Veröffentlichungen
2025
René Helmke, Elmar Padilla, Nils AschenbruckMens Sana In Corpore Sano: Sound Firmware Corpora for Vulnerability Research
Network and Distributed System Security Symposium NDSS, San Diego, California, USA, Feb. 23-28, 2025, 2025
https://arxiv.org/abs/2404.11977
2024
Frederik Basels, Konrad Wolsing, Elmar Padilla, Jan BauerDemo: Maritime Radar Systems under Attack. Help is on the Way!
2024 IEEE 49th Conference on Local Computer Networks (LCN), October 08-10, 2024, Caen, Normandy, France, p. 1-4, 2024
https://ieeexplore.ieee.org/document/10639793
Demo: A Software Suite for ILDA Digital Network/IDN-File Recording and Playback
Demo at the 49th IEEE Conference on Local Computer Networks (LCN), October 08-10, 2024, Caen, Normandy, France, p. 1-4, 2024
https://ieeexplore.ieee.org/document/10639665
A Measurement Study on Interprocess Code Propagation of Malicious Software
Digital Forensics and Cyber Crime, Cham, p. 264--282, 2024
https://link.springer.com/chapter/10.1007/978-3-031-56583-0_18
Dude, Where’s That Ship? Stealthy Radio Attacks Against AIS Broadcasts
2024 IEEE 49th Conference on Local Computer Networks (LCN), p. 1-7, 2024
https://ieeexplore.ieee.org/document/10639674
Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study
Detection of Intrusions and Malware, and Vulnerability Assessment, Cham, p. 64--83, 2024
https://link.springer.com/chapter/10.1007/978-3-031-64171-8_4
Threat Analysis for Novel Underwater Vehicles: Insights from the Perspective of Cyber Security
European Workshop on Maritime Systems Resilience and SecurityMARESEC, Bremerhaven, Jun. 6, 2024., 2024
By-Design Risk Mitigation for Large Uncrewed Underwater Vehicles (UUV)
European Workshop on Maritime Systems Resilience and Security, MARESEC, Bremerhaven, Jun. 6, 2024, 2024
Exploring Anomaly Detection for Marine Radar Systems
Proceedings of the 10th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS '24), co-located with the the 29th European Symposium on Research in Computer Security (ESORICS '24), 9 2024
Cybersicherheit für die Schifffahrt — mit einer Schiffsbrücke als Test- und Entwicklungslabor
Proc. of the 20th BSI German IT Security Congress, virtually hosted in Bonn, Germany, May 7-8, 2024, 2024
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Veranstaltungen/ITSiKongress/20ter/Kongressdokumentation_2024.html
2023
Lennart Bader, Eric Wagner, Martin Henze, Martin SerrorMETRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks
Proceedings of the 8th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS 2023), 2023
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-bader-metrics.pdf
Phish & Ships and Other Delicacies from the Cuisine of Maritime Cyber Attacks
Proc. of the European Workshop on Maritime Systems Resilience and SecurityMARESEC, virtual, Jun. 27, 2023, October 2023
https://doi.org/10.5281/zenodo.8406035
dewolf: Improving Decompilation by leveraging User Surveys
Proceedings 2023 Workshop on Binary Analysis Research, 2023
http://dx.doi.org/10.14722/bar.2023.23001
Demo: Realtime Recording of IDN-Streams with the Audio Stream Input/Output (ASIO) Protocol
Demo at the 48th IEEE Conference on Local Computer Networks (LCN), October 01-05, 2023, Daytona Beach, Florida/USA, 2023
https://ieeexplore.ieee.org/document/10223328
Introduction and Demonstration of the OpenIDN-Laser-DAC-Framework
International Conference on Networked Systems (NetSys), September 4-7, 2023 Potsdam, Germany, 2023
https://kuvs.de/netsys/2023/program/netsys-2023-demonstrations
Extended Abstract: Towards Reliable and Scalable Linux Kernel CVE Attribution in Automated Static Firmware Analyses
Detection of Intrusions and Malware, and Vulnerability Assessment, Cham, p. 201--210, 2023
https://link.springer.com/chapter/10.1007/978-3-031-35504-2_10
Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers
Secure IT Systems: 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings, Oslo, Norway, p. 245–262, 2023
https://doi.org/10.1007/978-3-031-47748-5_14
SoK: Evaluations in Industrial Intrusion Detection Research
Journal of Systems Research, No. 1, Vol. 3: October 31, 2023
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-lamberts-metrics-sok.pdf
An Interdisciplinary Survey on Information Flows in Supply Chains
ACM Computing Surveys, 2023
https://dl.acm.org/doi/pdf/10.1145/3606693
MCRIT: The MinHash-based Code Relationship & Investigation Toolkit
The Journal on Cybercrime and Digital Investigations, No. 1, Vol. 8: p. 7–18, Apr. 2023
https://cyberjournal.cecyf.fr/index.php/cybin/article/view/45
Specialties of HAZID-Study for Large Unmanned Underwater Vehicles
OCEANS 2023 - Limerick, p. 1-10, 2023
https://ieeexplore.ieee.org/document/10244358
Detecting Maritime GPS Spoofing Attacks Based on NMEA Sentence Integrity Monitoring
Journal of Marine Science and Engineering, No. 5, Vol. 11: 2023
https://www.mdpi.com/2077-1312/11/5/928
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols
48th IEEE Conference on Local Computer Networks (LCN), Daytona Beach, Florida, US, October 2023
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wagner-repel.pdf
Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms
2023
https://arxiv.org/abs/2301.05048
One IDS is not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS '23), September 25-29, 2023, The Hague, The Netherlands, September 25, 2023
https://jpennekamp.de/wp-content/papercite-data/pdf/wkw+23.pdf
XLab-UUV – A Virtual Testbed for Extra-Large Uncrewed Underwater Vehicles
1st IEEE LCN Workshop on Maritime Communication and Security (MarCaS), October 2023
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wolsing-xluuvlab.pdf
2022
Kira Bungert, Maren Bennewitz, Lilli BruckschenWorking With Robots: Design and Evaluation of an Introductory Computer Science Teaching Unit With Educational Robots
The European Conference on Education 2022 Official Conference Proceedings, July 2022
https://papers.iafor.org/submission64539/
A Survey About the Use of Educational Robots and Physical Computing Devices in Computer Science Lessons at German Secondary Schools
The European Conference on Education 2022 Official Conference Proceedings, July 2022
https://papers.iafor.org/submission64549/
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, Nagasaki, Japan, p. 252–266, 2022
https://doi.org/10.1145/3488932.3497762
FACT 4.0
Black Hat USA 2022, August 2022
https://www.blackhat.com/us-22/arsenal/schedule/index.html#fact--26776
Home Router Security Report 2022
November 2022
https://www.fkie.fraunhofer.de/content/dam/fkie/de/documents/2022-11-28_HRSR_2022.pdf
CWE_Checker: Architecture-Independent Binary Vulnerability Analysis
Black Hat USA 2022, August 2022
https://www.blackhat.com/us-22/arsenal/schedule/#cwe_checker-architecture-independent-binary-vulnerability-analysis-26960
A Framework for Flexible ILDA Digital Network (IDN) Audio Streaming
Demo at the 47th IEEE Conference on Local Computer Networks (LCN), September 26-29, 2022, Edmonton, Canada, 2022
https://ieeexplore.ieee.org/document/9843411
Towards Reliable and Scalable Linux Kernel CVE Attribution in Automated Static Firmware Analyses
September 2022
https://arxiv.org/abs/2209.05217
Improving Connectivity in Multipath PLMN Setups: An MPTCP Scheduler Using Link Quality Indicators
Proceedings of the 26th ITG Symposium on Mobile Communication -Technologies and Applications, May 18-19, 2022, Osnabrück, Germany, May 2022
https://www.hs-osnabrueck.de/fileadmin/HSOS/Forschung/Recherche/Laboreinrichtungen_und_Versuchsbetriebe/Labor_fuer_Hochfrequenztechnik_und_Mobilkommunikation/Mobilkomtagung/2022/Vortraege/12_Helmke.pdf
Learning Personalized Human-Aware Robot Navigation Using Virtual Reality Demonstrations from a User Study
Proceedings of the 2022 IEEE International Conference on Robot and Human Interactive Communication (RO-MAN), March 2022
https://ieeexplore.ieee.org/document/9900554
ssdeeper: Evaluating and improving ssdeep
Forensic Science International: Digital Investigation, Supplement (Proceedings of the Twenty-Second Annual DFRWS, USA), Vol. 42: p. 301402, July 2022
https://www.sciencedirect.com/science/article/pii/S266628172200083X
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection
Proceedings of the 8th ACM Cyber-Physical System Security Workshop (CPSS '22), co-located with the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan, p. 73-84, May 30, 2022
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-kus-iids-generalizability.pdf
Poster: Ensemble Learning for Industrial Intrusion Detection
38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA, No. RWTH-2022-10809, 12 8, 2022
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-kus-ensemble-poster.pdf
Deep Machine Learning for Cyber Defence
November 2022
https://www.sto.nato.int/publications/STO Technical Reports/Forms/All Documents.aspx?RootFolder=/publications/STO Technical Reports/STO-TR-IST-163&FolderCTID=0x0120D5200078F9E87043356C409A0D30823AFA16F6010066D541ED10A62C40B2AB0FEBE9841A61&View={F8042CB2-580C-473B-AEF8-B435A05CA1D2}
Classification, Characterization, and Contextualization of Windows Malware using Static Behavior and Similarity Analysis
July 2022
https://hdl.handle.net/20.500.11811/9992
Bounds for the Scalability of TLS over LoRaWAN
Proceedings of the 26th ITG Symposium on Mobile Communication - Technologies and Applications, May 18-19, 2022, Osnabrück, Germany, May 2022
https://www.hs-osnabrueck.de/fileadmin/HSOS/Forschung/Recherche/Laboreinrichtungen_und_Versuchsbetriebe/Labor_fuer_Hochfrequenztechnik_und_Mobilkommunikation/Mobilkomtagung/2022/Vortraege/22_Rademacher.pdf
Guiding Ship Navigators through the Heavy Seas of Cyberattacks
European Workshop on Maritime Systems Resilience and Security 2022 (MARESEC 2022), Bremerhaven, Germany, 2022
https://zenodo.org/doi/10.5281/zenodo.7148793
Keeping the Baddies Out and the Bridge Calm: Embedded Authentication for Maritime Networks
2022 International Symposium on Networks, Computers and Communications (ISNCC), p. 1-6, 2022
https://ieeexplore.ieee.org/document/9851819
On specification-based cyber-attack detection in smart grids
Proceedings of the 11th DACH+ Conference on Energy Informatics, Freiburg, Germany, September 2022
https://doi.org/10.1186/s42162-022-00206-7
On using contextual correlation to detect multi-stage cyber attacks in smart grids
Sustainable Energy, Grids and Networks, Vol. 32: p. 100821, December 2022
https://www.sciencedirect.com/science/article/pii/S235246772200114X
Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec' 22), May 2022
https://dl.acm.org/doi/10.1145/3507657.3528539
Scalable and Privacy-Focused Company-Centric Supply Chain Management
Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22), May 2022
https://ieeexplore.ieee.org/document/9805503
BP-MAC: Fast Authentication for Short Messages
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'22), May 2022
https://dl.acm.org/doi/10.1145/3507657.3528554
Anomaly Detection in Maritime AIS Tracks: A Reviewof Recent Approaches
MDPI Journal of Marine Science and Engineering (JMSE) - Special Issue: Risk Assessment and Traffic Behaviour Evaluation of Ships, January 2022
https://www.mdpi.com/2077-1312/10/1/112
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
2022 IEEE 47th Conference on Local Computer Networks (LCN), p. 114-122, September 2022
https://ieeexplore.ieee.org/document/9843801
Can Industrial Intrusion Detection Be SIMPLE?
