Publications


2025

René Helmke, Elmar Padilla, Nils Aschenbruck
Mens Sana In Corpore Sano: Sound Firmware Corpora for Vulnerability Research
Network and Distributed System Security Symposium NDSS, San Diego, California, USA, Feb. 23-28, 2025, 2025
https://arxiv.org/abs/2404.11977


2024

Frederik Basels, Konrad Wolsing, Elmar Padilla, Jan Bauer
Demo: Maritime Radar Systems under Attack. Help is on the Way!
2024 IEEE 49th Conference on Local Computer Networks (LCN), October 08-10, 2024, Caen, Normandy, France, p. 1-4, 2024
https://ieeexplore.ieee.org/document/10639793

Matthias Frank
Demo: A Software Suite for ILDA Digital Network/IDN-File Recording and Playback
Demo at the 49th IEEE Conference on Local Computer Networks (LCN), October 08-10, 2024, Caen, Normandy, France, p. 1-4, 2024
https://ieeexplore.ieee.org/document/10639665

Thorsten Jenke, Simon Liessem, Elmar Padilla, Lilli Bruckschen
A Measurement Study on Interprocess Code Propagation of Malicious Software
Digital Forensics and Cyber Crime, Cham, p. 264--282, 2024
https://link.springer.com/chapter/10.1007/978-3-031-56583-0_18

Felix Klör, Jan Bauer, Sachar Paulus, Michael Rademacher
Dude, Where’s That Ship? Stealthy Radio Attacks Against AIS Broadcasts
2024 IEEE 49th Conference on Local Computer Networks (LCN), p. 1-7, 2024
https://ieeexplore.ieee.org/document/10639674

Lukas Kree, René Helmke, Eugen Winter
Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study
Detection of Intrusions and Malware, and Vulnerability Assessment, Cham, p. 64--83, 2024
https://link.springer.com/chapter/10.1007/978-3-031-64171-8_4

Alexander Nies, Konrad Wolsing, Jan Bauer
Threat Analysis for Novel Underwater Vehicles: Insights from the Perspective of Cyber Security
European Workshop on Maritime Systems Resilience and SecurityMARESEC, Bremerhaven, Jun. 6, 2024., 2024

Sebastian Ritz, Anna Loewe, Jan Bauer, Martin Kurowski
By-Design Risk Mitigation for Large Uncrewed Underwater Vehicles (UUV)
European Workshop on Maritime Systems Resilience and Security, MARESEC, Bremerhaven, Jun. 6, 2024, 2024

Antoine Saillard, Konrad Wolsing, Klaus Wehrle, Jan Bauer
Exploring Anomaly Detection for Marine Radar Systems
Proceedings of the 10th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS '24), co-located with the the 29th European Symposium on Research in Computer Security (ESORICS '24), 9 2024

Philipp Sedlmeier, Jan Bauer, Anisa Rizvanolli, Ole John
Cybersicherheit für die Schifffahrt — mit einer Schiffsbrücke als Test- und Entwicklungslabor
Proc. of the 20th BSI German IT Security Congress, virtually hosted in Bonn, Germany, May 7-8, 2024, 2024
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Veranstaltungen/ITSiKongress/20ter/Kongressdokumentation_2024.html


2023

Lennart Bader, Eric Wagner, Martin Henze, Martin Serror
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks
Proceedings of the 8th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS 2023), 2023
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-bader-metrics.pdf

Jan Bauer, Joris Kutzner, Philipp Sedlmeier, Anisa Rizvanolli, Elmar Padilla
Phish & Ships and Other Delicacies from the Cuisine of Maritime Cyber Attacks
Proc. of the European Workshop on Maritime Systems Resilience and SecurityMARESEC, virtual, Jun. 27, 2023, October 2023
https://doi.org/10.5281/zenodo.8406035

Steffen Enders, Eva-Maria C. Behner, Niklas Bergmann, Mariia Rybalka, Elmar Padilla, Er Xue Hui, Henry Low, Nicholas Sim
dewolf: Improving Decompilation by leveraging User Surveys
Proceedings 2023 Workshop on Binary Analysis Research, 2023
http://dx.doi.org/10.14722/bar.2023.23001

Matthias Frank
Demo: Realtime Recording of IDN-Streams with the Audio Stream Input/Output (ASIO) Protocol
Demo at the 48th IEEE Conference on Local Computer Networks (LCN), October 01-05, 2023, Daytona Beach, Florida/USA, 2023
https://ieeexplore.ieee.org/document/10223328

Matthias Frank
Introduction and Demonstration of the OpenIDN-Laser-DAC-Framework
International Conference on Networked Systems (NetSys), September 4-7, 2023 Potsdam, Germany, 2023
https://kuvs.de/netsys/2023/program/netsys-2023-demonstrations

R. Helmke, J. vom Dorp
Extended Abstract: Towards Reliable and Scalable Linux Kernel CVE Attribution in Automated Static Firmware Analyses
Detection of Intrusions and Malware, and Vulnerability Assessment, Cham, p. 201--210, 2023
https://link.springer.com/chapter/10.1007/978-3-031-35504-2_10

Thorsten Jenke, Elmar Padilla, Lilli Bruckschen
Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers
Secure IT Systems: 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings, Oslo, Norway, p. 245–262, 2023
https://doi.org/10.1007/978-3-031-47748-5_14

Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, Martin Henze
SoK: Evaluations in Industrial Intrusion Detection Research
Journal of Systems Research, No. 1, Vol. 3: October 31, 2023
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-lamberts-metrics-sok.pdf

Jan Pennekamp, Roman Matzutt, Christopher Klinkmüller, Lennart Bader, Martin Serror, Eric Wagner, Sidra Malik, Maria Spiß, Jessica Rahn, Tan Gürpinar, others
An Interdisciplinary Survey on Information Flows in Supply Chains
ACM Computing Surveys, 2023
https://dl.acm.org/doi/pdf/10.1145/3606693

Daniel Plohmann, Manuel Blatt, Daniel Enders
MCRIT: The MinHash-based Code Relationship & Investigation Toolkit
The Journal on Cybercrime and Digital Investigations, No. 1, Vol. 8: p. 7–18, Apr. 2023
https://cyberjournal.cecyf.fr/index.php/cybin/article/view/45

Sebastian Ritz, Anna Loewe, Jan Bauer
Specialties of HAZID-Study for Large Unmanned Underwater Vehicles
OCEANS 2023 - Limerick, p. 1-10, 2023
https://ieeexplore.ieee.org/document/10244358

Julian Spravil, Christian Hemminghaus, Merlin von Rechenberg, Elmar Padilla, Jan Bauer
Detecting Maritime GPS Spoofing Attacks Based on NMEA Sentence Integrity Monitoring
Journal of Marine Science and Engineering, No. 5, Vol. 11: 2023
https://www.mdpi.com/2077-1312/11/5/928

Eric Wagner, Nils Rothaug, Konrad Wolsing, Lennart Bader, Klaus Wehrle, Martin Henze
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols
48th IEEE Conference on Local Computer Networks (LCN), Daytona Beach, Florida, US, October 2023
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wagner-repel.pdf

