Thomas Engel

Orcid: 0000-0002-7374-3927

Affiliations:
  • University of Luxembourg, SnT Centre
  • Institute for Telematics, Trier, Germany


According to our database1, Thomas Engel authored at least 293 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure.
Proc. Priv. Enhancing Technol., January, 2024

2023
A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., September, 2023

Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance.
Proc. Priv. Enhancing Technol., July, 2023

Experience: Differentiating Between Isolated and Sequence Missing Data.
ACM J. Data Inf. Qual., June, 2023

On-Demand Security Framework for 5GB Vehicular Networks.
IEEE Internet Things Mag., June, 2023

5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities.
IEEE Internet Things Mag., March, 2023

A Survey on Controller Area Network Reverse Engineering.
IEEE Commun. Surv. Tutorials, 2023

A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks.
IEEE Commun. Surv. Tutorials, 2023

An Intrusion Detection System Against Rogue Master Attacks on gPTP.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Assessing the Impact of Attacks on an Automotive Ethernet Time Synchronization Testbed.
Proceedings of the IEEE Vehicular Networking Conference, 2023

Evaluation of PTP Security Controls on gPTP.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Reinforcement Learning-Based Security Orchestration for 5G-V2X Network Slicing at Cross-Borders.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Dataset for "Adaptive Content Seeding for Information-Centric Networking under High Topology Dynamics".
Dataset, May, 2022

MQTT-MFA: A Message Filter Aggregator to Support Massive IoT Traffic Over Satellite.
IEEE Internet Things J., 2022

k-Pareto Optimality-Based Sorting with Maximization of Choice and Its Application to Genetic Optimization.
Algorithms, 2022

Federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing.
Ann. des Télécommunications, 2022

The Impact of Distributed Data Preprocessing on Automotive Data Streams.
Proceedings of the 96th Vehicular Technology Conference, 2022

Deep Learning-based Intra-slice Attack Detection for 5G-V2X Sliced Networks.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Federated Learning-based Inter-slice Attack Detection for 5G-V2X Sliced Networks.
Proceedings of the 96th Vehicular Technology Conference, 2022

Transforming IoT Data Preprocessing: A Holistic, Normalized and Distributed Approach.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Preventing Frame Fingerprinting in Controller Area Network Through Traffic Mutation.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

On Frame Fingerprinting and Controller Area Networks Security in Connected Vehicles.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Towards Normalizing The Design Phase of Data Preprocessing Pipelines For IoT Data.
Proceedings of the IEEE International Conference on Big Data, 2022

k-Pareto Optimality-Based Sorting with Maximization of Choice.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

2021
Adaptive Content Seeding for Information-Centric Networking Under High Topology Dynamics: Where You Seed Matters.
IEEE Veh. Technol. Mag., 2021

CANMatch: A Fully Automated Tool for CAN Bus Reverse Engineering Based on Frame Matching.
IEEE Trans. Veh. Technol., 2021

Consortium Blockchain for Cooperative Location Privacy Preservation in 5G-Enabled Vehicular Fog Computing.
IEEE Trans. Veh. Technol., 2021

Causal Identification with Additive Noise Models: Quantifying the Effect of Noise.
CoRR, 2021

Evaluation of TPMS Signal Propagation in a Heavy Commercial Vehicle Environement.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

A Near-Field-based TPMS Solution for Heavy Commercial Vehicle Environement.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Poster: A Methodology for Semi-Automated CAN Bus Reverse Engineering.
Proceedings of the 13th IEEE Vehicular Networking Conference, 2021

Intelligent Misbehavior Detection System for Detecting False Position Attacks in Vehicular Networks.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

<i>k</i>-Pareto optimality for many-objective genetic optimization.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

The Effect of Noise Level on the Accuracy of Causal Discovery Methods with Additive Noise Models.
Proceedings of the Artificial Intelligence and Machine Learning, 2021

2020
A multi-hop broadcast wave approach for floating car data collection in vehicular networks.
Veh. Commun., 2020

How Road and Mobile Networks Correlate: Estimating Urban Traffic Using Handovers.
IEEE Trans. Intell. Transp. Syst., 2020