Computer Security -- ESORICS 2022, Cham, p. 574--594, September 2022
https://link.springer.com/chapter/10.1007/978-3-031-17143-7_28
IPAL: Breaking up Silos of Protocol-Dependent and Domain-Specific Industrial Intrusion Detection Systems
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, Limassol, Cyprus, p. 510–525, October 2022
https://doi.org/10.1145/3545948.3545968
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
Proceedings of the 15th Workshop on Cyber Security Experimentation and Test, Virtual, CA, USA, p. 49–53, August 2022
https://doi.org/10.1145/3546096.3546102
2021
Lennart Bader*, Jan Pennekamp*, Roman Matzutt, David Hedderich, Markus Kowalski, Volker Lücken, Klaus Wehrle (* = Equal Contribution)Blockchain-Based Privacy Preservation for Supply Chains Supporting Lightweight Multi-Hop Information Accountability
Information Processing & Management, May 2021
Human-Aware Robot Navigation Based on Learned Cost Values from User Studies
Proceedings of the International Conference on Robot and Human Interactive Communication (ROMAN), University of British Columbia and University of Waterloo, Canada, August 2021
https://ieeexplore.ieee.org/document/9515481
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaTCPS), Virtual Event, April 2021
https://dl.acm.org/doi/10.1145/3445969.3450423
PIdARCI: Using Assembly Instruction Patterns to Identify, Annotate, and Revert Compiler Idioms
Proc. of the 18th Annual Conference on Privacy, Security and Trust, PST, Auckland, New Zealand, December 2021
IDN-Laser-Tester: A Framework for Detecting and Testing ILDA Digital Network Consumers for Laser Projection
International Conference on Networked Systems 2021 (NetSys), September 13 - 16, 2021, virtually hosted in Lübeck, Germany, 2021
https://journal.ub.tu-berlin.de/eceasst/article/view/1174
IDN-NetConfig: A Flexible Extension of the IDN-Hello Protocol (ILDA Digital Network) to Control Application Specific Parameters
Demo at the 46th IEEE Conference on Local Computer Networks (LCN), October 04-07, 2021, virtually hosted in Edmonton, Canada, 2021
https://www.ieeelcn.org/prior/LCN46/lcn46demos/Demo_7_1570761022.pdf
EPF: An Evolutionary, Protocol-Aware, and Coverage-Guided Network Fuzzing Framework
18th International Conference on Privacy, Security and Trust (PST2021), Auckland, New Zealand, December 2021
https://ieeexplore.ieee.org/document/9647801
BRAT: A BRidge Attack Tool for Cyber Security Assessments of Maritime Systems
International Journal on Marine Navigation and Safety of Sea Transportation (TransNav), No. 1, Vol. 15: March 2021
https://www.transnav.eu/Article_BRAT:_A_BRidge_Attack_Tool_for_Hemminghaus,57,1092.html
SIGMAR: Ensuring Integrity and Authenticity of Maritime Systems using Digital Signatures
Proc. of the International Symposium on Networks, Computers and Communications - Trust, Security, and Privacy, Dubai, UAE, October 2021
https://ieeexplore.ieee.org/document/9615738
MCSL: A Cyber Security Test Environment for Bridge Systems
European Workshop on Maritime Systems Resilience and Security (MARESEC 2021), June 2021
Auf den Lime gegangen: Vor- und Nachteile der neuen Mikromobilität
Tagungsband zum 17. Deutschen IT Sicherheitskongress, 2021
A Forensic Analysis of Micromobility Solutions
Digital Forensics Research Conference APAC, virtual, January 2021
https://dfrws.org/presentation/forensic-analysis-of-micromobility- solutions/
Cybersecurity in Power Grids: Challenges and Opportunities
Sensors, No. 8, Vol. 21: September 2021
https://arxiv.org/abs/2105.00013
Déjà Vu? Client-Side Fingerprinting and Version Detection of Web Application Software
2021 IEEE 46th Conference on Local Computer Networks (LCN), p. 81--89, 2021
https://ieeexplore.ieee.org/document/9524885
Large Scale Monitoring of Web Application Software Distribution to Measure Threat Response Behavior
Electronic Communications of the EASST, Vol. 80: 2021
https://journal.ub.tu-berlin.de/eceasst/article/view/1153
CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively
IEEE Transactions on Network and Service Management, April 2021
https://ieeexplore.ieee.org/document/9404327
From Plain Text to CTI - A Technological Solution for Gathering Cyber Threat Intelligence using Natural Language Processing
Proc. of the NATO Science & Technology Information Systems Technology-190 Symposium on "AI, ML and BD for Hybrid Military Operations (AI4HMO)", October 2021
https://www.sto.nato.int/publications/STO%20Meeting%20Proceedings/STO-MP-IST-190/MP-IST-190-30.pdf
Cybersicherheit für maritime Systeme
Crisis Prevention, January 2021
https://crisis-prevention.de/kommunikation-it/cybersicherheit-fuer-maritime-it-systeme.html
Cyber Security Risk Assessment Process for Military Systems
October 2021
Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use
Proceedings of the 2021 ACSAC Workshop on Learning from Authoritative Security Experiment Results (LASER), Austin, TX, USA, December 2021
https://arxiv.org/abs/2112.11417
Unlocking Secure Industrial Collaborations through Privacy-Preserving Computation
ERCIM News, No. 126, p. 24--25, July 2021
https://ercim-news.ercim.eu/en126/special/unlocking-secure-industrial-collaborations-through-privacy-preserving-computation
Path Loss in Urban LoRa Networks: A Large-Scale Measurement Study
Proceedings of the 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), virtual, September 2021
https://arxiv.org/abs/2109.07768
When a BRAT fools your bridge: A Cyber Security Test Environment for Integrated Bridge Systems
Demo at the 46th IEEE Conference on Local Computer Networks (LCN), Edmonton, Canada, October 2021
https://www.ieeelcn.org/lcn46demos/Demo_8_1570761147.pdf
Offene Software-Plattform für Dienstleistungsinnovationen in einem Wertschöpfungsnetz in der Landwirtschaft
Berlin, Heidelberg, September 2021
https://link.springer.com/chapter/10.1007/978-3-662-63099-0_12
Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment
Proceedings of 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), Espoo, Finland, October 2021
https://arxiv.org/abs/2110.09162
An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment
Proceedings of the 26th International Conference on Electricity Distribution (CIRED), virtual, September 2021
https://arxiv.org/abs/2110.02040
Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids
Proceedings of the 4th International Conference on Smart Energy Systems and Technologies (SEST), Vaasa, Finland, September 2021
https://arxiv.org/abs/2109.02336
Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
Proc. of the 37th Annual Computer Security Applications Conference (ACSAC), virtual, December 2021
https://arxiv.org/abs/2111.07847
2020
Jan Bauer, Yannic Toschke, Alexander Tessmer, Björn Bourdon, Nils Aschenbruck, Mirco ImlauAn Open Source IoT Framework for a Distributed Modular Low-Cost Laser-Based Sensing Multi-Platform
IEEE Sensors Virtual Conference, Rotterdam, Netherlands, October 2020
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments
Proceedings of the ACM Internet Measurement Conference (IMC), Virtual Event, October 2020
https://dl.acm.org/doi/10.1145/3419394.3423666
To Stream or Not to Stream, Is This the Question? Or, How to StreamLaser Shows the Better Way: Video Preview or Raw IDN (ILDA Digital Network)?
Demo at the 45th IEEE Conference on Local Computer Networks (LCN), November 16-19, Sydney, Australia, 2020
https://www.ieeelcn.org/prior/LCN45/lcn45demos/1570680429.pdf
The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation
6th International Workshop on Security and Privacy in the Cloud (SPC), Avignon, France, July 2020
https://ieeexplore.ieee.org/document/9162199
Poster: Cybersecurity Research and Training for Power Distribution Grids – A Blueprint
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS), Virtual Event, November 2020
https://dl.acm.org/doi/10.1145/3372297.3420016
Complying with Data Handling Requirements in Cloud Storage Systems
IEEE Transactions on Cloud Computing (Early Access), June 2020
https://doi.org/10.1109/TCC.2020.3000336
Doctoral Thesis: Preprocessing to Deal with Hard Problems: Upper and Lower Bounds for Kernelization of Graph Problems
Humboldt-Universität zu Berlin, May 2020
https://edoc.hu-berlin.de/handle/18452/22131
Exchange of Preparatory Information for Secure and Usable Cryptocurrency Transactions
IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Macau, China, p. 132 -- 139, December 2020
https://ieeexplore.ieee.org/document/9282669
Graph-based Model of Smart Grid Architectures
Proceedings of the 3rd International Conference on Smart Energy Systems and Technologies (SEST), Istanbul, Turkey, September 2020
Fuzzing File System Implementations
HackInTheBox Security Conference 2020, Amsterdam, Netherlands, April 2020
A Security Reference Model for Autonomous Vehicles in Military Operations
4th IEEE Workshop on Security and Privacy in the Cloud (SPC), May 2020
https://ieeexplore.ieee.org/document/9162227
Don’t Stop at the Top: Using Certificate Transparency Logs to Extend Domain Lists for Web Security Studies
2020 IEEE 45th Conference on Local Computer Networks (LCN), p. 409--412, 2020
Pixelizr: A Visual Demonstration of the FERRET Framework
Demonstrations of the 45th IEEE Conference on Local Computer Networks (LCN), 2020
How to Securely Prune Bitcoin's Blockchain
Proceedings of the 19th IFIP Networking Conference (NETWORKING), Paris, France, June 2020
Private Multi-Hop Accountability for Supply Chains
Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICCWorkshops), 1st Workshop on Blockchain for IoT and Cyber-Physical Systems (BIoTCPS), Dublin, Ireland, June 2020
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking
Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC), Virtual Event, December 2020
https://eprint.iacr.org/2020/1512.pdf
Doctoral Thesis: Evaluation and Optimization of IEEE802.11 multi-hop Backhaul Networks with Directional Antennas
Technische Universität Kaiserslautern, 2020
https://www.dr.hut-verlag.de/978-3-8439-4324-6.html
Technical Fundamentals of Blockchain Systems
2020
Assessing the Security of OPC UA Deployments
1st ITG Workshop on IT Security (ITSec), Tübingen, Germany, April 2020
https://doi.org/10.15496/publikation-41813
Challenges and Opportunities in Securing the Industrial Internet of Things
IEEE Transactions on Industrial Informatics (Early Access), September 2020
https://ieeexplore.ieee.org/document/9195014
Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures
Proceedings of the 6th IEEE International Energy Conference (ENERGYCon), Gammarth, Tunisia, September 2020
https://arxiv.org/abs/2003.06185