Nils Weissgerber, Thorsten Jenke, Elmar Padilla, Lilli Bruckschen
Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms
2023
https://arxiv.org/abs/2301.05048

Konrad Wolsing, Dominik Kus, Eric Wagner, Jan Pennekamp, Klaus Wehrle, Martin Henze
One IDS is not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS '23), September 25-29, 2023, The Hague, The Netherlands, September 25, 2023
https://jpennekamp.de/wp-content/papercite-data/pdf/wkw+23.pdf

Konrad Wolsing, Antoine Saillard, Elmar Padilla, Jan Bauer
XLab-UUV – A Virtual Testbed for Extra-Large Uncrewed Underwater Vehicles
1st IEEE LCN Workshop on Maritime Communication and Security (MarCaS), October 2023
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wolsing-xluuvlab.pdf


2022

Kira Bungert, Maren Bennewitz, Lilli Bruckschen
Working With Robots: Design and Evaluation of an Introductory Computer Science Teaching Unit With Educational Robots
The European Conference on Education 2022 Official Conference Proceedings, July 2022
https://papers.iafor.org/submission64539/

Kira Bungert, Lilli Bruckschen
A Survey About the Use of Educational Robots and Physical Computing Devices in Computer Science Lessons at German Secondary Schools
The European Conference on Education 2022 Official Conference Proceedings, July 2022
https://papers.iafor.org/submission64549/

Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, Nagasaki, Japan, p. 252–266, 2022
https://doi.org/10.1145/3488932.3497762

Johannes vom Dorp
FACT 4.0
Black Hat USA 2022, August 2022
https://www.blackhat.com/us-22/arsenal/schedule/index.html#fact--26776

Johannes vom Dorp, René Helmke
Home Router Security Report 2022
November 2022
https://www.fkie.fraunhofer.de/content/dam/fkie/de/documents/2022-11-28_HRSR_2022.pdf

Nils-Edvin Enkelmann
CWE_Checker: Architecture-Independent Binary Vulnerability Analysis
Black Hat USA 2022, August 2022
https://www.blackhat.com/us-22/arsenal/schedule/#cwe_checker-architecture-independent-binary-vulnerability-analysis-26960

Matthias Frank
A Framework for Flexible ILDA Digital Network (IDN) Audio Streaming
Demo at the 47th IEEE Conference on Local Computer Networks (LCN), September 26-29, 2022, Edmonton, Canada, 2022
https://ieeexplore.ieee.org/document/9843411

René Helmke, Johannes vom Dorp
Towards Reliable and Scalable Linux Kernel CVE Attribution in Automated Static Firmware Analyses
September 2022
https://arxiv.org/abs/2209.05217

René Helmke, Stefanie Thieme, Bertram Schütz
Improving Connectivity in Multipath PLMN Setups: An MPTCP Scheduler Using Link Quality Indicators
Proceedings of the 26th ITG Symposium on Mobile Communication -Technologies and Applications, May 18-19, 2022, Osnabrück, Germany, May 2022
https://www.hs-osnabrueck.de/fileadmin/HSOS/Forschung/Recherche/Laboreinrichtungen_und_Versuchsbetriebe/Labor_fuer_Hochfrequenztechnik_und_Mobilkommunikation/Mobilkomtagung/2022/Vortraege/12_Helmke.pdf

Jorge de Heuvel, Nathan Corral, Lilli Bruckschen, Maren Bennewitz
Learning Personalized Human-Aware Robot Navigation Using Virtual Reality Demonstrations from a User Study
Proceedings of the 2022 IEEE International Conference on Robot and Human Interactive Communication (RO-MAN), March 2022
https://ieeexplore.ieee.org/document/9900554

Carlo Jakobs, Martin Lambertz, Jan-Niclas Hilgert
ssdeeper: Evaluating and improving ssdeep
Forensic Science International: Digital Investigation, Supplement (Proceedings of the Twenty-Second Annual DFRWS, USA), Vol. 42: p. 301402, July 2022
https://www.sciencedirect.com/science/article/pii/S266628172200083X

Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection
Proceedings of the 8th ACM Cyber-Physical System Security Workshop (CPSS '22), co-located with the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan, p. 73-84, May 30, 2022
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-kus-iids-generalizability.pdf

Dominik Kus, Konrad Wolsing, Jan Pennekamp, Eric Wagner, Martin Henze, Klaus Wehrle
Poster: Ensemble Learning for Industrial Intrusion Detection
38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA, No. RWTH-2022-10809, 12 8, 2022
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-kus-ensemble-poster.pdf

Frederica Free Nelson, Raphael Ernst
Deep Machine Learning for Cyber Defence
November 2022
https://www.sto.nato.int/publications/STO Technical Reports/Forms/All Documents.aspx?RootFolder=/publications/STO Technical Reports/STO-TR-IST-163&FolderCTID=0x0120D5200078F9E87043356C409A0D30823AFA16F6010066D541ED10A62C40B2AB0FEBE9841A61&View={F8042CB2-580C-473B-AEF8-B435A05CA1D2}

Daniel Johannes Plohmann
Classification, Characterization, and Contextualization of Windows Malware using Static Behavior and Similarity Analysis
July 2022
https://hdl.handle.net/20.500.11811/9992

Michael Rademacher, Hendrik Linka, Jannis Konrad, Thorsten Horstmann, Karl Jonas
Bounds for the Scalability of TLS over LoRaWAN
Proceedings of the 26th ITG Symposium on Mobile Communication - Technologies and Applications, May 18-19, 2022, Osnabrück, Germany, May 2022
https://www.hs-osnabrueck.de/fileadmin/HSOS/Forschung/Recherche/Laboreinrichtungen_und_Versuchsbetriebe/Labor_fuer_Hochfrequenztechnik_und_Mobilkommunikation/Mobilkomtagung/2022/Vortraege/22_Rademacher.pdf

Merlin von Rechenberg, Nina Rößler, Mari Schmidt, Konrad Wolsing, Florian Motz, Michael Bergmann, Elmar Padilla, Jan Bauer
Guiding Ship Navigators through the Heavy Seas of Cyberattacks
European Workshop on Maritime Systems Resilience and Security 2022 (MARESEC 2022), Bremerhaven, Germany, 2022
https://zenodo.org/doi/10.5281/zenodo.7148793

Lucca Ruhland, Mari Schmidt, Jan Bauer, Elmar Padilla
Keeping the Baddies Out and the Bridge Calm: Embedded Authentication for Maritime Networks
2022 International Symposium on Networks, Computers and Communications (ISNCC), p. 1-6, 2022
https://ieeexplore.ieee.org/document/9851819

Ömer Sen, Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze
On specification-based cyber-attack detection in smart grids
Proceedings of the 11th DACH+ Conference on Energy Informatics, Freiburg, Germany, September 2022
https://doi.org/10.1186/s42162-022-00206-7

Ömer Sen, Dennis van der Velde, Katharina A. Wehrmeister, Immanuel Hacker, Martin Henze, Michael Andres
On using contextual correlation to detect multi-stage cyber attacks in smart grids
Sustainable Energy, Grids and Networks, Vol. 32: p. 100821, December 2022
https://www.sciencedirect.com/science/article/pii/S235246772200114X