Software-Defined Location Privacy Protection for Vehicular Networks.
CoRR, 2020

SDN-based Misbehavior Detection System for Vehicular Networks.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Analyzing PeerFlow - A Bandwidth Estimation System for Untrustworthy Environments.
Proceedings of the Sicherheit 2020, Sicherheit, 2020

Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Locust: Highly Concurrent DHT Experimentation Framework for Security Evaluations.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

Enhancing CoAP Group Communication to Support mMTC Over Satellite Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Toward an SDN-based Data Collection Scheme for Vehicular Fog Computing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

A Data-Driven Minimal Approach for CAN Bus Reverse Engineering.
Proceedings of the 3rd IEEE Connected and Automated Vehicles Symposium, 2020

Synchronized Preprocessing of Sensor Data.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Tracking Without Traces - Fingerprinting in an Era of Individualism and Complexity.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

2019
Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems.
EAI Endorsed Trans. Security Safety, 2019

SDN-based Pseudonym-Changing Strategy for Privacy Preservation in Vehicular Networks.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

IoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Experimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Multi-Flow Congestion-Aware Routing in Software-Defined Vehicular Networks.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Fog Seeding Strategies for Information-Centric Heterogeneous Vehicular Networks.
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019

Fog computing as the key for seamless connectivity handover in future vehicular networks.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection.
Proceedings of the 10th International Conference on Networks of the Future, 2019

VPGA: An SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Analysis of Multi-path Onion Routing-Based Anonymization Networks.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

POSTER: Traffic Splitting to Counter Website Fingerprinting.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Driving simulator studies at home: promises, potholes, and pitfalls.
Proceedings of the Adjunct Proceedings of the 11th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2019

Performance Analysis of MANET Routing Protocols in Urban VANETs.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2019

2018
Aggregation of MQTT Topics over Integrated Satellite-Terrestrial Networks.
SIGMETRICS Perform. Evaluation Rev., 2018

A Multi-Pronged Approach to Adaptive and Context Aware Content Dissemination in VANETs.
Mob. Networks Appl., 2018

The state of affairs in BGP security: A survey of attacks and defenses.
Comput. Commun., 2018

WLAN Device Fingerprinting using Channel State Information (CSI).
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Poster: Performance Evaluation of an Open-Source Audio-Video Bridging/Time-Sensitive Networking Testbed for Automotive Ethernet.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Non-intrusive Distracted Driving Detection based on Driving Sensing Data.
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018

Machine Learning for Reliable Network Attack Detection in SCADA Systems.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Advancing the Security of Trustworthy Self-IoT.
Proceedings of the International Conference on Smart Communications and Networking, 2018

Revisiting Gaussian Mixture Models for Driver Identification.
Proceedings of the 2018 IEEE International Conference on Vehicular Electronics and Safety, 2018

Performance Analysis of CoAP under Satellite Link Disruption.
Proceedings of the 25th International Conference on Telecommunications, 2018

ROADNET: Fairness- and Throughput-Enhanced Scheduling for Content Dissemination in VANETs.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Multi-Access Edge Computing for Vehicular Networks: A Position Paper.
Proceedings of the IEEE Globecom Workshops, 2018

IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

2017
Smartphone-Based Adaptive Driving Maneuver Detection: A Large-Scale Evaluation Study.
IEEE Trans. Intell. Transp. Syst., 2017

Luxembourg SUMO Traffic (LuST) Scenario: Traffic Demand Evaluation.
IEEE Intell. Transp. Syst. Mag., 2017

Testing a Commercial BCI Device for In-Vehicle Interfaces Evaluation: A Simulator and Real-World Driving Study.
Int. J. Mob. Comput. Multim. Commun., 2017

Characterizing user mobility using mobile sensing systems.
Int. J. Distributed Sens. Networks, 2017

Understanding the social impact of ICN: between myth and reality.
AI Soc., 2017

Analysis of Fingerprinting Techniques for Tor Hidden Services.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Poster: Characterizing driving behaviors through a car simulation platform.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Demo: MAMBA: A platform for personalised multimodal trip planning.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

How mobile phone handovers reflect urban mobility: A simulation study.
Proceedings of the 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, 2017

An efficient service channel allocation scheme in SDN-enabled VANETs.
Proceedings of the 16th Annual Mediterranean Ad Hoc Networking Workshop, 2017