Home Router Security Report 2020
Whitepaper, June 2020
https://www.fkie.fraunhofer.de/de/Pressemeldungen/Home-Router.html
Poster: Fuzzing of SCADA Protocols used in Smart Grids
9th DACH+ Conference on Energy Informatics, October 2020
Poster: Facilitating Protocol-independent Industrial Intrusion Detection Systems
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS), Virtual Event, November 2020
https://doi.org/10.1145/3372297.3420019
2019
Daniel Baier, Martin LambertzDeStroid - Fighting String Encryption in Android Malware
Botconf 2019, Bordeaux, France, December 2019
cwe_checker: Hunting Binary Code Vulnerabilities Across CPU Architectures
"Pass The SALT" Conference, Lille, Frankreich, July 2019
https://2019.pass-the-salt.org/files/slides/05-cwe_checker.pdf
YARA-Signator: Automated Generation of Code-based YARA-Rules
Botconf 2019, Bordeaux, France, December 2019
https://journal.cecyf.fr/ojs/index.php/cybin/article/view/24
Improving your firmware security analysis process with FACT
"Pass The SALT" Conference, Lille, Frankreich, July 2019
https://2019.pass-the-salt.org/files/slides/04-FACT.pdf
Enter FACT - Boost your Firmware Security Analysis with Automation, Visualization and Cross Referencing
Hardwear.io, Den Haag, NL, September 2019
https://hardwear.io/netherlands-2019/speakers/johannes-vom-dorp-and-peter-weidenbach.php
cwe_checker: Hunting Binary Code Vulnerabilities Across CPU Architectures
Black Hat USA, Las Vegas, USA, August 2019
Erkennung von Botnetzinteraktionen durch effizientes Domainblacklisting auf ressourceneingeschränkter Routerhardware in Heimnetzen
16. Deutscher IT-Sicherheitskongress, Bonn, May 2019
IDN-Laser-VR: A Demonstration of Real-Time Multimedia Streaming in Local Networks Using the ILDA Digital Network Protocol
Demo at the 44rd IEEE Conference on Local Computer Networks (LCN), October 14-17, Osnabrück, Germany, 2019
Syntactical Carving of PNGs and Automated Generation of Reproducible Datasets
Digital Forensics Research Conference USA (DFRWS), Portland, Oregon, USA, July 2019
https://www.sciencedirect.com/science/article/pii/S174228761930163X
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads
IEEE LCN Symposium on Emerging Topics in Networking, Osnabrück, Germany, October 2019
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
Proceedings of the 27th IEEE International Conference on Network Protocols (IEEE ICNP2019), Chicago, Illinois, USA, October 2019
RoAMer: Robust Automated Malware Unpacker
FIRST Technical Colloquium, Amsterdam, NL, April 2019
RoAMer: Robust Automated Malware Unpacker
Malware Conference 2019, Nantucket, Massachusetts, USA, October 2019
Recognizing Email Spam from Meta Data Only
IEEE Conference on Communications and Network Security (IEEE CNS 2019), Washington, USA, June 2019
Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy (CPSSPC'19), London, United Kingdom, November 2019
https://dl.acm.org/doi/pdf/10.1145/3338499.3357357
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
Proceedings of the 27th IEEE International Conference on Network Protocols (IEEE ICNP2019), Chicago, Illinois, USA, October 2019
FACT 3.0: Firmware Analysis and Comparison Tool
Black Hat Europe, London, GB, December 2019
Deadly Sins of Development that lead to vulnerable devices
EmBO++ The embedded C++ Conference, Bochum, March 2019
How to Mitigate Cyber Threats to Unmanned Maritime Systems
Atlas Meets Science science conference 2019, November 2019
2018
Thomas BaraboschDoctoral Thesis: Formalization and Detection of Host-Based Code Injection Attacks in the Context of Malware
University of Bonn, Germany, October 2018
http://hss.ulb.uni-bonn.de/2018/5240/5240.htm
Lucky CAT: A Distributed Fuzzing Management Framework
Black Hat Europe 2018, London, United Kingdom, December 2018
https://www.blackhat.com/eu-18/arsenal/schedule/#lucky-cat-adistributed-fuzzingmanagementframework-13352
KLEAK: Practical Kernel Memory Disclosure Detection
December 2018
http://www.netbsd.org/gallery/presentations/maxv/kleak.pdf
SAD THUG: Structural Anomaly Detection for Transmissions of High-value Information Using Graphics
27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA, p. 1147--1164, 2018
https://www.usenix.org/conference/usenixsecurity18/presentation/chapman
Low-cost Prototypes of IDN (ILDA Digital Network) Consumers for ILDA Laser Projector and DMX512 Service
Demo at the 43rd IEEE Conference on Local Computer Networks (LCN), October 1-4, Chicago, USA, 2018
Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit
Digital Forensics Research Conference USA (DFRWS USA 2018), Providence, RI United States, 2018
https://www.sciencedirect.com/science/article/pii/S1742287618301993
Resurrecting Portable Network Graphics using Block Generators
Digital Forensics Research Conference USA (DFRWS USA 2018), Providence, RI United States, 2018
https://www.sciencedirect.com/science/article/pii/S1742287618301865
Developing a Framework for Large Scale Security Analysis of Web Applications
Demonstrations of the 43rd IEEE Conference on Local Computer Networks (LCN), 2018
ApiScout: Robust Windows API Usage Recovery for Malware Characterization and Similarity Analysis
Botconf 2018 The Journal on Cybercrime & Digital Investigations, No. 1, Toulouse, France, Vol. 4: p. 1--16, December 2018
https://journal.cecyf.fr/ojs/index.php/cybin/article/view/20/23
Softwareliste - Verwundbarkeiten im Unternehmen finden und verwalten
iX 5/2018, Heise Medien Verlag, 2018
https://www.heise.de/select/ix/2018/5/1524520090462661
FACT 2.5: Firmware Analysis and Comparison Tool
Black Hat Europe 2018, London, United Kingdom, December 2018
https://www.blackhat.com/eu-18/arsenal/schedule/#fact-25-firmware-analysis-andcomparison-tool-12582
Firmware Analysis and Comparison Tool (FACT)
Black Hat Asia 2018, Arsenal, Singapur, 2018
https://www.blackhat.com/asia-18/arsenal.html#peter-weidenbach
Illusion Tricks: Manipulating Sandbox Reports for Fun and Profit
April 2018
2017
Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar PadillaQuincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMWA), Bonn, Germany, p. 209-229, July 2017
https://link.springer.com/chapter/10.1007/978-3-319-60876-1_10
A framework for recording and replaying IDN (ILDA digital network) streams on PCAP basis
International Conference on Networked Systems 2017 (NetSys), Göttingen, Germany, March 2017
https://ieeexplore.ieee.org/document/7931514
Demonstration of “IDN-Toolbox”: A Software to Visualize and Analyze IDN (ILDA Digital Network) Streams
Demo at the 42nd IEEE Conference on Local Computer Networks (LCN), Singapore, October 2017
https://www.ieeelcn.org/prior/LCN42/lcn42demos/1570385454.pdf
ZFT - A ZFS Forensic Toolkit (Poster)
Digital Forensics Research Conference EU (DFRWS EU 2017) , 2017
Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis
DFRWS USA 2017, 2017
Tips to Prevent, Detect & Respond to Cyberattacks - How Safe Is Your Firmware?
IESE insight, 2017
Malpedia: A Collaborative Effort to Inventorize the Malware Landscape
Botconf 2017, Montpellier, Frankreich, 2017
https://botconf2017.sched.com/event/CtHF/malpedia-a-collaborative-effort-to-inventorize-the-malware-landscape
Malpedia: A Collaborative Effort to Inventorize the Malware Landscape
The Journal on Cybercrime & Digital Investigations, No. 1, Vol. 3: p. 1--19, December 2017
https://journal.cecyf.fr/ojs/index.php/cybin/article/view/17/20
Creating a Distributed Malware Analysis Toolchain with MASS
Demonstrations of the 42nd Annual IEEE Conference on Local Computer Networks (LCN-Demos 2017), Singapore, Singapore, October 2017
Distributed and Collaborative Malware Analysis with MASS
42nd Annual IEEE Conference on Local Computer Networks (LCN 2017), Singapore, Singapore, October 2017
Software Vulnerability Analysis Using CPE and CVE
2017
https://arxiv.org/abs/1705.05347
BREACH: A Framework for the Simulation of Cyber Attacks on Company's Networks (Poster)
Digital Forensics Research Conference EU (DFRWS EU 2017) / 10th International Conference on IT Security Incident Management & IT Forensics (IMF 2017), 2017
Hardware- und hardwarenahe Trojaner
September 2017
http://www.fkie.fraunhofer.de/de/Pressemeldungen/hwt-bericht.html
2016
Jonathan Chapman, Simon Ofner, Piotr PaukszteloKey Factors in Industrial Control System Security
41st IEEE LCN, Lyon, France, Dec. 01, 2016
Measuring the Effect of Hiding Messages in JPEG Files
Future Security 2016, Berlin, Germany, September 2016
Kalkuliertes Risiko - Marktübersicht Sandbox als Komplettsystem
iX 03/2016, Jan. 2016
Sandbox Evasion the Easy Way - Evading Major Commercial Sandboxes
Future Security 2016, Berlin, Germany, p. 299-306, September 2016
discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code
Proceedings of the 23nd Network and Distributed System Security Symposium (NDSS), 2016
A Comprehensive Measurement Study of Domain Generating Malware
Proceedings of the 25th USENIX Security Symposium, Austin, USA, August 2016
Using Probabilistic Multipath Routing to Improve Route Stability in MANETs
2016 IEEE 41st Conference on Local Computer Networks (LCN), p. 192-195, Nov 2016
Analysis of Free Movies and Series Websites Guided by User Search
The botnet fighting conference, Botconf, Lyon, France, Dec. 01, 2016
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016
2015
Thomas Barabosch, Adrian Dombeck, Elmar Gerhards-PadillaParasiteEx: Disinfecting Parasitic Malware Platform-Independently
10th Future Security, Berlin, Germany, September 2015
BotWatcher: Transparent and Generic Botnet Tracking
Proc. of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015), Kyoto, Japan, November 2015
Behavior-Driven Development in Malware Analysis
The botnet fighting conference, Botconf, Paris, France, December 2015
https://journal.cecyf.fr/ojs/index.php/cybin/article/view/9
A Multi-Platform Library for a Software Sender for the (proposed) ILDA Digital Network
International Conference on Networked Systems 2015 (NetSys), Cottbus, Germany, March 2015
https://www.semanticscholar.org/paper/A-Multi-Platform-Library-for-a-Software-Sender-for-Frank/4bafa1907c823d8daee4f35d63fccc7ca499289d
The ILDA Digital Network Stream Specification
No. Revision 001, 2015
https://www.ilda.com/resources/StandardsDocs/ILDA_IDN-Stream_rev001.pdf
Measuring and Modeling Performance of WLAN Communication for Multistatic Sonar Applications
Local Computer Networks (LCN), 2015 IEEE 40th Conference, Clearwater, Florida, USA, October 2015
Cyberkriminalität - Licht ins Dunkel bringen
BSI-Magazin 2013/14, p. 8, Jan. 2015
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/Magazin/BSI-Magazin_2013-14.pdf