Eric Wagner, Jan Bauer, Martin Henze
Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec' 22), May 2022
https://dl.acm.org/doi/10.1145/3507657.3528539

Eric Wagner, Roman Matzutt, Jan Pennekamp, Lennart Bader, Irakli Bajelidze, Klaus Wehrle, Martin Henze
Scalable and Privacy-Focused Company-Centric Supply Chain Management
Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22), May 2022
https://ieeexplore.ieee.org/document/9805503

Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze
BP-MAC: Fast Authentication for Short Messages
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'22), May 2022
https://dl.acm.org/doi/10.1145/3507657.3528554

Konrad Wolsing, Linus Roepert, Jan Bauer, Klaus Wehrle
Anomaly Detection in Maritime AIS Tracks: A Reviewof Recent Approaches
MDPI Journal of Marine Science and Engineering (JMSE) - Special Issue: Risk Assessment and Traffic Behaviour Evaluation of Ships, January 2022
https://www.mdpi.com/2077-1312/10/1/112

Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, Ina Berenice Fink, Mari Schmidt, Klaus Wehrle, Martin Henze
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
2022 IEEE 47th Conference on Local Computer Networks (LCN), p. 114-122, September 2022
https://ieeexplore.ieee.org/document/9843801

Konrad Wolsing, Lea Thiemt, Christian van Sloun, Eric Wagner, Klaus Wehrle, Martin Henze
Can Industrial Intrusion Detection Be SIMPLE?
Computer Security -- ESORICS 2022, Cham, p. 574--594, September 2022
https://link.springer.com/chapter/10.1007/978-3-031-17143-7_28

Konrad Wolsing, Eric Wagner, Antoine Saillard, Martin Henze
IPAL: Breaking up Silos of Protocol-Dependent and Domain-Specific Industrial Intrusion Detection Systems
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, Limassol, Cyprus, p. 510–525, October 2022
https://doi.org/10.1145/3545948.3545968

Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, Martin Serror
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
Proceedings of the 15th Workshop on Cyber Security Experimentation and Test, Virtual, CA, USA, p. 49–53, August 2022
https://doi.org/10.1145/3546096.3546102


2021

Lennart Bader*, Jan Pennekamp*, Roman Matzutt, David Hedderich, Markus Kowalski, Volker Lücken, Klaus Wehrle (* = Equal Contribution)
Blockchain-Based Privacy Preservation for Supply Chains Supporting Lightweight Multi-Hop Information Accountability
Information Processing & Management, May 2021

Kira Bungert, Lilli Bruckschen, Stefan Krumpen, Witali Rau, Michael Weinmann, Maren Bennewitz
Human-Aware Robot Navigation Based on Learned Cost Values from User Studies
Proceedings of the International Conference on Robot and Human Interactive Communication (ROMAN), University of British Columbia and University of Waterloo, Canada, August 2021
https://ieeexplore.ieee.org/document/9515481

Markus Dahlmanns, Jan Pennekamp, Ina Berenice Fink, Bernd Schoolmann, Klaus Wehrle, Martin Henze
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaTCPS), Virtual Event, April 2021
https://dl.acm.org/doi/10.1145/3445969.3450423

Steffen Enders, Mariia Rybalka, Elmar Padilla
PIdARCI: Using Assembly Instruction Patterns to Identify, Annotate, and Revert Compiler Idioms
Proc. of the 18th Annual Conference on Privacy, Security and Trust, PST, Auckland, New Zealand, December 2021

Matthias Frank
IDN-Laser-Tester: A Framework for Detecting and Testing ILDA Digital Network Consumers for Laser Projection
International Conference on Networked Systems 2021 (NetSys), September 13 - 16, 2021, virtually hosted in Lübeck, Germany, 2021
https://journal.ub.tu-berlin.de/eceasst/article/view/1174

Matthias Frank
IDN-NetConfig: A Flexible Extension of the IDN-Hello Protocol (ILDA Digital Network) to Control Application Specific Parameters
Demo at the 46th IEEE Conference on Local Computer Networks (LCN), October 04-07, 2021, virtually hosted in Edmonton, Canada, 2021
https://www.ieeelcn.org/prior/LCN46/lcn46demos/Demo_7_1570761022.pdf

René Helmke, Eugen Winter, Michael Rademacher
EPF: An Evolutionary, Protocol-Aware, and Coverage-Guided Network Fuzzing Framework
18th International Conference on Privacy, Security and Trust (PST2021), Auckland, New Zealand, December 2021
https://ieeexplore.ieee.org/document/9647801

Christian Hemminghaus, Jan Bauer, Elmar Padilla
BRAT: A BRidge Attack Tool for Cyber Security Assessments of Maritime Systems
International Journal on Marine Navigation and Safety of Sea Transportation (TransNav), No. 1, Vol. 15: March 2021
https://www.transnav.eu/Article_BRAT:_A_BRidge_Attack_Tool_for_Hemminghaus,57,1092.html

Christian Hemminghaus, Jan Bauer, Konrad Wolsing
SIGMAR: Ensuring Integrity and Authenticity of Maritime Systems using Digital Signatures
Proc. of the International Symposium on Networks, Computers and Communications - Trust, Security, and Privacy, Dubai, UAE, October 2021
https://ieeexplore.ieee.org/document/9615738

Christian Hemminghaus, Mari Schmidt, Jan Bauer
MCSL: A Cyber Security Test Environment for Bridge Systems
European Workshop on Maritime Systems Resilience and Security (MARESEC 2021), June 2021

Jan-Niclas Hilgert, Martin Lambertz
Auf den Lime gegangen: Vor- und Nachteile der neuen Mikromobilität
Tagungsband zum 17. Deutschen IT Sicherheitskongress, 2021

Jan-Niclas Hilgert, Martin Lambertz, Anna-Mariya Mateyna, Alina Hakoupian
A Forensic Analysis of Micromobility Solutions
Digital Forensics Research Conference APAC, virtual, January 2021
https://dfrws.org/presentation/forensic-analysis-of-micromobility- solutions/

Tim Krause, Raphael Ernst, Benedikt Klaer, Immanuel Hacker, Martin Henze
Cybersecurity in Power Grids: Challenges and Opportunities
Sensors, No. 8, Vol. 21: September 2021
https://arxiv.org/abs/2105.00013

Fabian Marquardt, Lennart Buhl
Déjà Vu? Client-Side Fingerprinting and Version Detection of Web Application Software
2021 IEEE 46th Conference on Local Computer Networks (LCN), p. 81--89, 2021
https://ieeexplore.ieee.org/document/9524885

Fabian Marquardt, Lennart Buhl
Large Scale Monitoring of Web Application Software Distribution to Measure Threat Response Behavior
Electronic Communications of the EASST, Vol. 80: 2021
https://journal.ub.tu-berlin.de/eceasst/article/view/1153

Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle
CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively
IEEE Transactions on Network and Service Management, April 2021
https://ieeexplore.ieee.org/document/9404327

