic Evaluation of Interference Characteristics in 802.11-Based Wireless Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
MeshVision: an adaptive wireless mesh network video surveillance system.
Multim. Syst., 2010

Evaluating Adjacent Channel Interference in IEEE 802.11 Networks.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

Adaptive Wireless Mesh Networks Routing Protocols.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

Evaluation of commercial wireless mesh technologies in a public safety context: Methodology, analysis and experience.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

The Insecurity of Time-of-Arrival Distance-Ranging in IEEE 802.11 Wireless Networks.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

2009
SafeMesh: A wireless mesh network routing protocol for incident area communications.
Pervasive Mob. Comput., 2009

AODV-HM: A Hybrid Mesh Ad-hoc On-demand Distance Vector Routing Protocol.
J. Res. Pract. Inf. Technol., 2009

MeshVision: An Adaptive Wireless Mesh Network Video Surveillance System.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

A software-defined radio receiver for APCO project 25 signals.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

ALARM: An Adaptive Load-Aware Routing Metric for Hybrid Wireless Mesh Networks.
Proceedings of the Computer Science 2009, 2009

2008
Wireless Mesh Networks for Public Safety and Crisis Management Applications.
IEEE Internet Comput., 2008

Securing Wireless Mesh Networks.
IEEE Internet Comput., 2008

Performance analysis of multi-radio AODV in hybrid wireless mesh networks.
Comput. Commun., 2008

A light-weight internet gateway discovery scheme for infrastructure mesh networks.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

Context-aware routing in wireless mesh networks.
Proceedings of the 2nd ACM International Conference on Context-Awareness for Self-Managing Systems, 2008

HOVER: hybrid on-demand distance vector routing for wireless mesh networks.
Proceedings of the Computer Science 2008, 2008

Challenges and recent advances in QoS provisioning in wireless mesh networks.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
High Performance AODV Routing Protocol for Hybrid Wireless Mesh Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

A Light-Weight Client Mobility Approach for Infrastructure Mesh Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Congestion Aware Routing in Hybrid Wireless Mesh Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Multi-Linked AODV Routing Protocol for Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007

Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol.
Proceedings of the Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30, 2007

2006
Context-Enhanced Authentication for Infrastructureless Network Environments.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Evaluation of multi-radio extensions to AODV for wireless mesh networks.
Proceedings of the Forth ACM International Workshop on Mobility Management & Wireless Access, 2006

Performance Comparison of Multi-Path AODV and DSR Protocols in Hybrid Mesh Networks.
Proceedings of the 14th IEEE International Conference on Networks, 2006

2005
A Programmable Structured Peer-to-Peer Overlay.
Proceedings of the Active and Programmable Networks, 2005

2004
Mitigating Routing Misbehav.
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004

PROST: A Programmable Structured Peer-to-Peer Overlay Network.
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

2003
MARCH: A distributed content adaptation architecture.
Int. J. Commun. Syst., 2003

Cost-effective broadcast for fully decentralized peer-to-peer networks.
Comput. Commun., 2003

2002
The cost of application-level broadcast in a fully decentralized peer-to-peer network.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

2001
The cost of peer discovery and searching in the Gnutella peer-to-peer file sharing protocol.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

Selective security for TLS.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001


  Loading...