Real-time Streaming with Millisecond Granularity
40th IEEE Conference on Local Computer Networks, LCN 2015, Clearwater Beach, FL, USA, p. 490--493, October 2015
https://doi.org/10.1109/LCN.2015.7366360
ITFComp: a compression algorithm for ARM architecture instruction trace files
Proceedings of the 8th International Conference on Simulation Tools and Techniques, 2015
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations
Proceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015), San Diego, CA, USA, February 2015
2014
Thomas BaraboschDetecting Host-Based Code Injection Attacks
9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING 9), Bochum, July/August 31-01, 2014
Bee Master: Detecting Host-Based Code Injection Attacks
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Egham, UK, Vol. 8550: p. 235-254, July 2014
http://dx.doi.org/10.1007/978-3-319-08509-8_13
Host-Based Code Injection Attacks: A Popular Technique Used By Malware
9th International Conference on Malicious and Unwanted Software (MALCON), Fajardo, Puerto Rico, October 28-30, 2014
Reducing MANET neighborhood discovery overhead
Local Computer Networks (LCN), 2014 IEEE 39th Conference on, Edmonton, AB, Canada, p. 374-377, Sept. 8-11, 2014
Die unsichtbare Bedrohung - Erkennungsmethoden für Kernel-Level-Rootkits
iX, No. 12, p. 112-115, Dec. 2014
Demonstration of Bandwidth Demand and Jitter Properties of a Software Sender/Scheduler for the (proposed) ILDA Digital Network
39th IEEE Conference on Local Computer Networks (LCN), Edmonton, Canada, September 2014
https://www.ieeelcn.org/prior/LCN39/lcn39demos/Frank.pdf
HoneyAgent: Detecting Malicious Java Applets by Using Dynamic Analysis
9th International Conference on Malicious and Unwanted Software, MALCON, Fajardo, Puerto Rico, October 28-30, 2014
Semantic Exploration of Binaries
The botnet fighting conference, Botconf, Nancy, France, Dec. 03-05, 2014
Envisioning Smart Building Botnets
Proc. GI Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, Vienna, p. 319-329, Mar. 19-21, 2014
http://www.wendzel.de/dr.org/files/Papers/EnvisioningSmartBuildings.pdf
Codescanner: Detecting (Hidden) x86/64 Code in Arbitrary Files
9th International Conference on Malicious and Unwanted Software, MALCON, Fajardo, Puerto Rico, October 28-30, 2014
2013
Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert BosHighly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus
Proceedings of the 8th International Conference on Malicious and Unwanted Software (Malware 2013), Fajardo, USA, October 2013
BonnSens: A Mesh-based Command and Control Sensing System for Public Safety Scenarios
Demo at the Conference on Networked Systems (NetSys/KIVS), Stuttgart, Germany, Mar 11-15, 2013
Evaluating the Impact on Application-Related Metrics for Sensor Data and Voice Transmission in Mobile Wireless Mesh Scenarios
Conference on Networked Systems (NetSys/KIVS), Stuttgart, Germany, Mar 11-15, 2013
BonnSens: A Mesh-based Command and Control Sensing System for Public Safety Scenarios
PIK - Praxis der Informationsverarbeitung und Kommunikation, Vol. 36: p. 51-51, February 2013
A Controlled Loss Transport Service for Sensor Data Transmission
Proc. of Military Communications and Information Systems Conference (MCC 2013), Saint-Malo, France, Oct 7-9, 2013
Predicting Optimized Link State Routing Protocol Control Message Overhead in MANETs
7th Workshop on Wireless and Mobile Ad-Hoc Networks (WMAN 2013) in conjunction with Networked Systems 2013, Stuttgart, Germany, Mar 11, 2013
Extending ODMRP for On-Site Deployments in Disaster Area Scenarios
32nd IEEE International Performance Computing and Communications Conference (IPCCC'2013), San Diego, USA, p. 1-10, Dec 6-8, 2013
http://dx.doi.org/10.1109/PCCC.2013.6742790
Patterns of a Cooperative Malware Analysis Workflow
Proc. of the 5th International Conference on Cyber Conflict (CyCon'2013), Tallinn, Estonia, June 4-7, 2013
P2PWNED: Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P 2013), San Francisco, CA, USA, May 19-22, 2013
http://www.christian-rossow.de/publications/p2pwned-ieee2013.pdf
2012
Proc. of the 7th Security Research Conference, Future Security 2012
Vol. 318: September 2012
A Security Architecture and Modular Intrusion Detection System for WSNs
Proc. of the 9th International Conference on Networked Sensing Systems (INSS), Antwerp, Belgium, p. 1-8, Jun. 11-14, 2012
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06240521
Let's Move: Adding Arbitrary Mobility to WSN Testbeds
Proc. of the 21st International Conference on Computer Communication Networks (ICCCN), Munich, Germany, Jul./Aug. 30-2, 2012
Selective and Secure Over-The-Air Programming for Wireless Sensor Networks
Proc. of the 5th International Workshop on Sensor Networks (SN 2012) in conjunction with the 21st International Conference on Computer Communication Networks (ICCCN'12), Munich, Germany, Jul./Aug. 30-2, 2012
Applicability of Crypto-based Security Approaches in Tactical Wireless Multi-hop Networks
Local Computer Networks (LCN), 2012 IEEE 37th Conference on, Clearwater, Florida, USA, Oct. 22-25, 2012
Automatic Extraction of Domain Name Generation Algorithms from Current Malware
RTO-IST-111/RSY-026 Symposium, Koblenz, Germany, September 24-26, 2012
FKIE Cyber Defense and Sensor Data Fusion: Teaming Up for Better Botnet Detection
Poster at the 7th Future Security, Bonn, Germany, September 04-06, 2012
Network Traffic Characteristics for Detecting Future Botnets
Military Communications and Information Systems Conference (MCC), Danzig, Poland, October 08-09, 2012
Adaptive Hello for the Neighborhood Discovery Protocol
Local Computer Networks (LCN), 2012 IEEE 37th Conference on, Clearwater, Florida, USA, Oct. 22-25, 2012
Platform-Independent Recognition of Procedures in Binaries Based on Simple Characteristics
it - Information Technology, No. 2, München, Germany, Vol. 54: p. 64-70, April 2012
Towards Sound Forensic Acquisition of Volatile Data
Proc. of the 7th Security Research Conference, Future Security 2012, Bonn, Germany, Vol. 318: p. 289-298, September 04-06, 2012
A Scalable Approach for a Distributed Network of Attack Sensors
ERCIM-News, No. 90, Vol. 2012: p. 20, July 2012
http://ercim-news.ercim.eu/en90/special/a-scalable-approach-for-a-distributed-network-of-attack-sensors
Erkennung neuer Schadprogramme
digma - Zeitschrift für Datenrecht und Informationssicherheit, Vol. 2012: December 2012
HoneypotMe - Effektivere Honeypots durch Sensoren auf Produktivsystemen
ADMIN-Magazin, Vol. 2012: p. 90, July/August 2012
HoneypotMe - Extending Honeypot Sensors to Production Systems
Poster at the 7th Future Security, Bonn, Germany, September 04-06, 2012
HoneypotMe - Flexible Auslagerung von Honeypot-Sensorik auf gefährdete Endgeräte
Proc. of the 19th DFN Workshop "Sicherheit in vernetzten Systemen", Hamburg, Germany, February 21-22, 2012
Current Botnet-Techniques and Countermeasures
PIK - Praxis der Informationsverarbeitung und Kommunikation, Vol. 35: p. 3-10, April 2012
Bot-Netze: Der Feind im eigenen Haus - Gekaperte Rechner bedrohen Unternehmen und Behörden
Sicherheitstechnischer Report, Bonn, Germany, Vol. 2012: April 2012
CIS: The Crypto Intelligence System for Automatic Detection and Localization of Cryptographic Functions in Current Malware
Proc. of the 7th International Conference on Malicious and Unwanted Software, MALWARE, Fajardo, Puerto Rico, October 16-18, 2012
A Case Study of the Miner Botnet
Proc. of the 4th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, June 05-08, 2012
Aktuelles aus der Welt der Botnetze
IT-Report, Bonn, Germany, Mai 2012
Das schwächste Glied - Wie sich Unternehmen und Behörden vor Cyber-Attacken schützen können
Sicherheitstechnischer Report, Bonn, Germany, Vol. 2012: April 2012
Malware and Botnet Analysis Methodology
ERCIM-News, No. 90, Vol. 2012: p. 22, July 2012
http://ercim-news.ercim.eu/en90/special/malware-and-botnet-analysis-methodology
AntiRE - An Executable Collection of Anti-Reversing Techniques
Proceedings of the Seventh GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), No. SR-2012-01, Berlin, Germany, p. 23, July 5-6, 2012
http://www.sec.t-labs.tu-berlin.de/spring/content/spring7-book_of_abstracts.pdf
A Honeypot for Arbitrary Malware on USB Storage Devices
7th International Conference on Risks and Security of Internet and Systems (CriSIS), Cork, Ireland, October 10-12, 2012
PDF Scrutinizer: Detecting JavaScript-based Attacks in PDF Documents
Proc. of the 10th Annual Conference on Privacy, Security and Trust (PST), Paris, France, July 16-18, 2012
Using Infection Markers as a Vaccine against Malware Attacks
Proc. of the 2nd Workshop on Security of Systems and Software resiLiency, 3SL, Besancon, France, November 20-23, 2012
2011
Nils Aschenbruck, Jan Bauer, Jakob Bieling, Alexander Bothe, Matthias SchwambornWSNLab - a Security Testbed and Security Architecture for WSNs
Demo at the 36th IEEE Conference on Local Computer Networks (LCN), Bonn, Germany, Oct. 4-7, 2011
http://www.ieeelcn.org/prior/LCN36/lcn36demos/lcn-demo2011_aschenbruck_2.pdf
WSNLab - A Security Testbed for WSNs
Proc. of the 6th Future Security Research Conference, Berlin, Germany, p. 575-579, Sep. 5-7, 2011
A Mesh-based Command and Control Sensing System for Public Safety Scenarios
Demo at the 9th ACM Conference on Embedded Networked Sensor Systems (SenSys), Seattle, Washington, USA, p. 395-396, Nov. 1-4, 2011
http://doi.acm.org/10.1145/2070942.2071007
Deploying a Mesh-based Command and Control Sensing System in a Disaster Area Maneuver
Poster at the 9th ACM Conference on Embedded Networked Sensor Systems (SenSys), Seattle, Washington, USA, p. 335-336, Nov. 1-4, 2011
http://doi.acm.org/10.1145/2070942.2070977
Parametrization of Terrestrial Ad-Hoc Routing Protocols for Tactical Underwater Networks
Proc. of the 4th International Workshop on Tactical Mobile Ad Hoc Networking in conjunction with the 12th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc), Paris, France, May 16, 2011
Practical Network Challenges with Multistatic Sonar Systems
Proc. of the 4th Conference and Exhibition on Underwater Acoustic Measurements: Technologies and Results (UAM), Island of Kos, Greece, Jun. 20-24, 2011
http://promitheas.iacm.forth.gr/UAM_Proceedings/uam2011/UAM2011%20Paper%2028.9.pdf
An Integrated Simulation Environment for Sensor Data Fusion Applications in Wireless Mesh Networks
Proc. of the Military Communications Conference (MILCOM), Baltimore, Maryland, USA, p. 1778-1783, Nov. 7-11, 2011
http://xplqa30.ieee.org/stamp/stamp.jsp?tp=&arnumber=6127569
STMP - Sensor data transmission and management protocol