Robert Müller, Elmar Padilla
From Plain Text to CTI - A Technological Solution for Gathering Cyber Threat Intelligence using Natural Language Processing
Proc. of the NATO Science & Technology Information Systems Technology-190 Symposium on "AI, ML and BD for Hybrid Military Operations (AI4HMO)", October 2021
https://www.sto.nato.int/publications/STO%20Meeting%20Proceedings/STO-MP-IST-190/MP-IST-190-30.pdf

Alexander Nies
Cybersicherheit für maritime Systeme
Crisis Prevention, January 2021
https://crisis-prevention.de/kommunikation-it/cybersicherheit-fuer-maritime-it-systeme.html

Frédéric Painchaud, Feyyaz Dombayci, Raphael Ernst, Aylin HatipIpek, Paolo Manfre, Judith van Bruggen van Putten, Lorenzo Zamburru
Cyber Security Risk Assessment Process for Military Systems
October 2021

Jan Pennekamp, Erik Buchholz, Markus Dahlmanns, Ike Kunze, Stefan Braun, Eric Wagner, Matthias Brockmann, Klaus Wehrle, Martin Henze
Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use
Proceedings of the 2021 ACSAC Workshop on Learning from Authoritative Security Experiment Results (LASER), Austin, TX, USA, December 2021
https://arxiv.org/abs/2112.11417

Jan Pennekamp, Martin Henze, Klaus Wehrle
Unlocking Secure Industrial Collaborations through Privacy-Preserving Computation
ERCIM News, No. 126, p. 24--25, July 2021
https://ercim-news.ercim.eu/en126/special/unlocking-secure-industrial-collaborations-through-privacy-preserving-computation

Michael Rademacher, Hendrik Linka, Thorsten Horstmann, Martin Henze
Path Loss in Urban LoRa Networks: A Large-Scale Measurement Study
Proceedings of the 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), virtual, September 2021
https://arxiv.org/abs/2109.07768

Merlin von Rechenberg, Mari Schmidt, Christian Hemminghaus, Jan Bauer, Elmar Padilla
When a BRAT fools your bridge: A Cyber Security Test Environment for Integrated Bridge Systems
Demo at the 46th IEEE Conference on Local Computer Networks (LCN), Edmonton, Canada, October 2021
https://www.ieeelcn.org/lcn46demos/Demo_8_1570761147.pdf

Stephan Scheuren, Jan Bauer, Fabian Gehrs, Hans-Peter Grothaus, Maximilian Jatzlau, Andreas Lauer, Michael Löpmeier, Ulrike Niesse, Paul Vogel
Offene Software-Plattform für Dienstleistungsinnovationen in einem Wertschöpfungsnetz in der Landwirtschaft
Berlin, Heidelberg, September 2021
https://link.springer.com/chapter/10.1007/978-3-662-63099-0_12

Ömer Sen, Dennis van der Velde, Philipp Linnartz, Immanuel Hacker, Martin Henze, Michael Andres, Andreas Ulbig
Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment
Proceedings of 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), Espoo, Finland, October 2021
https://arxiv.org/abs/2110.09162

Ömer Sen, Dennis van der Velde, Sebastian N. Peters, Martin Henze
An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment
Proceedings of the 26th International Conference on Electricity Distribution (CIRED), virtual, September 2021
https://arxiv.org/abs/2110.02040

Ömer Sen, Dennis van der Velde, Katharina A. Wehrmeister, Immanuel Hacker, Martin Henze, Michael Andres
Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids
Proceedings of the 4th International Conference on Smart Energy Systems and Technologies (SEST), Vaasa, Finland, September 2021
https://arxiv.org/abs/2109.02336

Rafael Uetz, Christian Hemminghaus, Louis Hackländer, Philipp Schlipper, Martin Henze
Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
Proc. of the 37th Annual Computer Security Applications Conference (ACSAC), virtual, December 2021
https://arxiv.org/abs/2111.07847


2020

Jan Bauer, Yannic Toschke, Alexander Tessmer, Björn Bourdon, Nils Aschenbruck, Mirco Imlau
An Open Source IoT Framework for a Distributed Modular Low-Cost Laser-Based Sensing Multi-Platform
IEEE Sensors Virtual Conference, Rotterdam, Netherlands, October 2020

Markus Dahlmanns, Johannes Lohmöller, Ina Berenice Fink, Jan Pennekamp, Klaus Wehrle, Martin Henze
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments
Proceedings of the ACM Internet Measurement Conference (IMC), Virtual Event, October 2020
https://dl.acm.org/doi/10.1145/3419394.3423666

Matthias Frank
To Stream or Not to Stream, Is This the Question? Or, How to StreamLaser Shows the Better Way: Video Preview or Raw IDN (ILDA Digital Network)?
Demo at the 45th IEEE Conference on Local Computer Networks (LCN), November 16-19, Sydney, Australia, 2020
https://www.ieeelcn.org/prior/LCN45/lcn45demos/1570680429.pdf

Martin Henze
The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation
6th International Workshop on Security and Privacy in the Cloud (SPC), Avignon, France, July 2020
https://ieeexplore.ieee.org/document/9162199

Martin Henze, Lennart Bader, Julian Filter, Olav Lamberts, Simon Ofner, Dennis van der Velde
Poster: Cybersecurity Research and Training for Power Distribution Grids – A Blueprint
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS), Virtual Event, November 2020
https://dl.acm.org/doi/10.1145/3372297.3420016

Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle
Complying with Data Handling Requirements in Cloud Storage Systems
IEEE Transactions on Cloud Computing (Early Access), June 2020
https://doi.org/10.1109/TCC.2020.3000336

Eva-Maria Hols
Doctoral Thesis: Preprocessing to Deal with Hard Problems: Upper and Lower Bounds for Kernelization of Graph Problems
Humboldt-Universität zu Berlin, May 2020
https://edoc.hu-berlin.de/handle/18452/22131

Oliver Kattwinkel, Michael Rademacher
Exchange of Preparatory Information for Secure and Usable Cryptocurrency Transactions
IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Macau, China, p. 132 -- 139, December 2020
https://ieeexplore.ieee.org/document/9282669

Benedikt Klaer, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Michael Andres, Martin Henze
Graph-based Model of Smart Grid Architectures
Proceedings of the 3rd International Conference on Smart Energy Systems and Technologies (SEST), Istanbul, Turkey, September 2020

Christopher Krah
Fuzzing File System Implementations
HackInTheBox Security Conference 2020, Amsterdam, Netherlands, April 2020

Federico Mancini, John Melrose, Stefano Fioravanti, Frederick Leve, Logan Mailloux, Solveig Bruvoll, Raphael Ernst, Kellyn Rein, Diego Merani, Robert Been
A Security Reference Model for Autonomous Vehicles in Military Operations
4th IEEE Workshop on Security and Privacy in the Cloud (SPC), May 2020
https://ieeexplore.ieee.org/document/9162227

Fabian Marquardt, Christopher Schmidt
Don’t Stop at the Top: Using Certificate Transparency Logs to Extend Domain Lists for Web Security Studies
2020 IEEE 45th Conference on Local Computer Networks (LCN), p. 409--412, 2020

