Matthias Hollick

According to our database1, Matthias Hollick authored at least 202 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
HydraWave: Multi-Group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave Communication.
CoRR, 2020

2019
A systematic approach to constructing families of incremental topology control algorithms using graph transformation.
Software and Systems Modeling, 2019

Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol.
GetMobile, 2019

Zero-Interaction Security-Towards Sound Experimental Validation.
GetMobile, 2019

Transitions: A Protocol-Independent View of the Future Internet.
Proceedings of the IEEE, 2019

SCAROS: A Scalable and Robust Self-Backhauling Solution for Highly Dynamic Millimeter-Wave Networks.
IEEE Journal on Selected Areas in Communications, 2019

CBMoS: Combinatorial Bandit Learning for Mode Selection and Resource Allocation in D2D Systems.
IEEE Journal on Selected Areas in Communications, 2019

Perils of Zero-Interaction Security in the Internet of Things.
IMWUT, 2019

Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh.
CoRR, 2019

Hybrid Precoding for Multi-Group Multicasting in mmWave Systems.
CoRR, 2019

Joint Relaying and Spatial Sharing Multicast Scheduling for mmWave Networks.
CoRR, 2019

Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Inside job: diagnosing bluetooth lower layers using off-the-shelf devices.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market.
Proceedings of the Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), 2019

Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
Proceedings of the Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), 2019

A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
Proceedings of the 28th USENIX Security Symposium, 2019

Toxic Friends in Your Network: Breaking the Bluetooth Mesh Friendship Concept.
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019

InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets.
Proceedings of the 13th International Workshop on Wireless Network Testbeds, 2019

The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

JamLab-NG: Benchmarking Low-Power Wireless Protocols under Controllable and Repeatable Wi-Fi Interference.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

Practical VLC to WiFi Handover Mechanisms.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

Towards Transparency in Email Tracking.
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019

2018
An Online Context-Aware Machine Learning Algorithm for 5G mmWave Vehicular Communications.
IEEE/ACM Trans. Netw., 2018

Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
IMWUT, 2018

Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
CoRR, 2018

One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
CoRR, 2018

Survey and Systematization of Secure Device Pairing.
IEEE Communications Surveys and Tutorials, 2018

The Nexmon firmware analysis and modification framework: Empowering researchers to enhance Wi-Fi devices.
Comput. Commun., 2018

Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Fast and Infuriating: Performance and Pitfalls of 60 GHz WLANs Based on Consumer-Grade Hardware.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

TPy: A Lightweight Framework for Agile Distributed Network Experiments.
Proceedings of the 12th International Workshop on Wireless Network Testbeds, 2018

Authenticating the Sector Sweep to Protect Against Beam-Stealing Attacks in IEEE 802.11ad Networks.
Proceedings of the 2nd ACM Workshop on Millimeter Wave Networks and Sensing Systems, 2018

Demo: Channel Estimation and Custom Beamforming on the 60 GHz TP-Link Talon AD7200 Router.
Proceedings of the 12th International Workshop on Wireless Network Testbeds, 2018

Adaptive Codebook Optimization for Beam Training on Off-the-Shelf IEEE 802.11ad Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Conducting a Large-scale Field Test of a Smartphone-based Communication Network for Emergency Response.
Proceedings of the 13th Workshop on Challenged Networks, 2018

Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

FML: Fast Machine Learning for 5G mmWave Vehicular Communications.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Making Wi-Fi Fit for the Tactile Internet: Low-Latency Wi-Fi Flooding Using Concurrent Transmissions.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A systematic approach to constructing incremental topology control algorithms using graph transformation.
J. Vis. Lang. Comput., 2017

Instrumenting Wireless Sensor Networks - A survey on the metrics that matter.
Pervasive and Mobile Computing, 2017

Toward a Taxonomy and Attacker Model for Secure Routing Protocols.
Computer Communication Review, 2017

Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Demonstrating reactive smartphone-based jamming: demo.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

SEMUD: Secure multi-hop device-to-device communication for 5G public safety networks.
Proceedings of the 2017 IFIP Networking Conference, 2017

Reverse Engineering Human Mobility in Large-scale Natural Disasters.
Proceedings of the 20th ACM International Conference on Modelling, 2017

Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
Proceedings of the 1st ACM Workshop on Millimeter-Wave Networks and Sensing Systems, 2017

Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017

Demo: Nexmon in Action: Advanced Applications Powered by the Nexmon Firmware Patching Framework.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017

Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Unsupervised Traffic Flow Classification Using a Neural Autoencoder.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Dynamic role assignment in Software-Defined Wireless Networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Architecture for responsive emergency communications networks.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2017

A practical and secure social media facility for internet-deprived populations.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2017

Emergency communication in challenged environments via unmanned ground and aerial vehicles.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2017

Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.1 lad Devices.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

Opp-relay: Managing directionality and mobility issues of millimeter-wave via D2D communication.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

mm-Wave on wheels: Practical 60 GHz vehicular communication without beam training.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

2016
On the Privacy and Performance of Mobile Anonymous Microblogging.
IEEE Trans. Information Forensics and Security, 2016

NexMon: A Cookbook for Firmware Modifications on Smartphones to Enable Monitor Mode.
CoRR, 2016

Xcastor: Secure and scalable group communication in ad hoc networks.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

DEMO: Using NexMon, the C-based WiFi firmware modification framework.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

STEAN: A storage and transformation engine for advanced networking context.
Proceedings of the 2016 IFIP Networking Conference, 2016

Opportunities and pitfalls in securing visible light communication on the physical layer.
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 2016

Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

mmTrace: Modeling millimeter-wave indoor propagation with image-based ray-tracing.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2016

Competition: Sparkle: Energy Efficient, Reliable, Ultra-low Latency Communication in Wireless Control Networks.
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016

Analyzing TETRA Location Privacy and Network Availability.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security.
IEEE Wireless Commun. Letters, 2015

OFDMA for wireless multihop networks: From theory to practice.
Pervasive and Mobile Computing, 2015

Lightweight energy consumption-based intrusion detection system for wireless sensor networks.
Int. J. Inf. Sec., 2015

Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102).
Dagstuhl Reports, 2015

Ripple: High-throughput, reliable and energy-efficient network flooding in wireless sensor networks.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

APP and PHY in harmony: Demonstrating scalable video streaming supported by flexible physical layer control.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Lockpicking physical layer key exchange: weak adversary models invite the thief.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

A Distributed Reputation System for Certification Authority Trust Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Show me your phone, I will tell you who your friends are: analyzing smartphone data to identify social relationships.
Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, Linz, Austria, November 30, 2015

Can I Help You Setting Your Privacy? A Survey-based Exploration of Users' Attitudes towards Privacy Suggestions.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
Proceedings of the 2nd International Workshop on Visible Light Communications Systems, 2015

Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

APP and PHY in Harmony: A framework enabling flexible physical layer processing to address application requirements.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Corridor-based routing: Constructing and maintaining stable support-structures for wireless multihop transmissions.
Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), 2015

Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Practical covert channels for WiFi systems.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Using Channel State Information for Tamper Detection in the Internet of Things.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Curve-based planar graph routing with guaranteed delivery in multihop wireless networks.
Pervasive and Mobile Computing, 2014

Practical Interference alignment in the frequency domain for OFDM-based wireless access networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

How did you get here? PHY-layer path signatures.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Corridor-based routing: Opening doors to PHY-layer advances for Wireless Multihop Networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Analyzing active probing for practical intrusion detection in Wireless Multihop Networks.
Proceedings of the 11th Annual Conference on Wireless On-demand Network Systems and Services, 2014

Usable Privacy for Mobile Sensing Applications.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Short paper: gathering tamper evidence in wi-fi networks based on channel state information.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Demo: WARP drive - accelerating wireless multi-hop cross-layer experimentation on SDRs.
Proceedings of the 2014 ACM workshop on Software radio implementation forum, 2014

Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Patrolling wireless sensor networks: randomized intrusion detection.
Proceedings of the Q2SWinet'14, 2014

Efficient solutions for the authenticated fragmentation problem in delay- and disruption-tolerant networks.
Proceedings of the 17th ACM International Conference on Modeling, 2014

