Rens W. van der Heijden

Orcid: 0000-0003-3280-1825

Affiliations:
  • University of Ulm, Institute of Distributed Systems, Germany


According to our database1, Rens W. van der Heijden authored at least 25 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Risk Prediction of IoT Devices Based on Vulnerability Analysis.
ACM Trans. Priv. Secur., 2022

2020
Securing CACC: Strategies for Mitigating Data Injection Attacks.
Proceedings of the IEEE Vehicular Networking Conference, 2020

Message Type Identification of Binary Network Protocols using Continuous Segment Similarity.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

VeReMi Extension: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems.
IEEE Commun. Surv. Tutorials, 2019

2018
Misbehavior Detection in Cooperative Intelligent Transport Systems.
Proceedings of the Ausgezeichnete Informatikdissertationen 2018., 2018

Misbehavior detection in cooperative intelligent transport systems.
PhD thesis, 2018

Robust Detection of Anomalous Driving Behavior.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs.
Proceedings of the Security and Privacy in Communication Networks, 2018

Multi-Source Fusion Operations in Subjective Logic.
Proceedings of the 21st International Conference on Information Fusion, 2018

2017
Analyzing attacks on cooperative adaptive cruise control (CACC).
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Blackchain: scalability for resource-constrained accountable vehicle-to-x communication.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017

An Extensible Host-Agnostic Framework for SDN-Assisted DDoS-Mitigation.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

2016
Enhanced Position Verification for VANETs Using Subjective Logic.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Exploiting propagation effects for authentication and misbehavior detection in VANETs.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

Mobile triage management in disaster area networks using decentralized replication.
Proceedings of the Eleventh ACM Workshop on Challenged Networks, 2016

A Comparison of TCP Congestion Control Algorithms in 10G Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

2015
Context-adaptive detection of insider attacks in VANET information dissemination schemes.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Formal Verification of Privacy Properties in Electric Vehicle Charging.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

2014
Insights on the Security and Dependability of Industrial Control Systems.
IEEE Secur. Priv., 2014

A flexible, subjective logic-based framework for misbehavior detection in V2V networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Dynamic packet-filtering in high-speed networks using NetFPGAs.
Proceedings of the Third International Conference on Future Generation Communication Technologies (FGCT 2014), 2014

2013
SeDyA: secure dynamic aggregation in VANETs.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013


  Loading...