Fabian Marquardt, Christopher Schmidt, Lennart Haas
Pixelizr: A Visual Demonstration of the FERRET Framework
Demonstrations of the 45th IEEE Conference on Local Computer Networks (LCN), 2020

Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle
How to Securely Prune Bitcoin's Blockchain
Proceedings of the 19th IFIP Networking Conference (NETWORKING), Paris, France, June 2020

Jan Pennekamp, Lennart Bader, Roman Matzutt, Philipp Niemietz, Daniel Trauth, Martin Henze, Thomas Bergs, Klaus Wehrle
Private Multi-Hop Accountability for Supply Chains
Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICCWorkshops), 1st Workshop on Blockchain for IoT and Cyber-Physical Systems (BIoTCPS), Dublin, Ireland, June 2020

Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner, Sebastian Reuter, Christian Hopmann, Klaus Wehrle, Martin Henze
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking
Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC), Virtual Event, December 2020
https://eprint.iacr.org/2020/1512.pdf

Michael Rademacher
Doctoral Thesis: Evaluation and Optimization of IEEE802.11 multi-hop Backhaul Networks with Directional Antennas
Technische Universität Kaiserslautern, 2020
https://www.dr.hut-verlag.de/978-3-8439-4324-6.html

Michael Rademacher
Technical Fundamentals of Blockchain Systems
2020

Linus Roepert, Markus Dahlmanns, Ina Berenice Fink, Jan Pennekamp, Martin Henze
Assessing the Security of OPC UA Deployments
1st ITG Workshop on IT Security (ITSec), Tübingen, Germany, April 2020
https://doi.org/10.15496/publikation-41813

Martin Serror, Sacha Hack, Martin Henze, Marko Schuba, Klaus Wehrle
Challenges and Opportunities in Securing the Industrial Internet of Things
IEEE Transactions on Industrial Informatics (Early Access), September 2020
https://ieeexplore.ieee.org/document/9195014

Dennis van der Velde, Martin Henze, Philipp Kathmann, Erik Wassermann, Michael Andres, Detert Bracht, Raphael Ernst, George Hallak, Benedikt Klaer, Philipp Linnartz, Benjamin Meyer, Simon Ofner, Tobias Pletzer, Richard Sethmann
Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures
Proceedings of the 6th IEEE International Energy Conference (ENERGYCon), Gammarth, Tunisia, September 2020
https://arxiv.org/abs/2003.06185

Peter Weidenbach, Johannes vom Dorp
Home Router Security Report 2020
Whitepaper, June 2020
https://www.fkie.fraunhofer.de/de/Pressemeldungen/Home-Router.html

Eugen Winter, Michael Rademacher
Poster: Fuzzing of SCADA Protocols used in Smart Grids
9th DACH+ Conference on Energy Informatics, October 2020

Konrad Wolsing, Eric Wagner, Martin Henze
Poster: Facilitating Protocol-independent Industrial Intrusion Detection Systems
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS), Virtual Event, November 2020
https://doi.org/10.1145/3372297.3420019


2019

Daniel Baier, Martin Lambertz
DeStroid - Fighting String Encryption in Android Malware
Botconf 2019, Bordeaux, France, December 2019

Thomas Barabosch, Nils-Edvin Enkelmann
cwe_checker: Hunting Binary Code Vulnerabilities Across CPU Architectures
"Pass The SALT" Conference, Lille, Frankreich, July 2019
https://2019.pass-the-salt.org/files/slides/05-cwe_checker.pdf

Felix Bilstein, Daniel Plohmann
YARA-Signator: Automated Generation of Code-based YARA-Rules
Botconf 2019, Bordeaux, France, December 2019
https://journal.cecyf.fr/ojs/index.php/cybin/article/view/24

Johannes vom Dorp
Improving your firmware security analysis process with FACT
"Pass The SALT" Conference, Lille, Frankreich, July 2019
https://2019.pass-the-salt.org/files/slides/04-FACT.pdf

Johannes vom Dorp, Peter Weidenbach
Enter FACT - Boost your Firmware Security Analysis with Automation, Visualization and Cross Referencing
Hardwear.io, Den Haag, NL, September 2019
https://hardwear.io/netherlands-2019/speakers/johannes-vom-dorp-and-peter-weidenbach.php

Nils-Edvin Enkelmann
cwe_checker: Hunting Binary Code Vulnerabilities Across CPU Architectures
Black Hat USA, Las Vegas, USA, August 2019

{Nils-Edvin Enkelmann}, {Sascha Alexander Jopen}, {Christian Meier}
Erkennung von Botnetzinteraktionen durch effizientes Domainblacklisting auf ressourceneingeschränkter Routerhardware in Heimnetzen
16. Deutscher IT-Sicherheitskongress, Bonn, May 2019

Matthias Frank, Fabian Marquardt
IDN-Laser-VR: A Demonstration of Real-Time Multimedia Streaming in Local Networks Using the ILDA Digital Network Protocol
Demo at the 44rd IEEE Conference on Local Computer Networks (LCN), October 14-17, Osnabrück, Germany, 2019

Jan-Niclas Hilgert, Martin Lambertz, Mariia Rybalka, Roman Schell
Syntactical Carving of PNGs and Automated Generation of Reproducible Datasets
Digital Forensics Research Conference USA (DFRWS), Portland, Oregon, USA, July 2019
https://www.sciencedirect.com/science/article/pii/S174228761930163X

Jens Hiller, Martin Henze, Torsten Zimmermann, Oliver Hohlfeld, Klaus Wehrle
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads
IEEE LCN Symposium on Emerging Topics in Networking, Osnabrück, Germany, October 2019

Jens Hiller, Jan Pennekamp, Markus Dahlmanns, Martin Henze, Andriy Panchenko, Klaus Wehrle
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
Proceedings of the 27th IEEE International Conference on Network Protocols (IEEE ICNP2019), Chicago, Illinois, USA, October 2019

Thorsten Jenke, Daniel Plohmann, Elmar Padilla
RoAMer: Robust Automated Malware Unpacker
FIRST Technical Colloquium, Amsterdam, NL, April 2019

Thorsten Jenke, Daniel Plohmann, Elmar Padilla
RoAMer: Robust Automated Malware Unpacker
Malware Conference 2019, Nantucket, Massachusetts, USA, October 2019

Tim Krause, Rafael Uetz
Recognizing Email Spam from Meta Data Only
IEEE Conference on Communications and Network Security (IEEE CNS 2019), Washington, USA, June 2019

Jan Pennekamp, Martin Henze, Simo Schmidt, Philipp Niemietz, Marcel Fey, Daniel Trauth, Thomas Bergs, Christian Brecher, Klaus Wehrle
Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy (CPSSPC'19), London, United Kingdom, November 2019
https://dl.acm.org/doi/pdf/10.1145/3338499.3357357

Jan Pennekamp, Jens Hiller, Sebastian Reuter, Wladimir De la Cadena, Asya Mitseva, Martin Henze, Thomas Engel, Klaus Wehrle, Andriy Panchenko
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
Proceedings of the 27th IEEE International Conference on Network Protocols (IEEE ICNP2019), Chicago, Illinois, USA, October 2019