Local Computer Networks (LCN), 2011 IEEE 36th Conference on, Bonn, Germany, p. 475-483, Oct. 4-7, 2011
http://dx.doi.org/10.1109/LCN.2011.6115509
Demonstration of the Sensor Data Transmission and Management Protocol (STMP)
Demo at the 36th IEEE Conference on Local Computer Networks (LCN), Bonn, Germany, Oct. 4-7, 2011
http://www.ieeelcn.org/prior/LCN36/lcn36demos/lcn-demo2011_aschenbruck.pdf
Trace-based Mobility Modeling for Multi-hop Wireless Networks
Computer Communications, Vol. 34: p. 704-714, May 2011
http://dx.doi.org/10.1016/j.comcom.2010.11.002
Scalability of iBGP Path Diversity Concepts
Proceedings of the 10th IFIP Networking 2011, Valencia, Spain, May 2011
The Scope of the iBGP Routing Anomaly Problem
Proceedings of the 17th Communication in Distributed Systems (KIVS), Kiel, Germany, March 2011
An Experimental Architecture of IP-based Network Control of Laser Show Projection Systems
The 36th IEEE Conference on Local Computer Networks (LCN), Bonn, Germany, October 2011
https://www.ieeelcn.org/prior/LCN36/lcn36demos/lcn-demo2011_frank.pdf
A Survey on Indoor Tracking for Mission Critical Scenarios
Pervasive and Mobile Computing, No. 1, Vol. 7: p. 1-15, February 2011
http://www.sciencedirect.com/science/article/B7MF1-50HYGH0-1/2/fdc40d80a0ac900096f516795c88e62e
TOGBAD - An Approach to Detect Routing Attacks in Tactical Environments
Security and Communication Networks, Vol. 4: p. 793-806, Aug. 2011
http://dx.doi.org/10.1002/sec.185
TOGBAD-LQ - Using Challenge-Response to Detect Fake Link Qualities
17th GI/ITG Conference on Communication in Distributed Systems (KiVS 2011), Kiel, Germany, Vol. 17: p. 85-96, March 08-11, 2011
http://drops.dagstuhl.de/opus/volltexte/2011/2960
Wormhole Detection using Topology Graph based Anomaly Detection
6th Workshop on Wireless and Mobile Ad-Hoc Networks, WMAN, Kiel, Germany, March 10, 2011
http://journal.ub.tu-berlin.de/eceasst/article/view/503/551
Botnets: 10 Tough Questions
Heraklion, Greece, March 07, 2011
http://www.enisa.europa.eu/activities/Resilience-and-CIIP/networks-and-services-resilience/botnets/botnets-10-tough-questions/at_download/fullReport
Botnets: Detection, Measurement, Disinfection & Defence
Heraklion, Greece, March 07, 2011
http://www.enisa.europa.eu/activities/Resilience-and-CIIP/networks-and-services-resilience/botnets/botnets-measurement-detection-disinfection-and-defence/at_download/fullReport
Botnets: Detection, Measurement and Defense
Proc. of the 6th Future Security, Berlin, Germany, p. 562-567, September 05-07, 2011
Automatic Estimation of Performance Requirements for Software Tasks of Mobile Devices
ICPE'11: Proceedings of the 2nd ACM/SPEC International Conference on Performance Engineering, Karlsruhe, Germany, Mar 2011
http://icpe2011.ipd.kit.edu
2010
Nils Aschenbruck, Raphael Ernst, Elmar Gerhards-Padilla, Matthias SchwambornBonnMotion - a Mobility Scenario Generation and Analysis Tool
SIMUTools2010, 3rd International ICST Conference on Simulation Tools and Techniques, Torremolinos, Málaga, Spain, Mar 15-19, 2010
Evaluation of Wireless Multi-Hop Networks in Tactical Scenarios using BonnMotion
16th European Wireless Conference, Lucca, Tuscany, Italy, Apr 12-15, 2010
Indoor Mobility Modeling
IEEE Global Communications Conference (IEEE GLOBECOM 2010), Miami, Florida, USA, Dec 6-10, 2010
Intrusion Detection in Hierarchically Structured Wireless Multi-Hop Networks
Proc. of the 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies, Special session on ICT for Development and Disaster Recovery (ISABEL), Rome, Italy, November 7-10, 2010
Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop Networks
Proc. of the 7th Workshop on Wireless Ad hoc and Sensor Networks (WWASN), Genoa, Italy, June 25, 2010
Optimizing ODMRP for Underwater Networks
Proc. of the Military Communications Conference (MILCOM), San Jose, CA, USA, p. 623-628, Oct./Nov. 31-3, 2010
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=5680458
An Efficient GPU Implementation of the Revised Simplex Method
Proceedings of the 24th IEEE International Parallel and
Distributed Processing Symposium (IPDPS'10), 12th Workshop on Advances
in Parallel and Distributed Computational Models (APDCM'10), Atlanta, Georgia, USA, April 2010
Root Causes for iBGP Routing Anomalies
Proceedings of the 35th IEEE Conference on Local Computer Networks (LCN 2010), Denver, Colorado, USA, October 2010
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Proceedings of Workshop on Ethics in Computer Security Research (WECSR 2010), Tenerife, Canary Islands, Spain, Jan 28, 2010
Evaluation of Network Effects on the Kalman Filter and Accumulated State Density Filter
Proc. of the 2nd International Workshop on Cognitive Information Processing (CIP2010), Elba Island, Italy, June 14-16, 2010
PyBox - A Python approach to sandboxing
Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), No. SR-2010-01, Bonn, Germany, p. 4, July 7, 2010
https://eldorado.tu-dortmund.de/bitstream/2003/27336/1/BookOfAbstracts_Spring5_2010.pdf
Using Value Set Analysis for Classification of metamorphic Malware Samples
CARO Workshop, Helsinki, Finland, May 26-27, 2010
2009
Nils Aschenbruck, Christoph Fuchs, Peter MartiniTraffic Characteristics and Modeling of Emergency Calls at the PSAP
Proc. of the 17th Annual IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, London, UK, Sep. 21-23, 2009
Modeling Mobility in Disaster Area Scenarios
Elsevier Performance Evaluation, 2009
Modelling Mobility in Disaster Area Scenarios
Performance Evaluation, Vol. 66: p. 773-790, December 2009
http://dx.doi.org/10.1016/j.peva.2009.07.009
Modeling Public Safety Scenarios to Evaluate Wireless Communication Systems
Proc. of the Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Aalborg, Denmark, Oct. 17-20, 2009
An Inherently Anomaly-free iBGP Architecture
Proceedings of the 34rd IEEE Conference on Local Computer Networks (LCN 2009), Zurich, Switzerland, October 2009
Scalability Analysis and Evaluation of the Multi-domain, Optical Network Service Plane in Harmony
Published on the 35th European Conference and Exhibition on Optical Communication, Austria Center Vienna, Austria, 9 2009
Performance Analysis of Harmony: An Optical, Multi-domain Network Resource Broker
11th International Conference on Transparent Optical Networks, June 2009
Network based real-time control of a laser show projection system
The 34th IEEE Conference on Local Computer Networks (LCN), Zurich, Switzerland, October 2009
https://www.ieeelcn.org/prior/LCN34/lcn34demos/lcn-demo2009_frank.pdf
Intrusion Detection in Tactical Multi-hop Networks
Demo on 34th IEEE Conference on Local Computer Networks (LCN), Zürich, Switzerland, October 20-23, 2009
Neuartige Gefahrenbewertung von Schadsoftware
Proc. of the 16th DFN Workshop "Sicherheit in vernetzten Systemen", Hamburg, Germany, March 17-18, 2009
Rao-Blackwellized Particle Filter for Security Surveillance
Proc. of the 39. Congress of the "Gesellschaft für Informatik", Lübeck, Germany, September 28-02, 2009
Validating GrADAR - An Approach for Graph-based Automated DoS Attack Response
Proc. of the 34. IEEE Conference on Local Computer Networks (LCN2009), Zurich, Switzerland, 2009
Enhancing Graph-based Automated DoS Attack Response
Proc. of the Cyber Warfare Conference, Cooperative Cyber Defense Centre of Excellence (CCD-CoE), Tallinn, Estonia, 2009
NGBPA Next Generation BotNet Protocol Analysis
Proc. of the 24th International Information Security Conference, Paphos, Cyprus, April 2009
Finding and Extracting Crypto Routines from Malware
Proceedings of the 2nd IEEE International Workshop on Information and Data Assurance (WIDA'09), Phoenix, Arizona, USA, December 14, 2009
Classification and Detection of Metamorphic Malware using Value Set Analysis
Proc. of 4th International Conference on Malicious and Unwanted Software (Malware 2009), Montreal, Canada, October 2009
Containing Conficker - To Tame A Malware
March 2009
Proactive Botnet Countermeasures - An Offensive Approach
Proc. of 1st CCDCEO Conference on Cyber Warfare, Tallinn - Estonia, June 17-19, 2009
Good News for Parallel Wireless Network Simulations
Proceedings of the 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM'09), Tenerife, Canary Islands, Spain, October 2009
A Practical Approach for Performance-Driven UML Modelling of Handheld Devices - A Case Study
Journal of Systems and Software, Volume 82, Issue 1, Special Issue: Software Performance - Modeling and Analysis, 2009
Möglichkeiten zur Eingrenzung der Kollisionstelle auf der Fahrbahn anhand des Splitterfeldes
In the Proceedings of the XVIII. International Scientific Conference on Forensic Engineering, Brno, Czech Republic, January 23-24, 2009
Towards Comparable Simulations of Cooperating Objects and Wireless Sensor Networks
1st International Workshop on Performance Methodologies and Tools for Wireless Sensor Networks, Pisa, Italy, Oct. 23, 2009
Nebula - Generating Syntactical Network Intrusion Signatures
Proc. of 4th International Conference on Malicious and Unwanted Software (Malware 2009), Montreal, Canada, October 2009
Harmony: Advance Reservations in Heterogeneous Multi-domain Environments
Proceedings of the 8th IFIP Networking conference, Springer's LNCS, Aachen, Germany, 5 2009
2008
Nils Aschenbruck, Elmar Gerhards-Padilla, Marko Jahnke, Gabriel Klein, Alexander WenzelIntrusion Detection in Tactical Multi-hop Networks
Demo on 14th Annual International Conference on Mobile Computing and Networking (Mobicom), San Francisco, USA, September 14-19, 2008
A Survey on Mobility Models for Performance Analysis in Tactical Mobile Networks
Journal of Telecommunications and Information Technology (JTIT), Vol. 2: p. 54-61, 2008
Evaluation and Parameterization of Voice Traffic Models for Disaster Area Scenarios
Proc. of the 33rd IEEE Conference on Local Computer Networks, Montreal, Canada, Oct. 14-17, 2008
Distribution of Nodes in Disaster Area Scenarios and its Impact on Topology Control Strategies
Proc. of the 2nd Workshop on Mission-Critical Networking in conjunction with the IEEE Infocom, Phoenix, AZ, USA, April 18, 2008
Optimization techniques for military multicast key management
Proceedings of the IEEE MILCOM 2008, San Diego, USA, Nov 17-19, 2008
Automatic Multicast IPSec by using a proactive IPSec Discovery Protocol and a Group Key Management
Journal of Telecommunications and Information Technology (JTIT), No. 2, p. 77-83, 2008
Mehrrobotersysteme in der vernetzten Operationsführung
Ergonomie und Mensch-Maschine-Systeme, p. 307-329, 2008
Timeslot-based Resource Management in Grid Environments
