Stefan Dietzel

According to our database1, Stefan Dietzel authored at least 40 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Push the Barrier: Discrete Event Protocol Emulation.
IEEE/ACM Trans. Netw., 2019

Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems.
IEEE Communications Surveys and Tutorials, 2019

Prioritize efficiently: Layer selection in network coding.
Computer Communications, 2019

2018
Privacy of Connected Vehicles.
Proceedings of the Handbook of Mobile Data Privacy., 2018

Misbehavior Detection in Industrial Wireless Networks: Challenges and Directions.
MONET, 2018

RuleBender: Tree-based policy transformations for practical packet classification systems.
Computer Networks, 2018

Poster: Impact of Prioritized Network Coding on Sensor Data Collection in Smart Factories.
Proceedings of the 17th International IFIP TC6 Networking Conference, 2018

Hierarchical Layer Selection with Low Overhead in Prioritized Network Coding.
Proceedings of the 17th International IFIP TC6 Networking Conference, 2018

Together We are Strong: Securing Industrial Wireless Networks with Overhearing Nodes.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Anonymous Datagrams over DNS Records.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

2017
Effective Lossless Compression of Sensor Information in Manufacturing Industry.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

ANONUS: Anonymous Bonus Point System with Fraud Detection.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

TANDEM: Prioritizing Wireless Communication for Robust Industrial Process Control.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Challenges of Misbehavior Detection in Industrial Wireless Networks.
Proceedings of the Ad Hoc Networks, 2017

2016
ANOTEL: Cellular Networks with Location Privacy (Extended Version).
IACR Cryptology ePrint Archive, 2016

Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems.
CoRR, 2016

A resilient in-network aggregation mechanism for VANETs based on dissemination redundancy.
Ad Hoc Networks, 2016

Best of Both Worlds: Prioritizing Network Coding without Increased Space Complexity.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

ANOTEL: Cellular Networks with Location Privacy.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Towards More Realistic Network Simulations: Leveraging the System-Call Barrier.
Proceedings of the Ad Hoc Networks - 8th International Conference, 2016

2015
Resilient in-network aggregation for vehicular networks.
PhD thesis, 2015

Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Context-adaptive detection of insider attacks in VANET information dissemination schemes.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

INFLATE: Incremental wireless transmission for sensor information in industrial environments.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

2014
In-Network Aggregation for Vehicular Ad Hoc Networks.
IEEE Communications Surveys and Tutorials, 2014

A flexible, subjective logic-based framework for misbehavior detection in V2V networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

2013
Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols.
IEEE Trans. Vehicular Technology, 2013

SeDyA: secure dynamic aggregation in VANETs.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Short paper: Towards data-similarity-based clustering for inter-vehicle communication.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

2012
Analyzing dissemination redundancy to achieve data consistency in VANETs.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

Privacy context model for dynamic privacy adaptation in ubiquitous computing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

2011
WiSec 2011 demo: PRECIOSA PeRA - practical enforcement of privacy policies in intelligent transportation systems.
Mobile Computing and Communications Review, 2011

Modeling in-network aggregation in VANETs.
IEEE Communications Magazine, 2011

2010
Resilient secure aggregation for vehicular networks.
IEEE Network, 2010

On the potential of generic modeling for VANET data aggregation protocols.
Proceedings of the Second IEEE Vehicular Networking Conference, 2010

Dependable and secure geocast in vehicular networks.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010

Mandatory Enforcement of Privacy Policies using Trusted Computing Principles.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
A fuzzy logic based approach for structure-free aggregation in vehicular ad-hoc networks.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009

Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009


  Loading...