Building Cross-Layer Corridors in Wireless Multihop Networks.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Measuring the impact of denial-of-service attacks on wireless sensor networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Practical OFDMA for corridor-based routing in Wireless Multihop Networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Dynamic curve adaptation for geographic routing in Wireless Multihop Networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

BER enhancements for practical interference alignment in the frequency domain.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

Making 'Glossy' Networks Sparkle: Exploiting Concurrent Transmissions for Energy Efficient, Reliable, Ultra-Low Latency Communication in Wireless Control Networks.
Proceedings of the Wireless Sensor Networks - 11th European Conference, 2014

2013
IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications.
Pervasive and Mobile Computing, 2013

uSafe: A privacy-aware and participative mobile application for citizen safety in urban environments.
Pervasive and Mobile Computing, 2013

Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications.
Inf. Sec. Techn. Report, 2013

Spatial reuse in OFDMA multi-hop networks applying corridor-based routing.
Proceedings of the 17th International ITG Workshop on Smart Antennas, 2013

A blueprint for switching between secure routing protocols in wireless multihop networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Practical OFDMA in wireless networks with multiple transmitter-receiver pairs.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Node selection for corridor-based routing in OFDMA multihop networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

EVM and RSSI link quality measurements in frequency selective fading channels.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

CSI feedback in OFDMA wireless networks with multiple transmitter-receiver pairs.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

Evaluating dynamic OFDMA subchannel allocation for wireless mesh networks on SDRs.
Proceedings of the second workshop on Software radio implementation forum, 2013

A rapid prototyping framework for practical OFDMA systems using Software Defined Radios.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

Lightweight energy consumption based intrusion detection system for wireless sensor networks.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Raising User Awareness about Privacy Threats in Participatory Sensing Applications through Graphical Warnings.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

Let's talk together: Understanding concurrent transmission in wireless sensor networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

On the efficiency of privacy-preserving path hiding for mobile sensing applications.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Face the Enemy: Attack Detection for Planar Graph Routing.
Proceedings of the 2013 Conference on Networked Systems, 2013

Roadmap for Privacy Protection in Mobile Sensing Applications.
Proceedings of the European Data Protection: Coming of Age, 2013

2012
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
Pervasive and Mobile Computing, 2012

Two-way relaying for multiple applications in wireless sensor networks.
Proceedings of the International ITG Workshop on Smart Antennas, 2012

Tree-based multi-channel convergecast in Wireless Sensor Networks.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Corridor-based routing using opportunistic forwarding in OFDMA multihop networks.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Exploring user preferences for privacy interfaces in mobile sensing applications.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, 2012

Signs of a bad neighborhood: a lightweight metric for anomaly detection in mobile ad hoc networks.
Proceedings of the Q2SWinet'12, 2012

HOPSCOTCH: An adaptive and distributed channel hopping technique for interference avoidance in Wireless Sensor Networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

A secure monitoring and control system for Wireless Sensor Networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Protecting IEEE 802.11s wireless mesh networks against insider attacks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

On the accuracy of appliance identification based on distributed load metering data.
Proceedings of the Sustainable Internet and ICT for Sustainability, 2012

On Data-Centric Intrusion Detection in Wireless Sensor Networks.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
Proceedings of the Seventh International Conference on Availability, 2012

2011
CORE: centrally optimized routing extensions for efficient bandwidth management and network coding in the IEEE 802.16 MeSH mode.
Wireless Communications and Mobile Computing, 2011

A security framework for wireless mesh networks.
Wireless Communications and Mobile Computing, 2011

Bedrohungsanalyse des IEEE 802.11s Standards für drahtlose Mesh-Netze und ausgewählte Sicherheitsmechanismen zur Bedrohungsabwehr.
Praxis der Informationsverarbeitung und Kommunikation, 2011

Neue Herausforderungen in der Netzsicherheit.
Praxis der Informationsverarbeitung und Kommunikation, 2011

A survey on privacy in mobile participatory sensing applications.
Journal of Systems and Software, 2011

Energy-efficient fair channel access for IEEE 802.11 WLANs.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Curve-Based Planar Graph Routing in Multihop Wireless Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Privacy-Preserving Collaborative Path Hiding for Participatory Sensing Applications.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Routing performance of Wireless Mesh Networks: A practical evaluation of BATMAN advanced.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