Towards a real-time driver identification mechanism based on driving sensing data.
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017

Estimating urban road traffic states using mobile network signaling data.
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017

Coordination mechanisms for floating content in realistic vehicular scenario.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Characterizing driving environments through Bluetooth discovery.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

A centralized approach for setting floating content parameters in VANETs.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

What We Can Learn from Pilots for Handovers and (De)Skilling in Semi-Autonomous Driving: An Interview Study.
Proceedings of the 9th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2017

2016
Enabling SDN in VANETs: What is the Impact on Security?
Sensors, 2016

Internet of Things in the 5G Era: Enablers, Architecture, and Business Models.
IEEE J. Sel. Areas Commun., 2016

A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Bluetooth Low Energy performance and robustness analysis for Inter-Vehicular Communications.
Ad Hoc Networks, 2016

Poster: LuST-LTE: A simulation package for pervasive vehicular connectivity.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

Towards characterizing Bluetooth discovery in a vehicular context.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

Human Mobility Profiling Using Privacy-Friendly Wi-Fi and Activity Traces: Demo Abstract.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

A generic framework to support application-level flow management in software-defined networks.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Website Fingerprinting at Internet Scale.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Towards privacy-neutral travel time estimation from mobile phone signalling data.
Proceedings of the IEEE International Smart Cities Conference, 2016

Toward a characterization of human activities using smart devices: A micro/macro approach.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Understanding user daily mobility using mobile and wearable sensing systems.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

Flexible State-Merging for Learning (P)DFAs in Python.
Proceedings of the 13th International Conference on Grammatical Inference, 2016

Not a tile out of place: Toward creating context-dependent user interfaces on smartglasses.
Proceedings of the 9th International Conference on Human System Interactions, 2016

Heat is in the eye of the beholder: Towards better authenticating on smartglasses.
Proceedings of the 9th International Conference on Human System Interactions, 2016

Towards the Propagation of Model Updates along different Views in Multi-View Models.
Proceedings of the 5th International Workshop on Bidirectional Transformations, 2016

POSTER: Fingerprinting Tor Hidden Services.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

You Never Forget How to Drive: Driver Skilling and Deskilling in the Advent of Autonomous Vehicles.
Proceedings of the 8th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2016

Towards A Taxonomy of Autonomous Vehicle Handover Situations.
Proceedings of the 8th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2016

Content and Context Aware Strategies for QoS Support in VANETs.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

SDN Coordination for CCN and FC Content Dissemination in VANETs.
Proceedings of the Ad Hoc Networks - 8th International Conference, 2016

2015
Enabling vehicular mobility in city-wide IEEE 802.11 networks through predictive handovers.
Veh. Commun., 2015

Model synchronization based on triple graph grammars: correctness, completeness and invertibility.
Softw. Syst. Model., 2015

Driver Behavior Profiling Using Smartphones: A Low-Cost Platform for Driver Monitoring.
IEEE Intell. Transp. Syst. Mag., 2015

Luxembourg SUMO Traffic (LuST) Scenario: 24 hours of mobility for vehicular networking research.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

A Formalization of Fingerprinting Techniques.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Validation study of risky event classification using driving pattern factors.
Proceedings of the 2015 IEEE Symposium on Communications and Vehicular Technology in the Benelux, 2015

SDN-RADAR: Network troubleshooting combining user experience and SDN capabilities.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Asymmetry Analysis of Inbound/Outbound Car Traffic Load distribution in Luxembourg.
Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access, 2015

Adaptive Activity and Context Recognition Using Multimodal Sensors in Smart Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2015

A policy-based per-flow mobility management system design.
Proceedings of the Principles, Systems and Applications on IP Telecommunications, 2015

A characterization of short-video and distributed hot-spot activity in Instagram.
Proceedings of the Principles, Systems and Applications on IP Telecommunications, 2015

Network troubleshooting with SDN-RADAR.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Text entry on smart glasses.
Proceedings of the 8th International Conference on Human System Interaction, 2015

Comparison of active proximity radars for the wearable devices.
Proceedings of the 8th International Conference on Human System Interaction, 2015

A Car Hacking Experiment: When Connectivity Meets Vulnerability.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