Proceedings of the IASTED Conference on Parallel and Distributed Computing and Networks (PDCN2008), Innsbruck, Austria, p. 22-31, February 2008
ARGON: Reservation in Grid-enabled Networks
Proceedings of the 1. DFN-Forum on Communication Technologies, Kaiserslautern, Germany, May 2008
Temporal Routing Metrics for Networks with Advance Reservations
Proceedings of the Workshop on High Performance Grid Networks, co-located with CCGrid 2008, Lyon, France, May 2008
A Divergence Analysis in Autonomous Systems using Full-mesh iBGP
Proceedings of the Sixth Annual Communication Networks and Services Research Conference (CNSR 2008), Halifax, Nova Scotia, Canada, p. 600-608, May 2008
Scalability Considerations for an Anomaly-free iBGP Routing
Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN 2008), Montreal, Quebec, Canada, p. 136-143, October 2008
Multicore Processing for Object Recognition in Mobile Devices
Proceedings of the embedded world Conference 2008, Nürnberg, Germany, February 26-27, 2008
The network service plane: An approach for inter-domain network reservations
Transparent Optical Networks, 2008. ICTON 2008. 10th Anniversary International Conference on, Vol. 1: June 2008
Detecting VoIP based DoS attacks at the Public Safety Answering Point
Proceedings of the ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, p. 148-155, March 18-20, 2008
Enhancements on and Evaluation of TOGBAD in Tactical MANETS
Proceedings of the 27th Military Communication Conference (MILCOM'08), San Diego, USA, November 17-19, 2008
Comparison and Improvement of Metrics for Selecting Intrusion Response Measures against DoS Attacks
Proceedings of the GI Sicherheit2008 Conference, Saarbrücken, Germany, Apr 2008
MITE - MANET Intrusion Detection for Tactical Environments
Proc. of the RTO IST-22-PBM Symposium, Ljubljana, Slovenia, October 15-17, 2008
Stormfucker: Owning the Storm Botnet
25C3, 25th Chaos Communication Congress, Berlin, Germany, Dec. 2008
Logical Process based Sequential Simulation Cloning
Proceedings of the 41st IEEE Annual Simulation Symposium (ANSS'08), Ottawa, Canada, p. 237-244, April 2008
Interval Branching
Proceedings of the 22nd IEEE/ACM/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'08), Rome, Italy, p. 99-108, June 2008
A Methodology for Performance Predictions of Future ARM Systems Modelled in UML
Proceedings of the 2nd Annual IEEE International Systems Conference Syscon 2008, Montreal, Canada, April 7-10, 2008
Using Representative Intervals for Trace-Based Performance Analysis of Mobile Phone Use Cases
Proceedings of the 24th UK Performance Engineering Workshop, London, UK, July 3-4, 2008
2007
Nils Aschenbruck, Elmar Gerhards-Padilla, Michael Gerharz, Matthias Frank, Peter MartiniModelling Mobility in Disaster Area Scenarios
Proc. of the 10th ACM-IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Chania, Crete Island, Greece, p. 4-12, October 22-26, 2007
A Survey on Mobility Models for Performance Analysis in Tactical Mobile Networks
Proc. of the Military Communications and Information Systems Conference, Bonn, Germany, September 25-26, 2007
Characterisation and Modelling of Voice Traffic in First Responder Networks
Proc. of the 32nd IEEE Conference on Local Computer Networks, Dublin, Ireland, p. 295-302, October 15-18, 2007
How to Assign Traffic Sources to Nodes in Disaster Area Scenarios
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, New Orleans, Louisiana, p. 289-296, April 11-13, 2007
Co-Allocating Compute and Network Resources - Bandwidth on Demand in the VIOLA Testbed
CoreGRID Symposium, Rennes, France, p. 193-202, August 2007
Experiments on Network Services for the Grid
Proceedings of the IEEE Local Computer Networks Conference, Dublin, Ireland, October 2007
Performance evaluation of a proactive link quality based uni- and multicast routing protocol for MANETs
Proceedings of 15. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen, KiVS, Berne, Switzerland, February 26-28, 2007
Parallelization of Radio Algorithms for Multi-Processor Platforms
Proc. of the 12th Int. OFDM-Workshop (InOWo'07), Hamburg, Germany, August 2007
Combining Cognitive Radio and Software Radio Approach for Low Complexity Receiver Architecture
Proceedings of the International Symposium on Advanced Radio Technologies (ISART), Boulder, Colorado, February 26-28, 2007
Detection of Attacks on Application and Routing Layer in Tactical MANETs
Proceedings of the Second GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), Dortmund, Germany, July 2007
Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs
Proceedings of the 3rd IEEE LCN Workshop on Network Security (WNS'07), Dublin, Ireland, p. 1043-1050, October 2007
Spezielle Sicherheitsrisiken für taktische mobile Adhoc-Netzwerke (MANETs)
Report Verlag IT-Report, p. 59-62, May 2007
Graph based Metrics for Intrusion Response Measures in Computer Networks
Proceedings of the 3rd IEEE LCN Workshop on Network Security (WNS'07), Dublin, Ireland, October 2007
Methodologies and Frameworks for Testing IDS in Adhoc Networks
Proc. of the 3-rd ACM International Workshop on QoS and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, p. 113-122, October 22, 2007
A Flexible Dynamic Partitioning Algorithm for Optimistic Distributed Simulation
Proceedings of the 21st IEEE/ACM/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'07), San Diego, California, USA, p. 219-228, June 2007
A Discrete-event Simulation Tool for the Analysis of Simultaneous Events
Proceedings of the 2nd International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'07), 1st International Workshop on Network Simulation Tools (NSTools'07), Nantes, France, October 2007
Analyzing Simultaneous Events in Distributed Simulation
Proceedings of the 4th International Mediterranean Modelling Multiconference (I3M'07), 19th European Modeling and Simulation Symposium (EMSS'07), Bergeggi, Italy, p. 29-36, October 2007
Efficient Analysis of Simultaneous Events in Distributed Simulation
Proceedings of the 11th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT'07), Chania, Crete Island, Greece, p. 244-251, October 2007
Performance Evaluation of a DVB-H Enabled Mobile Device System Model
Proceedings of the 6th International Workshop on Software and Performance WOSP 2007, Buenos Aires, Argentina, p. 164-171, February 5-8, 2007
Bestimmung der Kollisionsgeschwindigkeit bei Fußgängerunfällen
Proceedings of the XVI. EVU-Conference 2007: Uncertainty in Reconstruction of Road Accidents, Krakau, Poland, November 8-11, 2007
2006
Nils Aschenbruck, Matthias Frank, Peter Martini, Jens Tölle, Roland Legat, Heinz-Dieter RichmannPresent and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks
Proceedings of the Fourth IEEE International Workshop on Information Assurance, Royal Holloway, United Kingdom, p. 103-108, April 13-14, 2006
Modelling Voice Communication in Disaster Area Scenarios
Proceedings of the 31st IEEE Conference on Local Computer Networks LCN 2006, Tampa, Florida, p. 211-220, November 14-16, 2006
Co-Allocation of Compute and Network Resources in the VIOLA-Testbed
Terena Networking Conference 2006, Sicily, Italy, May 2006
Performance evaluation of a proactive link quality based uni- and multicast routing protocol for MANETs
No. FKIE/KOM-EFS/2006/01, December 2006
http://web.informatik.uni-bonn.de/IV/Mitarbeiter/dewaal/wnet-tr-2006.html
Improving Channel Estimation for Software Radios
Proceedings of the IASTED Conference on Communication Systems and Applications 2006, Banff, Canada, July 3-5, 2006
Towards an Efficient Branching Mechanism for Simultaneous Events in Distributed Simulation
Proceedings of the 20th IEEE/ACM/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'06), Singapore, p. 133, May 2006
Performance Aware Design of Communication Systems
Proceedings of the 31st IEEE Conference on Local Computer Networks LCN 2006, Tampa, Florida, p. 39-46, November 14-16, 2006
Impact of Sanitized Message Flows in a Cooperative Intrusion Warning System
Proc. of MILCOM 2006, Washington DC, USA, Oktober 2006
Dezentrale Sendeleistungsregelung zur Kapazitätssteigerung drahtloser Netze mit gemeinsam genutztem Übertragungskanal
March 2006
http://nbn-resolving.de/urn:nbn:de:hbz:5N-08281
2005
M. Amanowicz, P. Sevenich, J. Jarmakiewicz, M. PilzQuality of Service Support in IPv6-Based Military Networks with Limited Bandwidth
Proceedings of the RTO IST-054 Symposium on 'Military Communications', Rome, Italy, April 2005
Statistical Analysis of Traffic Measurements in a Disaster Area Scenario Considering Heavy Load Periods
Proceedings of the 2nd International Workshop on Wireless Ad-hoc Networks, IWWAN 2005, London, United Kingdom, May 23-26, 2005
Traffic Measurement and Statistical Analysis in a Disaster Area Scenario
Proceedings of the 1st Workshop on Wireless Network Measurements, WiNMee 2005, Trentino, Italy, April 3, 2005
Geocast Routing - Performance of LBM and GeoGRID
Proceedings of the 3rd German Workshop on Mobile Ad-Hoc Netzworks, WMAN 2005, Bonn, Germany, September 21, 2005
Optimization techniques for military multicast key management
Proceedings of the IEEE MILCOM 2005, Atlantic City, USA, Vol. 4: p. 2570-2576, Oct 17-20, 2005
Receiver-Based Path Capacity Estimation for TCP
KIVS'05, Kaiserslautern, Germany, February/March 2005
Evaluation Architecture For Digital Radio Mondiale Multimedia Applications
Proc. of the IASTED International Conference on Communication Systems and Applications (CSA 2005), Banff, Canada, July 2005
Analyzing the Effect of Cooperation Approaches
10th IFIP International Conference on Personal Wireless Communications, PWC'05, Colmar, 2005
A Cooperative Nearest Neighbours Topology Control Algorithm for Wireless Ad Hoc Networks
Telecommunication Systems, No. 3-4, Vol. 28: p. 317-331, March 2005
http://www.springerlink.com/openurl.asp?genre=article&issn=1018-4864&volume=28&issue=3&spage=317
Estimating the Value of Co-operation Approaches for Multihop Ad Hoc Networks
Elsevier Ad Hoc Networks Journal, Januar 2005
Resource Management in Tactical Military Networks
Proceedings of the RTO IST-054 Symposium on 'Military Communications', Rome, Italy, April 2005
IPv6 based OverDRiVE Moving Networks for Vehicles
IEEE Vehicular Technology Society (VTS) News, No. 4, Vol. 52: November 2005
2004
Nils Aschenbruck, Matthias Frank, Wolfgang Hansmann, Peter Martini, Christoph Scholz, Jens TölleIntegration of 3G Protocols into the Linux Kernel to Enable the Use of Generic Bearers
Proceedings of 7th IEEE International Conference on High Speed Networks and Multimedia Communications, HSNMC'04, No. 3079, Toulouse, France, June/July 30-2, 2004