Jörg Stucke
FACT 3.0: Firmware Analysis and Comparison Tool
Black Hat Europe, London, GB, December 2019

Peter Weidenbach
Deadly Sins of Development that lead to vulnerable devices
EmBO++ The embedded C++ Conference, Bochum, March 2019

Peter Weidenbach
How to Mitigate Cyber Threats to Unmanned Maritime Systems
Atlas Meets Science science conference 2019, November 2019


2018

Thomas Barabosch
Doctoral Thesis: Formalization and Detection of Host-Based Code Injection Attacks in the Context of Malware
University of Bonn, Germany, October 2018
http://hss.ulb.uni-bonn.de/2018/5240/5240.htm

Thomas Barabosch
Lucky CAT: A Distributed Fuzzing Management Framework
Black Hat Europe 2018, London, United Kingdom, December 2018
https://www.blackhat.com/eu-18/arsenal/schedule/#lucky-cat-adistributed-fuzzingmanagementframework-13352

Thomas Barabosch, Maxime Villard
KLEAK: Practical Kernel Memory Disclosure Detection
December 2018
http://www.netbsd.org/gallery/presentations/maxv/kleak.pdf

Jonathan P. Chapman
SAD THUG: Structural Anomaly Detection for Transmissions of High-value Information Using Graphics
27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA, p. 1147--1164, 2018
https://www.usenix.org/conference/usenixsecurity18/presentation/chapman

Matthias Frank
Low-cost Prototypes of IDN (ILDA Digital Network) Consumers for ILDA Laser Projector and DMX512 Service
Demo at the 43rd IEEE Conference on Local Computer Networks (LCN), October 1-4, Chicago, USA, 2018

Jan-Niclas Hilgert, Martin Lambertz, Shujian Yang
Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit
Digital Forensics Research Conference USA (DFRWS USA 2018), Providence, RI United States, 2018
https://www.sciencedirect.com/science/article/pii/S1742287618301993

Martin Lambertz, Jan-Niclas Hilgert, Roman Schell
Resurrecting Portable Network Graphics using Block Generators
Digital Forensics Research Conference USA (DFRWS USA 2018), Providence, RI United States, 2018
https://www.sciencedirect.com/science/article/pii/S1742287618301865

Fabian Marquardt
Developing a Framework for Large Scale Security Analysis of Web Applications
Demonstrations of the 43rd IEEE Conference on Local Computer Networks (LCN), 2018

Daniel Plohmann, Steffen Enders, Elmar Padilla
ApiScout: Robust Windows API Usage Recovery for Malware Characterization and Similarity Analysis
Botconf 2018 The Journal on Cybercrime & Digital Investigations, No. 1, Toulouse, France, Vol. 4: p. 1--16, December 2018
https://journal.cecyf.fr/ojs/index.php/cybin/article/view/20/23

Rafael Uetz, Luis Alberto Benthin Sanguino, Raphael Ernst
Softwareliste - Verwundbarkeiten im Unternehmen finden und verwalten
iX 5/2018, Heise Medien Verlag, 2018
https://www.heise.de/select/ix/2018/5/1524520090462661

Peter Weidenbach
FACT 2.5: Firmware Analysis and Comparison Tool
Black Hat Europe 2018, London, United Kingdom, December 2018
https://www.blackhat.com/eu-18/arsenal/schedule/#fact-25-firmware-analysis-andcomparison-tool-12582

Peter Weidenbach
Firmware Analysis and Comparison Tool (FACT)
Black Hat Asia 2018, Arsenal, Singapur, 2018
https://www.blackhat.com/asia-18/arsenal.html#peter-weidenbach

Viviane Zwanger, Elmar Padilla
Illusion Tricks: Manipulating Sandbox Reports for Fun and Profit
April 2018


2017

Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMWA), Bonn, Germany, p. 209-229, July 2017
https://link.springer.com/chapter/10.1007/978-3-319-60876-1_10

Matthias Frank
A framework for recording and replaying IDN (ILDA digital network) streams on PCAP basis
International Conference on Networked Systems 2017 (NetSys), Göttingen, Germany, March 2017
https://ieeexplore.ieee.org/document/7931514

Matthias Frank
Demonstration of “IDN-Toolbox”: A Software to Visualize and Analyze IDN (ILDA Digital Network) Streams
Demo at the 42nd IEEE Conference on Local Computer Networks (LCN), Singapore, October 2017
https://www.ieeelcn.org/prior/LCN42/lcn42demos/1570385454.pdf

Jan-Niclas Hilgert, Martin Lambertz
ZFT - A ZFS Forensic Toolkit (Poster)
Digital Forensics Research Conference EU (DFRWS EU 2017) , 2017

Jan-Niclas Hilgert, Martin Lambertz, Daniel Plohmann
Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis
DFRWS USA 2017, 2017

Elmar Padilla
Tips to Prevent, Detect & Respond to Cyberattacks - How Safe Is Your Firmware?
IESE insight, 2017

Daniel Plohmann
Malpedia: A Collaborative Effort to Inventorize the Malware Landscape
Botconf 2017, Montpellier, Frankreich, 2017
https://botconf2017.sched.com/event/CtHF/malpedia-a-collaborative-effort-to-inventorize-the-malware-landscape

Daniel Plohmann, Martin Clauß, Steffen Enders, Elmar Padilla
Malpedia: A Collaborative Effort to Inventorize the Malware Landscape
The Journal on Cybercrime & Digital Investigations, No. 1, Vol. 3: p. 1--19, December 2017
https://journal.cecyf.fr/ojs/index.php/cybin/article/view/17/20

Fabian Rump, Timm Behner
Creating a Distributed Malware Analysis Toolchain with MASS
Demonstrations of the 42nd Annual IEEE Conference on Local Computer Networks (LCN-Demos 2017), Singapore, Singapore, October 2017

Fabian Rump, Timm Behner, Raphael Ernst
Distributed and Collaborative Malware Analysis with MASS
42nd Annual IEEE Conference on Local Computer Networks (LCN 2017), Singapore, Singapore, October 2017

Luis Alberto Benthin Sanguino, Rafael Uetz
Software Vulnerability Analysis Using CPE and CVE
2017
https://arxiv.org/abs/1705.05347

Rafael Uetz, Luis Alberto Benthin Sanguino, Christian Hemminghaus, Steffen Krebs, Tayfun Yilmaz
BREACH: A Framework for the Simulation of Cyber Attacks on Company's Networks (Poster)
Digital Forensics Research Conference EU (DFRWS EU 2017) / 10th International Conference on IT Security Incident Management & IT Forensics (IMF 2017), 2017

Peter Weidenbach, Raphael Ernst, Elmar Padilla
Hardware- und hardwarenahe Trojaner
September 2017
http://www.fkie.fraunhofer.de/de/Pressemeldungen/hwt-bericht.html


2016

Jonathan Chapman, Simon Ofner, Piotr Pauksztelo
Key Factors in Industrial Control System Security
41st IEEE LCN, Lyon, France, Dec. 01, 2016