On Using Cognition for Anomaly Detection in SDN.
Proceedings of the EVOLVE, 2015

6TiSCH centralized scheduling: When SDN meet IoT.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2015

Hacker's toolbox: Detecting software-based 802.11 evil twin access points.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

MaDSAV: maintaining driving skills in semi-autonomous vehicles.
Proceedings of the Adjunct Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2015

Towards Reinventing Online Privacy.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

2014
PhishStorm: Detecting Phishing With Streaming Analytics.
IEEE Trans. Netw. Serv. Manag., 2014

Device-Free Indoor Localization Based on Ambient FM Radio Signals.
Int. J. Ambient Comput. Intell., 2014

Bluetooth Low Energy: An alternative technology for VANET applications.
Proceedings of the 11th Annual Conference on Wireless On-demand Network Systems and Services, 2014

Bluetooth low energy for inter-vehicular communications.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Towards Domain Completeness for Model Transformations Based on Triple Graph Grammars.
Proceedings of the Third International Workshop on Verification of Model Transformations co-located with Software Technologies: Applications and Foundations, 2014

Solving the FIXML2Code-case Study with HenshinTGG.
Proceedings of the 7th Transformation Tool Contest part of the Software Technologies: Applications and Foundations (STAF 2014) federation of conferences, 2014

RAMSES: Revealing Android Malware Through String Extraction and Selection.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Magnetic interaction with devices: a pilot study on mobile gaming.
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014

Tracking spoofed locations in crowdsourced vehicular applications.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Undesired relatives: protection mechanisms against the evil twin attack in IEEE 802.11.
Proceedings of the Q2SWinet'14, 2014

Traffic routing in urban environments: The impact of partial information.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

Analysis of large call data records with big data.
Proceedings of the Conference on Principles, 2014

Spatial and temporal analysis of Twitter: a tale of two countries.
Proceedings of the Conference on Principles, 2014

Network security through software defined networking: a survey.
Proceedings of the Conference on Principles, 2014

A Cooperative Advanced Driver Assistance System to mitigate vehicular traffic shock waves.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Triple Graph Grammars in the Large for Translating Satellite Procedures.
Proceedings of the Theory and Practice of Model Transformations, 2014

An event-driven inter-vehicle communication protocol to attenuate vehicular shock waves.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Using opcode-sequences to detect malicious Android applications.
Proceedings of the IEEE International Conference on Communications, 2014

Towards a new way of reliable routing: Multiple paths over ARCs.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Implications and detection of DoS attacks in OpenFlow-based networks.
Proceedings of the IEEE Global Communications Conference, 2014

PhishScore: Hacking phishers' minds.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Making historical connections: Building Application Layer Traffic Optimization (ALTO) network and cost maps from public broadband data.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

A Big Data Architecture for Large Scale Security Monitoring.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
Predictable Mobile Routing for Spacecraft Networks.
IEEE Trans. Mob. Comput., 2013

On the evaluation of make-before-break handovers in urban WiFi networks for moving vehicles.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

MROAD: Scanning-free model-based roaming for 802.11 networks under vehicular mobility.
Proceedings of the IFIP Wireless Days, 2013

A study of urban IEEE 802.11 hotspot networks: towards a community access network.
Proceedings of the IFIP Wireless Days, 2013

CCN traffic optimization for IoT.
Proceedings of the Fourth International Conference on the Network of the Future, 2013

Symbolic Execution of Satellite Control Procedures in Graph-Transformation-Based EMF Ecosystems.
Proceedings of the 10th International Workshop on Model Driven Engineering, 2013

Correctness and Completeness of Generalised Concurrent Model Synchronisation Based on Triple Graph Grammars.
Proceedings of the Second Workshop on the Analysis of Model Transformations (AMT 2013), 2013

Towards Bidirectional Engineering of Satellite Control Procedures Using Triple Graph Grammars.
Proceedings of the 7th Workshop on Multi-Paradigm Modeling co-located with the 16th International Conference on Model Driven Engineering Languages and Systems, 2013

Energy-Efficient Rate-Adaptive Passive Traffic Sensing using smartphones.
Proceedings of the 12th Annual Mediterranean Ad Hoc Networking Workshop, 2013