Human Mobility in MANET Disaster Area Simulation - A Realistic Approach
Proceedings of the Fourth International IEEE Workshop on Wireless Local Networks, WLN 2004, Tampa, Florida, November 16-18, 2004
Using Key Trees for Securing Military Multicast Communication
IEEE MilCom 2004, Monterey, USA, 2004
CineMA: Cooperation Enhancement in Manets
LCN 2004, Tampa, USA, 2004
Influence of Transmission Power Control on the Transport Capacity of Wireless Multihop Networks
Proc. of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Barcelona, Spain, p. 1016-1021, September 2004
How To Discover Optimal Routes In Wireless Multihop Networks
Proc. of the 6th IFIP IEEE International Conference on Mobile and Wireless Communication Networks (MWCN), Paris, France, p. 323-334, October 2004
The Effective QoS Mechanism for Real Time Services in IP Military Network
6th NATO RCMCIS, Zegrze, Poland, October 6-8, 2004
An Efficient Transport Capacity Estimation Method for Wireless Multihop Network Topologies
Proceedings of the 34th Annual Conference of the Gesellschaft für Informatik, 2nd German Workshop on Mobile Ad-hoc Networks (WMAN), Ulm, Germany, Vol. 1: p. 90-94, September 2004
IPv6-based OverDRiVE Moving Networks: Mobility Management and Testbed Implementation
13th IST Summit on Mobile and Wireless Communications, Lyon, France, June 27-30, 2004
2003
Markus Albrecht, Rolf Göpffarth, Matthias FrankA scalable method for treating bottlenecks in a dynamically controlled DiffServ environment
Proceedings of the 28th Annual Conference on Local Computer Networks LCN 2003, Königswinter, October 2003
A Worst-Case Model for Co-Channel Interference in the Bluetooth Wireless System
Proc. of the 28th IEEE Conference on Local Computer Networks (LCN) 2003, Bonn/Königswinter, Germany, October 2003
Network Access Control in OverDRiVE Mobile Networks
12th IST Summit on Mobile and Wireless Communications, Aveiro, Portugal, June 15-18, 2003
Access Control in Vehicular Environments: Challenges and Approaches
ITG/IEEE Workshop on Multiradio Multimedia Communications (MMC 2003) - Communication Technology for Vehicles, Dortmund, Germany, February 2003
A new Framework for the Analysis of Simultaneous Events
Proc. of SCSC'03 (Summer Computer Simulation Conference), Montreal, Canada, July 2003
Complementary Topics for Moving Networks -Dynamic IVAN Management and Intra-Vehicular Mobility
HyWiN workshop, Turin, Italy, December 2003
Adaptive Access Regulation for VBR Video Streams
Interactive Multimedia on Next Generation Networks, No. 2899, p. 16-29, 2003
Exploiting Decoder Schedules for the Stabilization of Internet Video Streams in Bottlenecks
Proc. 13th Packet Video Workshop 2003, Nantes, France, April 2003
Current Approaches Towards Improved Quality-of-Service Provision in Mobile Ad-hoc Networks
March 2003
http://web.informatik.uni-bonn.de/IV/Mitarbeiter/dewaal/qos-report.html
A Practical View on Quality-of-Service Support in Wireless Ad Hoc Networks
Proc. of the 3rd IEEE Workshop on Applications and Services in Wireless Networks (ASWN), Berne, Switzerland, p. 185-196, July 2003
A Cooperative Nearest Neighbours Topology Control Algorithm for Wireless Ad Hoc Networks
Proc. of the 12th International Conference on Computer Communications and Networks (ICCCN) 2003, Dallas, Texas, p. 412-417, October 2003
http://web.informatik.uni-bonn.de/IV/Mitarbeiter/dewaal/icccn03.html
Strategies for Finding Stable Paths in Mobile Wireless Ad Hoc Networks
Proc. of the 28th IEEE Conference on Local Computer Networks (LCN) 2003, Bonn/Königswinter, Germany, p. 130-139, October 2003
http://web.informatik.uni-bonn.de/IV/Mitarbeiter/dewaal/lcn03.html
On Things to happen during a TCP Handover
28th Annual Conference on Local Computer Networks, LCN'03, Königswinter, Germany, October 2003
Laboratory and "Field" Experiments with IPv6 Mobile Networks in Vehicular Environments
June 2003
http://www.mobilenetworks.org/nemo/drafts/draft-lach-nemo-experiments-overdrive-01.txt
About the impact of Co-operation Approaches for Ad Hoc Networks
ACM MobiHoc 2003: The Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Annapolis, Maryland, USA, Juni 2003
Analysis of Co-operation Approaches in Ad Hoc Networks
WiOpt'03: Modeling and Organization in Mobile, Ad Hoc and Wireless Networks, INRIA Sophia-Antipolis, France, März 2003
In-Vehicular Mobile Router: Challenges and Approaches
ITG/IEEE Workshop on Multiradio Multimedia Communications (MMC 2003) - Communication Technology for Vehicles, Dortmund, Germany, February 2003
2002
S. Baatz, Ch. Bieschke, M. Frank, C. Kühl, P. Martini, Ch. ScholzBuilding Efficient Bluetooth Scatternet Topologies from 1-Factors
Proc. of the IASTED International Conference on Wireless and Optical Communications, WOC 2002, Banaff, Alberta, Canada, p. 300-305, July 2002
Bluetooth Scatternets: An Enhanced Adaptive Scheduling Scheme
Proc. of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2002, New York, p. 782-790, June 2002
Link Stability in Mobile Wireless Ad Hoc Networks
Proc. of the 27th IEEE Conference on Local Computer Networks (LCN) 2002, Tampa, Florida, p. 30-39, November 2002
Performance Analysis of TCP Handover in a Wireless/Mobile Multi-Radio Environment
Proceedings of the 27th Annual Conference on Local Computer Networks, LCN'02, Tampa, FL, USA, November 2002
Network Traffic Description with Protocol Specific Profiles Based on Separate Treatment of Tail Components
Proc. of Applied Simulation and Modelling (ASM) 2002, Crete, Greece, 2002
METHOD AND APPARATUS OF PRIORITISING THE USAGE OF SLOTTED LINKS BY SINGLE NETWORK DEVICES IN A WIRELESS NETWORK
Patent Cooperation Treaty (PCT) Publication, International Publication Number WO 02/080471 A1, 2002
Secure Shell Proxy Intrusion Detection
Proc. of R.T.O. Information Systems Technology Panel Symposium on Real Time Intrusion Detection 2002, Estoril, Portugal, 2002
A Simple Traffic Model Using Graph Clustering For Anomaly Detection
Proc. of Applied Simulation and Modelling (ASM) 2002, Crete, Greece, 2002
2001
M. Albrecht, M. Köster, P. MartiniCongestion Handling in Dynamic Differentiated Services Networks
Proc. of the 26th Annual Conference on Local Computer Networks, LCN 2001, Tampa, FL, USA, November 2001
Adaptive Scatternet Support for Bluetooth using Sniff Mode
Proc. of the 26th Annual Conference on Local Computer Networks, LCN 2001, Tampa, Florida, p. 112-120, November 2001
Apparatus, and Associated Method, for Facilitating Communication
Patent Cooperation Treaty (PCT) Publication, International Publication NumberWO 01/20940 A1, 2001
Mobility management in a hybrid radio system
RSRCP Journal - Reseaux et systemes repartis, calculateurs paralleles, Special Issue on Mobility and Internet, Vol. 13: 2001
Visualization of Traffic Structures
Proc. of the International Conference on Communications (ICC) 2001, Helsinki, Finland, June 2001
Flexible Network Architecture for Future Hybrid Wireless Systems
IST Mobile Communications Summit 2001, Barcelona, Spain, 2001
IPv6 based Infrastructure for Wireless IP in Multi-Radio Environments with Quality of Service Support
Proceedings of the 26th Annual Conference on Local Computer Networks, LCN'01, Tampa, FL, USA, November 2001
2000
M. Albrecht, M. Köster, P. Martini, M. FrankEnd-to-end QoS Management for Delay-sensitive Scalable Multimedia Streams over Di.Serv
Proc. of the 25th Annual Conference on Local Computer Networks, LCN 2000, Tampa, FL, USA, November 2000
Handoff Support for Mobility with IP over Bluetooth
Proc. of the 25th Annual Conference on Local Computer Networks, LCN 2000, Tampa, FL, USA, November 2000
Security of Routing Cache Updates in Cellular IP
Proc. of the 25th Annual Conference on Local Computer Networks, LCN 2000, Tampa, FL, USA, November 2000
Supporting Intrusion Detection by Graph Clustering and Graph Drawing
RAID (Recent Advantages of Intrusion Detection), Toulouse, 2000
Architecture for a Future Generation Multi-Access Wireless System with Dynamic Spectrum Allocation
IST Mobile Communications Summit 2000, Galway, Ireland, October 1-4, 2000
DRiVE-ing to the Internet: Dynamic Radio for IP Services in Vehicular Environments
Proc. of the 25th Annual Conference on Local Computer Networks, LCN 2000, Tampa, FL, USA, November 2000
1999
M. Albrecht, M. Frank, P. MartiniBluetooth Architecture and Services Overview: The Role of IP and Quality of Service Issues
First Workshop on IP Quality of Service for Wireless and Mobile Networks, IQWiM 1999, Aachen, 1999
IP Services over Bluetooth: Leading the Way to a New Mobility
Proc. of the 24th Annual Conference on Local Computer Networks, LCN 1999, Boston, MA, 1999
Praktische Erfahrungen mit der Implementierung eines DNS-Protokoll-Intrusion-Detection-Systems
Proceedings of KiVS 1999, 1999
Flow Aggregation and Scalability with ROBIN: End-to-End Regulation of Bandwidth in Intra- Networks
Proc. of the 24th Annual Conference on Local Computer Networks, LCN 1999, Boston, MA, 1999
The ILDA Standard Projector
No. Revision 002, 1999
Eine Erweiterung der Transportebene zur Bandbreitenregelung auf Ende-zu-Ende Basis
Praxis der Informationsverarbeitung und Kommunikation, PIK 22 (1), 1999
Das europäische Projekt AMUSE - Der HFR-Feldversuch in München
Der Fernmeldeingenieur, No. 7+8, 1999
Experiences with Simultaneous Events Using Discrete-Event Simulation
IASTED International Conference: Modelling and Simulation 1999, MS 1999, Philadelphia, PA, 1999
1998
J. Charzinski, J. Färber, M. Frank, U. GremmelmaierThe AMUSE Residential Multimedia Trials: Network Architecture, Usage Measurement and Modelling
9th IEEE Workshop on Local and Metropolitan Area Networks, Banff, May 1998
The AMUSE Residential Multimedia Trials: Phase 1 Monitoring Results Summary
3rd European Conference on Networks & Optical Communications, NOC, Manchester, June 1998
Fairness and Delay/Loss Study of an End-to-End Bandwidth Regulation Scheme
23rd Annual Conference on Local Computer Networks, LCN `98, Boston, October 1998
Motivation of an End-to-End Regulation of Bandwidth in Intra-Networks: The ROBIN Concept
8th IFIP Conference on High Performance Networking, HPN '98, Vienna, September 1998
Performance Analysis of an End-to-End Bandwidth Regulation Scheme
Sixth International Symposium of Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS, Montreal, July 1998
Practical Experience with ROBIN: End-to-End Regulation Of Bandwidth in Intra-Networks
9th IEEE Workshop on Local and Metropolitan Area Networks, Banff, May 1998
Prototype Implementation and Simulation Study of an End-to-End Bandwidth Regulation Scheme
3rd European Conference on Networks & Optical Communications, NOC, Manchester, June 1998
1997