Jonathan Chapman, Daniel Schmitz, Elmar Gerhards-Padilla
Measuring the Effect of Hiding Messages in JPEG Files
Future Security 2016, Berlin, Germany, September 2016

Martin Clauß, Raphael Ernst
Kalkuliertes Risiko - Marktübersicht Sandbox als Komplettsystem
iX 03/2016, Jan. 2016

Martin Clauß, Raphael Ernst
Sandbox Evasion the Easy Way - Evading Major Commercial Sandboxes
Future Security 2016, Berlin, Germany, p. 299-306, September 2016

Sebastian Eschweiler, Khaled Yakdan, Elmar Gerhards-Padilla
discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code
Proceedings of the 23nd Network and Distributed System Security Symposium (NDSS), 2016

Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, Elmar Gerhards-Padilla
A Comprehensive Measurement Study of Domain Generating Malware
Proceedings of the 25th USENIX Security Symposium, Austin, USA, August 2016

Fabian Rump, Sascha Jopen, Matthias Frank
Using Probabilistic Multipath Routing to Improve Route Stability in MANETs
2016 IEEE 41st Conference on Local Computer Networks (LCN), p. 192-195, Nov 2016

Luis Alberto Benthin Sanguino, Martin Clauß
Analysis of Free Movies and Series Websites Guided by User Search
The botnet fighting conference, Botconf, Lyon, France, Dec. 01, 2016

Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, Matthew Smith
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016


2015

Thomas Barabosch, Adrian Dombeck, Elmar Gerhards-Padilla
ParasiteEx: Disinfecting Parasitic Malware Platform-Independently
10th Future Security, Berlin, Germany, September 2015

Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla
BotWatcher: Transparent and Generic Botnet Tracking
Proc. of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015), Kyoto, Japan, November 2015

Thomas Barabosch, Elmar Gerhards-Padilla
Behavior-Driven Development in Malware Analysis
The botnet fighting conference, Botconf, Paris, France, December 2015
https://journal.cecyf.fr/ojs/index.php/cybin/article/view/9

Matthias Frank
A Multi-Platform Library for a Software Sender for the (proposed) ILDA Digital Network
International Conference on Networked Systems 2015 (NetSys), Cottbus, Germany, March 2015
https://www.semanticscholar.org/paper/A-Multi-Platform-Library-for-a-Software-Sender-for-Frank/4bafa1907c823d8daee4f35d63fccc7ca499289d

Matthias Frank, Horacio Pugliese, Andrew Berry, Tim Walsh, Dirk Apitz
The ILDA Digital Network Stream Specification
No. Revision 001, 2015
https://www.ilda.com/resources/StandardsDocs/ILDA_IDN-Stream_rev001.pdf

Sascha Jopen, Arne Schulz, Raphael Ernst
Measuring and Modeling Performance of WLAN Communication for Multistatic Sonar Applications
Local Computer Networks (LCN), 2015 IEEE 40th Conference, Clearwater, Florida, USA, October 2015

Peter Martini, Elmar Gerhards-Padilla
Cyberkriminalität - Licht ins Dunkel bringen
BSI-Magazin 2013/14, p. 8, Jan. 2015
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/Magazin/BSI-Magazin_2013-14.pdf

Simon Ofner, Matthias Frank
Real-time Streaming with Millisecond Granularity
40th IEEE Conference on Local Computer Networks, LCN 2015, Clearwater Beach, FL, USA, p. 490--493, October 2015
https://doi.org/10.1109/LCN.2015.7366360

Mohammad Qasem, Lukas Pustina
ITFComp: a compression algorithm for ARM architecture instruction trace files
Proceedings of the 8th International Conference on Simulation Tools and Techniques, 2015

Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, Matthew Smith
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations
Proceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015), San Diego, CA, USA, February 2015


2014

Thomas Barabosch
Detecting Host-Based Code Injection Attacks
9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit (SPRING 9), Bochum, July/August 31-01, 2014

Thomas Barabosch, Sebastian Eschweiler, Elmar Gerhards-Padilla
Bee Master: Detecting Host-Based Code Injection Attacks
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Egham, UK, Vol. 8550: p. 235-254, July 2014
http://dx.doi.org/10.1007/978-3-319-08509-8_13

Thomas Barabosch, Elmar Gerhards-Padilla
Host-Based Code Injection Attacks: A Popular Technique Used By Malware
9th International Conference on Malicious and Unwanted Software (MALCON), Fajardo, Puerto Rico, October 28-30, 2014

Raphael Ernst, Sascha Jopen, Tobias Bartelt
Reducing MANET neighborhood discovery overhead
Local Computer Networks (LCN), 2014 IEEE 39th Conference on, Edmonton, AB, Canada, p. 374-377, Sept. 8-11, 2014

Raphael Ernst, Peter Weidenbach
Die unsichtbare Bedrohung - Erkennungsmethoden für Kernel-Level-Rootkits
iX, No. 12, p. 112-115, Dec. 2014

Matthias Frank
Demonstration of Bandwidth Demand and Jitter Properties of a Software Sender/Scheduler for the (proposed) ILDA Digital Network
39th IEEE Conference on Local Computer Networks (LCN), Edmonton, Canada, September 2014
https://www.ieeelcn.org/prior/LCN39/lcn39demos/Frank.pdf

Jan Gassen, Jonathan Chapman
HoneyAgent: Detecting Malicious Java Applets by Using Dynamic Analysis
9th International Conference on Malicious and Unwanted Software, MALCON, Fajardo, Puerto Rico, October 28-30, 2014

Laura Guevara, Daniel Plohmann, Elmar Gerhards-Padilla
Semantic Exploration of Binaries
The botnet fighting conference, Botconf, Nancy, France, Dec. 03-05, 2014

Steffen Wendzel, Viviane Zwanger, Michael Meier, Sebastian Szlósarczyk
Envisioning Smart Building Botnets
Proc. GI Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, Vienna, p. 319-329, Mar. 19-21, 2014
http://www.wendzel.de/dr.org/files/Papers/EnvisioningSmartBuildings.pdf

Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier
Codescanner: Detecting (Hidden) x86/64 Code in Arbitrary Files
9th International Conference on Malicious and Unwanted Software, MALCON, Fajardo, Puerto Rico, October 28-30, 2014


2013

Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus
Proceedings of the 8th International Conference on Malicious and Unwanted Software (Malware 2013), Fajardo, USA, October 2013

Nils Aschenbruck, Jan Bauer, Raphael Ernst, Christoph Fuchs, Sascha Jopen
BonnSens: A Mesh-based Command and Control Sensing System for Public Safety Scenarios
Demo at the Conference on Networked Systems (NetSys/KIVS), Stuttgart, Germany, Mar 11-15, 2013

Nils Aschenbruck, Christoph Fuchs
Evaluating the Impact on Application-Related Metrics for Sensor Data and Voice Transmission in Mobile Wireless Mesh Scenarios
Conference on Networked Systems (NetSys/KIVS), Stuttgart, Germany, Mar 11-15, 2013