Path Extension Analysis of Peer-to-Peer Communications in Small 6LoWPAN/RPL Sensor Networks.
Proceedings of the 2013 IEEE 21st International Symposium on Modelling, 2013

Multi-dimensional aggregation for DNS monitoring.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

LuxTraffic: A collaborative traffic sensing system.
Proceedings of the 19th IEEE Workshop on Local & Metropolitan Area Networks, 2013

Driver behavior profiling using smartphones.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

Classification of Log Files with Limited Labeled Data.
Proceedings of Principles, Systems and Applications on IP Telecommunications, 2013

Identifying abnormal patterns in cellular communication flows.
Proceedings of Principles, Systems and Applications on IP Telecommunications, 2013

ASMATRA: Ranking ASs providing transit service to malware hosters.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A key management scheme for Content Centric Networking.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A semantic firewall for Content-Centric Networking.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Improving traffic in urban environments applying the Wardrop equilibrium.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

An evaluation study of driver profiling fuzzy algorithms using smartphones.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

On an Automated Translation of Satellite Procedures Using Triple Graph Grammars.
Proceedings of the Theory and Practice of Model Transformations, 2013

A novel eco-driving application to reduce energy consumption of electric vehicles.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

Advanced Detection Tool for PDF Threats.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Automated source code extension for debugging of OpenFlow based networks.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Aggregated representations and metrics for scalable flow analysis.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Assessing in-vehicle information systems application in the car: a versatile tool and unified testing platform.
Proceedings of the Automotive User Interfaces and Interactive Vehicular Applications, 2013

Driver diaries: a multimodal mobility behaviour logging methodology.
Proceedings of the Automotive User Interfaces and Interactive Vehicular Applications, 2013

2012
Energy-efficient high-performance parallel and distributed computing.
J. Supercomput., 2012

Breaking Tor anonymity with game theory and data mining.
Concurr. Comput. Pract. Exp., 2012

Semantic based DNS forensics.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Towards collaborative traffic sensing using mobile phones (Poster).
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Proactive Discovery of Phishing Related Domain Names.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Controlled data collection of Mini-Sinks for maximizing packet delivery ratio and throughput using multiple paths in Wireless Sensor Networks.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

SDBF: Smart DNS brute-forcer.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

DNSSM: A large scale passive DNS security monitoring framework.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

A distance-based method to detect anomalous attributes in log files.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

SAFEM: Scalable analysis of flows with entropic measures and SVM.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Semantic Exploration of DNS.
Proceedings of the NETWORKING 2012, 2012

Detecting Stealthy Backdoors with Association Rule Mining.
Proceedings of the NETWORKING 2012, 2012

Performance Evaluation of Hybrid Channel Assignment for Wireless Sensor Networks.
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012

Efficient Multidimensional Aggregation for Large Scale Monitoring.
Proceedings of the Strategies, 2012

Improving performance and anonymity in the Tor network.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

An arbitrary mobility model of Mini-Sinks using controlled data collection for reducing congestion appearance in wireless sensor networks.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Improving highway traffic through partial velocity synchronization.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Security Monitoring for Content-Centric Networking.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function.
Proceedings of the Dependable Networks and Services, 2012

Instant Degradation of Anonymity in Low-Latency Anonymisation Systems.
Proceedings of the Dependable Networks and Services, 2012

Large Scale DNS Analysis.
Proceedings of the Dependable Networks and Services, 2012

2011
Heliza: talking dirty to the attackers.
J. Comput. Virol., 2011

Website fingerprinting in onion routing based anonymization networks.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

BotCloud: Detecting botnets using MapReduce.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

A Distributed Hybrid Channel Selection and Routing Technique for Wireless Sensor Networks.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

Verification of Data Location in Cloud Networking.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

Lightweight Hidden Services.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Mini-sink mobility with diversity-based routing in wireless sensor networks.
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, 2011

DANAK: Finding the odd!
Proceedings of the 5th International Conference on Network and System Security, 2011

Machine Learning Approach for IP-Flow Record Anomaly Detection.
Proceedings of the NETWORKING 2011, 2011

BotTrack: Tracking Botnets Using NetFlow and PageRank.
Proceedings of the NETWORKING 2011, 2011

Measuring anonymity using network coordinate systems.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011