2010
Vorstellung "neuer" KUVS-naher Fachgebiete. Fachgebiet Sichere Mobile Netze, Fachbereich Informatik, Technische Universität Darmstadt.
Praxis der Informationsverarbeitung und Kommunikation, 2010

On the trade-off between throughput maximization and energy consumption minimization in IEEE 802.11 WLANs.
Journal of Communications and Networks, 2010

Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
Future Internet, 2010

The rise and fall of the AODV protocol: A testbed study on practical routing attacks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, 7th European Conference, 2010

2009
GeoSec: quarantine zones for mobile ad hoc networks.
Security and Communication Networks, 2009

Stream-oriented Lossless Packet Compression in Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Throughput and Energy Efficiency in IEEE 802.11 WLANs: Friends or Foes?.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

A Proportionally Fair Centralized Scheduler Supporting Spatial Minislot Reuse for IEEE 802.16 Mesh Networks.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

On the energy efficiency of lossless data compression in wireless sensor networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Distributed bandwidth reservation strategies to support efficient bandwidth utilization and QoS on a per-link basis in IEEE 802.16 Mesh Networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Incorporating spatial reuse into algorithms for bandwidth management and scheduling in IEEE 802.16j relay networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

On the Implications of Adaptive Transmission Power for Assisting MANET Security.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems.
Proceedings of IEEE International Conference on Communications, 2009

An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Modeling of Self-Organizing Systems.
Praxis der Informationsverarbeitung und Kommunikation, 2008

Adapting the User Context in Realtime: Tailoring Online Machine Learning Algorithms to Ambient Computing.
MONET, 2008

Exploiting Schelling behavior for improving data accessibility in mobile peer-to-peer networks.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

Harnessing delay tolerance to increase delivery ratios in mobile ad hoc networks with misbehaving nodes.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Designing a sensor network testbed for smart heterogeneous applications.
Proceedings of the LCN 2008, 2008

CORE: centrally optimized routing extensions for the IEEE 802.16 MeSH mode.
Proceedings of the LCN 2008, 2008

2007
Der Assistent im Hintergrund: Adaptives Kommunikationsmanagement durch Lernen vom Nutzer.
Praxis der Informationsverarbeitung und Kommunikation, 2007

Dynamische Authentifizierung für Provider-übergreifende VoIP-Kommunikation.
Praxis der Informationsverarbeitung und Kommunikation, 2007

Internet-Telefonie - Voice over IP.
Praxis der Informationsverarbeitung und Kommunikation, 2007

JiST/MobNet: combined simulation, emulation, and real-world testbed for ad hoc networks.
Proceedings of the Second ACM Workshop on Wireless Network Testbeds, 2007

A Case for Joint Routing, Scheduling, and Network Coding in TDMA-based Wireless Mesh Networks: A Cross-layer Approach.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

AntSec, WatchAnt, and AntRep: Innovative Security Mechanisms for Wireless Mesh Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007

2006
Modeling static and dynamic behavior of routes in mobile ad hoc networks.
Mobile Computing and Communications Review, 2006

Research challenges in QoS routing.
Comput. Commun., 2006

Performance Analysis of the Real-time Capabilities of Coordinated Centralized Scheduling in 802.16 Mesh Mode.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

A survey on realworld and emulation testbeds for mobile ad hoc networks.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

2005
M^2 DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Establishing P2P-Overlays for Ad Hoc Networks Using Provider Subscription.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

2004
Modeling mobility and workload for wireless metropolitan area networks.
Comput. Commun., 2004

The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

On the effect of node misbehavior in ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004

A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
Comparative Analysis of Quality of Service Routing in Wireless Metropolitan Area Networks.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

Per-flow guarantees under class-based priority queueing.
Proceedings of the Global Telecommunications Conference, 2003

2001
Security awareness in service discovery for multimedia collaboration.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001

Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000.
Proceedings of the Innovative Anwendungen in Kommunikationsnetzen, 2001

Secure Service Centered Networking for Nomadic Usage.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001


  Loading...