W. Breipohl, C. Johansson, P. Martini, J. Steiger, D. Ingram, H. YoungRecent Trends towards Online Education and Consultation in Medicine in Europe
Proc. of the Asia-Pacific Conference on the Formation of a Regional Network for Higher Education and Research: Policies, Strategies and Administration, 1997
The AMUSE Residential Multimedia Trials: Network Architecture and First Results
European Conference on Networks & Optical Communications, NOC, Jun 1997
http://web.informatik.uni-bonn.de/IV/martini/Forschung/Publikationen/noc97.ps.zip
Multimedia Service Provisioning in the Munich Trial of the AMUSE Project
2nd Europoean Conference on Multimedia Applications, Services and Techniques, ECMAST, May 1997
http://web.informatik.uni-bonn.de/IV/martini/Forschung/Publikationen/ecmast97.ps.zip
The WWW-Service in the AMUSE Field Trials: Usage Evaluation and Traffic Modelling
EXPERT ATM Traffic Symposium, Mykonos, Sept 1997
http://web.informatik.uni-bonn.de/IV/martini/Forschung/Publikationen/expert97.ps.zip
Practical Experiences with a Transport Layer Extension for End-to-End Bandwidth Regulation
22nd Annual Conference on Computer Networks, LCN `97, Minneapolis, Nov 1997
http://web.informatik.uni-bonn.de/IV/martini/Forschung/Publikationen/lcn97.ps.zip
Das europäische Projekt AMUSE - Der HFC-Feldversuch in München -
Der Fernmeldeingenieur, No. 1+2, 1997
Telecommunication Technologies of Online Education in Medicine
Proc. of the Asia-Pacific Conference on the Formation of a Regional Network for Higher Education and Research: Policies, Strategies and Administration, 1997
Tolerant Synchronization for Distributed Simulations of Interconnected Computer Networks
Proceeding of the '11th Workshop on Parallel and Distributed Simulation (PADS97)', IEEE, June 1997
Medical Training via World Wide Web
European Workshop on Multimedia Technologies in Medical Training, Sep 1997
Parallele und verteilte Simulation von gekoppelten Rechnernetzen mit hybrider, toleranter Synchronisation auf Workstation-Clustern
Proceedings of the 'Arbeitsplatz-Rechensysteme, (APS97)', GI-ITG 1997, May 1997
Dynamic Bandwidth Allocation for Stored VBR Video in ATM End Systems
Seventh IFIP Conference on High Performance Networking (HPN'97), White Plains, New York, USA, April/May 28-2, 1997
Concepts for IP Multicast over ATM
Multicast for Multimedia: An International Workshop, University of Mannheim and ICSI Berkeley, Februar 28, 1997
Leistungsbewertung von Bridges mit unterschiedlichen Prioritäten durch parallele und verteilte Simulation
May 1997
1996
M. AlbrechtEntwurf und Implementierung eines Multicast-Transportprotokolls zur Übertragung von Video-Daten
Mar 1996
Performance Evaluation of Multimedia Systems in the AMUSE-Project
8th IEEE Workshop on Local and Metropolitan Area Networks, Aug 1996
A Priority Based Multicast Video Transport Protocol
8th IEEE Workshop on Local and Metropolitan Area Networks, Aug 1996
Automatische Generierung und Optimierung paralleler Implementierungen von Transportprotokollen
Feb 1996
Real-Time Communication in Shared-Medium High Speed LANs
High-Speed Networking for Multimedia Applications, 1996
On the Scalability of the Demand-Priority LAN - A Performance Comparison to FDDI for Multimedia Scenarios
Proc. of the 1996 International Zurich Seminar on Digital Communications, p. 149-160, 1996
Dynamische Bandbreitenreservierung fuer VBR MPEG-2 Videos in ATM Endsystemen
Doktorandentreff Heidelberg, Stuttgart, Mannheim, University of Mannheim, March 8, 1996
MARS and IP Multicast Router as ATM-Multicast-Server: Solutions to Provide IP Multicast Services in Local ATM Networks
8th IEEE Workshop on LOCAL and Metropolitan Area Networks, Potsdam, Germany, August 26-28, 1996
Comparison of Concepts for IP Multicast over ATM
IEEE ATM Workshop'96, San Francisco, CA, August 26-28, 1996
Leistungsbewertung netzübergreifender Videoübertragungen in zell- und rahmenbasierten Hochgeschwindigkeitsnetzen
May 1996
1995
M. Frank, P. Martini, M. RümekastenSimCom - A Simulator for Interconnected Heterogeneous Networks
7th European Simulation Symposium, SCS, Oct 1995
Performance Analysis of the Demand-Priority LAN
Proc. of the 6th IFIP International Conference on High Performance Networking, HPN'95, p. 255-266, 1995
Real-Time Communication in the Demand-Priority LAN - The Effects on Normal Priority Traffic
Proc. of the 20th Annual Conference on Local Computer Networks, p. 350-357, 1995
Improving the Demand-Priority Protocol
Proc. of ICCCN '95, p. 369-376, 1995
Design und Implementierung von Filtermechanismen zur Medien-Skalierung von digitalen Videoströmen
Jan 1995
Comparison of Media Scaling Techniques for Real-Time Packet Video Transport
The Third IEEE Workshop on Architecture and Implementation of High Performance Communication Subsystems (HPCS'95), Mystic, Conneticut, August 23-25, 1995
1994
M. FrankDesign und Bewertung neuartiger Flusskontrollmechanismen für Hochgeschwindigkeits-Transportprotokolle
Jan 1994
Flow Control Functions for High-Speed Transport Protocols in Local Workstation Environments
19th Conference on Local Computer Networks, LCN, Oct 1994
Connection Oriented Data Service in DQDB
Computer Networks and ISDN Systems, No. 6-8, Vol. 26: p. 679-694, March 1994
SimCom - Powerful Simulation of Heterogeneous Networks
EFOC & Networks, Heidelberg, Germany, Juni 1994
Simulation of Heterogeneous Networks
Winter Simulation Conference, Orlando, Dec 1994
SimCom - A Window-Based Simulator for Performance Analysis of Heterogeneous Networks
Interworking'94, Sophia Antipolis, France, Mai 1994
Media Scaling for Real-Time Packet Video Transport
4th Int'l Workshop on High-Speed Networks, Brest, September 1994
Measurements in a FDDI Workstation Cluster
Proc. of the 19th Annual Conference on Local Computer Networks, p. 52-58, 1994
1993
P. MartiniA Simulation Study of Dynamic Bandwidth Allocation for Connection Oriented Data Service in DQDB
Proc. of SVNC '93, SysTech, 1993
Update on 802.6: Ongoing Work on DQDB
INTERWORKING in Broadband Networks, p. 77-87, 1993
Interworking of DQDB and B-ISDN - A simulation study
1st International Conference on LAN Interconnection, Raleigh, USA, October 1993
MAN/WAN Interworking - The ATM-to-DQDB Case
IEEE Conference on Local and Metropolitan Area Networks, Minneapolis, USA, September 1993
Connection Oriented Data Service in DQDB
Kommunikation in Verteilten Systemen, p. 159-172, 1993
Connection Oriented Data Service in DQDB - Simulation Studies of the Guaranteed Bandwidth Protocol
Proc. of IPCCC'93, Phoenix, IEEE, p. 339-345, 1993
Interconnection of DQDB and ATM using GBW
EFOC & Networks, The Hague, Netherlands, July 1993
Strategies of ATM and DQDB Interconnection
EOS/SPIE Conference on Local and Metropolitan Area Networks, Berlin, Germany, April 1993
1992
M. Gumbold, P. Martini, R. WittenbergTemporary Overload in High Speed Backbone Networks
Proc. of INFOCOM '92, Florence, IEEE, p. 2280-2289, 1992
A Concept for Interconnecting DQDB MANs through ATM-based B-ISDN and Related Issues with respect to Simulation
Interworking'92, Bern, Switzerland, November 1992
Real-time Communication in DQDB - A Comparison of Different Strategies
Proc. of the 17th Conference On Local Computer Networks, p. 446-453, 1992
1991
B. Heinrichs, P. MartiniTelefax-Kommunikation über Lokale Netze
Kommunikation in Verteilten Systemen, No. 267, p. 348-362, 1991
Real-Time Traffic in FDDI-II: Packet Switching vs. Circuit Switching
Proc. of INFOCOM '91, Miami, IEEE, p. 1413-1419, 1991
Performance Evaluation of FDDI - What about Packet Loss?
Proc. of the 16th Conference On Local Computer Networks, p. 18-23, 1991
1990
P. Davids, P. MartiniHigh Speed LANs and MANs - Protocols and Problems
Proc. of INDC-90, p. 119-132, 1990
Performance Analysis of DQDB
Proc. of the International Conference on Computers and Communications, IEEE, p. 548-555, 1990
Telefax in Local Area Networks
Proc. of the 15th Conference On Local Computer Networks, p. 371-379, 1990
Dienstintegration in Lokalen Hochgeschwindigkeitsnetzen
Workshop 'Architektur von lokalen Netzen (LAN) für den Campus- und Cim-Bereich', Dresden, Oktober 1990
Towards High Speed Networking in Local and Metropolitan Areas
Computer Networking, p. 103-113, 1990
Service Integration in FDDI
Proc. of the 15th Conference On Local Computer Networks, p. 23-32, 1990
New Low-Level Flow Control Strategies for Fiber Optic Token Rings
Proc. of GLOBECOM '90, San Diego, IEEE, p. 903.3.1-903.3.5, 1990
Low-Level Flow Control Strategies for FDDI
Proc. of EFOC/LAN 90, p. 283-286, 1990
Interconnection of High Speed Devices - A New Parallel Controller-Architecture for High Speed Local Area Networks
High Speed Local Area Networks II, p. 223-231, 1990
Gateway Performance - Requirements and Improvement
Decentralized Systems, p. 399-410, 1990
Performance Analysis of FDDI and Multiple Token Ring Backbones in a Mixed Traffic Environment
High Speed Local Area Networks II, p. 53-68, 1990
1989
P. MartiniFairness Issues of the DQDB Protocol
Proc. of the 14th Conference On Local Computer Networks, p. 160-170, 1989
High Speed Bridges for High Speed Local Area Networks - Packets per Second vs. Bits per Second
Proc. of INFOCOM '89, Ottawa (Canada), IEEE, p. 474-483, 1989
High Speed Bridges for High Speed Local Area Networks - Packets per Second vs. Bits per Second
Proc. of INFOCOM '89, Ottawa (Canada), IEEE, p. 474-483, 1989
High Speed Local Area Networks
IEEE CompEuro'89 Tutorial: VLSI and Computer Peripherials, Hamburg, IEEE, p. T4-101 - T4-125, 1989
Leistungsbewertung von Hochgeschwindigkeitsnetzen
Messung, Modellierung und Bewertung von Rechensystemen und Netzen, No. 218, p. 267-288, 1989
The DQDB Protocol. What about fairness?
Proc. of GLOBECOM '89, Dallas, IEEE, p. 8.7.1.-8.7.5., 1989
Designing High Speed Controllers for High Speed Local Area Networks
Proc. of GLOBECOM '89, Dallas, IEEE, p. 5.4.1.-5.4.5, 1989
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989
A Petri-Net Based Parallel Communications Controller for High Speed Local Area Networks
ICCI '89 - Computing and Information, Toronto (Canada), p. 168-172, 1989
A Petri-Net Based Parallel Communications Controller for High Speed Local Area Networks
ICCI '89 - Computing and Information, Toronto (Canada), p. 168-172, 1989
Integration of Field Bus and MAP Networks - Hierarchical Communication Systems in Production Environments
Computer Applications in Production and Engineering, p. 581-588, 1989
Performance Comparison of Bridges and MAC Protocols for High Speed Backbone Networks
Information Processing '89 - Proc. of the IFIP 11th World Computer Congress, p. 639-644, 1989
Created by JabRef on 08/11/2024.