Effect of Sink Location on Aggregation Based on Degree of Connectivity for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Adaptive and self-configurable honeypots.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Deadline constrained scheduling in hybrid clouds with Gaussian processes.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

Enforcing security with behavioral fingerprinting.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Towards Economic Energy Trading in Cloud Environments.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Digging into IP Flow Records with a Visual Kernel Method.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Detection of abnormal behaviour in a surveillance environment using control charts.
Proceedings of the 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2011

Performance bound for routing in urban scenarios.
Proceedings of the AINTEC '11, Asian Internet Engineering Conference, Bangkok, Thailand, November 09, 2011

2010
Law-Aware Access Control and its Information Model
CoRR, 2010

Digital forensics in VoIP networks.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

PeekKernelFlows: peeking into IP flows.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

Design of an enhanced energy conserving routing protocol based on route diversity in wireless sensor networks.
Proceedings of the 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2010

Design of New Aggregation Techniques for Wireless Sensor Networks.
Proceedings of the MASCOTS 2010, 2010

FlowRank: ranking NetFlow records.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

RiskRank: Security risk ranking for IP flow records.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Game theory driven monitoring of spatial-aggregated IP-Flow records.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Monitoring of Spatial-Aggregated IP-Flow Records.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

Mining NetFlow Records for Critical Network Activities.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

An Autonomic Testing Framework for IPv6 Configuration Protocols.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

2009
Self Adaptive High Interaction Honeypots Driven by Game Theory.
Proceedings of the Stabilization, 2009

An ad-hoc Wireless Sensor Networks with Application to Air Pollution Detection.
Proceedings of the ISCA First International Conference on Sensor Networks and Applications (SNA-2009), 2009

Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Law-aware access control for international financial environments.
Proceedings of the Eighth ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2009

Malware analysis with graph kernels and support vector machines.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

Law-Aware Access Control: About Modeling Context and Transforming Legislation.
Proceedings of the New Frontiers in Artificial Intelligence, 2009

Using game theory to configure P2P SIP.
Proceedings of the Principles, 2009

Defensive configuration with game theory.
Proceedings of the Integrated Network Management, 2009

Threat-model-driven runtime adaptation and evaluation of intrusion detection system.
Proceedings of the 6th International Conference on Autonomic Computing, 2009

Modeling and reconfiguration of critical business processes for the purpose of a Business Continuity Management respecting security, risk and compliance requirements at Credit Suisse using algebraic graph transformation.
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

Tuning Evidence-Based Trust Models.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Collusion Detection for Grid Computing.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

Security and Consistency of IT and Business Models at Credit Suisse Realized by Graph Constraints, Transformation and Integration Using Algebraic Graph Theory.
Proceedings of the Enterprise, 2009

Slotted Packet Counting Attacks on Anonymity Protocols.
Proceedings of the Seventh Australasian Information Security Conference, 2009

2008
Anonymous Communication in Multi Hop Wireless Networks.
J. Res. Pract. Inf. Technol., 2008

An Instrumented Analysis of Unknown Software and Malware Driven by Free Libre Open Source Software.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Unlinkable Communication.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Diskussionsvorschlag einer Lösungsskizze zur Behandlung von operationellen IT-Sicherheitsrisken nach Basel II auf der Grundlage von Anforderungen der Credit Suisse.
Proceedings of the Multikonferenz Wirtschaftsinformatik, 2008

Topology dynamics and routing for predictable mobile networks.
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

Security Extensions for Space-Link Communication.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Trust-Aided Acquisition Of Unverifiable Information.
Proceedings of the ECAI 2008, 2008

Towards Trust-Based Acquisition of Unverifiable Information.
Proceedings of the Cooperative Information Agents XII, 12th International Workshop, 2008

Tree Based Flooding Protocol for Multi-hop Wireless Networks.
Proceedings of the 2008 Third International Conference on Broadband Communications, 2008

Acimn: A protocol for Anonymous Communication In Multi hop wireless networks.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Combining Cognitive with Computational Trust Reasoning.
Proceedings of the Trust in Agent Societies, 2008

2007
Mobility diversifies Trust: Introducing TrustRings.
Proceedings of the Wireless Telecommunications Symposium, 2007

Acimn protocol: A protocol for anonymous communication in multi hop wireless networks.
Proceedings of the Wireless Telecommunications Symposium, 2007

Formalizing Excusableness of Failures in Multi-Agent Systems.
Proceedings of the Agent Computing and Multi-Agent Systems, 2007

2006
Bandwidth Consumption for Providing Fair Internet Access in Wireless Mesh Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

Bandwidth overhead in WiFi mesh networks for providing fair Internet access.
Proceedings of the 1st ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2006

An e-Librarian Service that Understands Natural Language Questions from Students.
Proceedings of the 18th Conference on Advanced Information Systems Engineering (CAiSE '06), 2006

2005
Location-Based Services for Scientists in NRENs.
Proceedings of the Location- and Context-Awareness, First International Workshop, 2005

Student's Perception of a Semantic Search Engine.
Proceedings of the Cognition and Exploratory Learning in Digital Age, 2005

Teaching in the Cyber-Age: Technologies, Experiments, and Realizations.
Proceedings of the DeLFI 2005: 3. Deutsche e-Learning Fachtagung Informatik, 2005

2001
Managing Distributed Personal Firewalls with Smart Data Servers.
Proceedings of WebNet 2001, 2001

2000
Link Proposals with Case-Based Reasoning Techniques.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

Proposal for a combination of compression and encryption.
Proceedings of the Visual Communications and Image Processing 2000, 2000

Implementation of a WebDAV-based Collaborative Distance Learning Environment.
Proceedings of the 28th annual ACM SIGUCCS conference on User services: Building the future, Richmond, Virginia, USA, October 29, 2000

Modeling of Time and Document Aging for Request Prediction - One Step Further.
Proceedings of the Applied Computing 2000, 2000

Web Site Design Using a Web-Based Authoring and Publishing System.
Proceedings of the International Conference on Internet Computing, 2000

Improving the Quality of Information-Flow with the Smart Data Server.
Proceedings of the International Conference on Internet Computing, 2000

Proprietary versus Interoperable User Certificates in E-Commerce via Internet.
Proceedings of the International Conference on Internet Computing, 2000

Advanced Techniques for Analyzing Web Server Logs.
Proceedings of the International Conference on Internet Computing, 2000

Techniques for Securing Networks Against Criminal Attacks.
Proceedings of the International Conference on Internet Computing, 2000

Smart Cards - the Personal Safe in an E-Commerce World.
Proceedings of the International Conference on Internet Computing, 2000

Implementation of an Enterprise-Level Groupware System Based on J2EE Platform and WebDAV Protocol.
Proceedings of the 4th International Enterprise Distributed Object Computing Conference (EDOC 2000), 2000

Advanced Studies on Link Proposals and Knowledge Retrieval of Hypertexts with CBR.
Proceedings of the Electronic Commerce and Web Technologies, 2000

Functional Integration Test of Mass Processes with Electronic Signatures in Public Administration.
Proceedings of the 8th European Conference on Information Systems, 2000

What Do Hyperlink-Proposals and Request-Prediction Have in Common?
Proceedings of the Advances in Information Systems, First International Conference, 2000

1999
An Approach to Distributed Functionality - The Smart Data Server.
Proceedings of WebNet 99, 1999

The Importance of Link-Transformation and Link-Proposals for Hyperlink-Management Systems.
Proceedings of WebNet 99, 1999

Role-based access control in online authoring and publishing systems vs. document hierarchy.
Proceedings of the 17th annual international conference on Documentation, 1999

The Smart Data Server: A New Kind of Middle-Tier.
Proceedings of the Internet, Multimedia Systems and Applications, 1999

Flächen- und Volumenmessung lokaler Objekte in DICOM-Bildern und -Bildfolgen.
Proceedings of the Bildverarbeitung für die Medizin 1999: Algorithmen, 1999

1998
Institut für Telematik (Trier) - angewandte Forschung nach Fraunhofer Ideal.
Inform. Forsch. Entwickl., 1998

Interface for Navigation and Database - Querying via WWW.
Proceedings of the Knowledge Management und Kommunikationssysteme, Workflow Management, Multimedia, Knowledge Transfer, 1998

The flood-gate principle - a hybrid approach to a high security solution.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

Adaptive compression of DICOM-image data.
Proceedings of the Electronic Imaging: Processing, 1998


  Loading...