Jan Bauer, Nils Aschenbruck, Raphael Ernst, Christoph Fuchs, Sascha Jopen
BonnSens: A Mesh-based Command and Control Sensing System for Public Safety Scenarios
PIK - Praxis der Informationsverarbeitung und Kommunikation, Vol. 36: p. 51-51, February 2013

Christoph Fuchs, Tim Schneider
A Controlled Loss Transport Service for Sensor Data Transmission
Proc. of Military Communications and Information Systems Conference (MCC 2013), Saint-Malo, France, Oct 7-9, 2013

Sascha Alexander Jopen, Raphael Ernst
Predicting Optimized Link State Routing Protocol Control Message Overhead in MANETs
7th Workshop on Wireless and Mobile Ad-Hoc Networks (WMAN 2013) in conjunction with Networked Systems 2013, Stuttgart, Germany, Mar 11, 2013

Jonathan Kirchhoff, Jan Bauer, Raphael Ernst, Christoph Fuchs, Sascha Jopen, Nils Aschenbruck
Extending ODMRP for On-Site Deployments in Disaster Area Scenarios
32nd IEEE International Performance Computing and Communications Conference (IPCCC'2013), San Diego, USA, p. 1-10, Dec 6-8, 2013
http://dx.doi.org/10.1109/PCCC.2013.6742790

Daniel Plohmann, Sebastian Eschweiler, Elmar Gerhards-Padilla
Patterns of a Cooperative Malware Analysis Workflow
Proc. of the 5th International Conference on Cyber Conflict (CyCon'2013), Tallinn, Estonia, June 4-7, 2013

Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos
P2PWNED: Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P 2013), San Francisco, CA, USA, May 19-22, 2013
http://www.christian-rossow.de/publications/p2pwned-ieee2013.pdf


2012


Proc. of the 7th Security Research Conference, Future Security 2012
Vol. 318: September 2012

Nils Aschenbruck, Jan Bauer, Jakob Bieling, Alexander Bothe, Matthias Schwamborn
A Security Architecture and Modular Intrusion Detection System for WSNs
Proc. of the 9th International Conference on Networked Sensing Systems (INSS), Antwerp, Belgium, p. 1-8, Jun. 11-14, 2012
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06240521

Nils Aschenbruck, Jan Bauer, Jakob Bieling, Alexander Bothe, Matthias Schwamborn
Let's Move: Adding Arbitrary Mobility to WSN Testbeds
Proc. of the 21st International Conference on Computer Communication Networks (ICCCN), Munich, Germany, Jul./Aug. 30-2, 2012

Nils Aschenbruck, Jan Bauer, Jakob Bieling, Alexander Bothe, Matthias Schwamborn
Selective and Secure Over-The-Air Programming for Wireless Sensor Networks
Proc. of the 5th International Workshop on Sensor Networks (SN 2012) in conjunction with the 21st International Conference on Computer Communication Networks (ICCCN'12), Munich, Germany, Jul./Aug. 30-2, 2012

Nils Aschenbruck, Elmar Gerhards-Padilla, Martin Lambertz
Applicability of Crypto-based Security Approaches in Tactical Wireless Multi-hop Networks
Local Computer Networks (LCN), 2012 IEEE 37th Conference on, Clearwater, Florida, USA, Oct. 22-25, 2012

Thomas Barabosch, Andre Wichmann, Felix Leder, Elmar Gerhards-Padilla
Automatic Extraction of Domain Name Generation Algorithms from Current Malware
RTO-IST-111/RSY-026 Symposium, Koblenz, Germany, September 24-26, 2012

Jonathan Chapman, Felix Govaers, Elmar Gerhards-Padilla
FKIE Cyber Defense and Sensor Data Fusion: Teaming Up for Better Botnet Detection
Poster at the 7th Future Security, Bonn, Germany, September 04-06, 2012

Jonathan Chapman, Felix Govaers, Elmar Gerhards-Padilla
Network Traffic Characteristics for Detecting Future Botnets
Military Communications and Information Systems Conference (MCC), Danzig, Poland, October 08-09, 2012

Raphael Ernst, Peter Martini
Adaptive Hello for the Neighborhood Discovery Protocol
Local Computer Networks (LCN), 2012 IEEE 37th Conference on, Clearwater, Florida, USA, Oct. 22-25, 2012

Sebastian Eschweiler, Elmar Gerhards-Padilla
Platform-Independent Recognition of Procedures in Binaries Based on Simple Characteristics
it - Information Technology, No. 2, München, Germany, Vol. 54: p. 64-70, April 2012

Sebastian Eschweiler, Elmar Gerhards-Padilla
Towards Sound Forensic Acquisition of Volatile Data
Proc. of the 7th Security Research Conference, Future Security 2012, Bonn, Germany, Vol. 318: p. 289-298, September 04-06, 2012

Jan Gassen, Elmar Gerhards-Padilla
A Scalable Approach for a Distributed Network of Attack Sensors
ERCIM-News, No. 90, Vol. 2012: p. 20, July 2012
http://ercim-news.ercim.eu/en90/special/a-scalable-approach-for-a-distributed-network-of-attack-sensors

Jan Gassen, Elmar Gerhards-Padilla
Erkennung neuer Schadprogramme
digma - Zeitschrift für Datenrecht und Informationssicherheit, Vol. 2012: December 2012

Jan Gassen, Elmar Gerhards-Padilla
HoneypotMe - Effektivere Honeypots durch Sensoren auf Produktivsystemen
ADMIN-Magazin, Vol. 2012: p. 90, July/August 2012

Jan Gassen, Elmar Gerhards-Padilla
HoneypotMe - Extending Honeypot Sensors to Production Systems
Poster at the 7th Future Security, Bonn, Germany, September 04-06, 2012

Jan Gassen, Elmar Gerhards-Padilla
HoneypotMe - Flexible Auslagerung von Honeypot-Sensorik auf gefährdete Endgeräte
Proc. of the 19th DFN Workshop "Sicherheit in vernetzten Systemen", Hamburg, Germany, February 21-22, 2012

Jan Gassen, Elmar Gerhards-Padilla, Peter Martini
Current Botnet-Techniques and Countermeasures
PIK - Praxis der Informationsverarbeitung und Kommunikation, Vol. 35: p. 3-10, April 2012

Elmar Gerhards-Padilla
Bot-Netze: Der Feind im eigenen Haus - Gekaperte Rechner bedrohen Unternehmen und Behörden
Sicherheitstechnischer Report, Bonn, Germany, Vol. 2012: April 2012

Felix Matenaar, Felix Leder, Andre Wichmann, Elmar Gerhards-Padilla
CIS: The Crypto Intelligence System for Automatic Detection and Localization of Cryptographic Functions in Current Malware
Proc. of the 7th International Conference on Malicious and Unwanted Software, MALWARE, Fajardo, Puerto Rico, October 16-18, 2012

Daniel Plohmann, Elmar Gerhards-Padilla
A Case Study of the Miner Botnet
Proc. of the 4th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, June 05-08, 2012

Daniel Plohmann, Elmar Gerhards-Padilla
Aktuelles aus der Welt der Botnetze
IT-Report, Bonn, Germany, Mai 2012

Daniel Plohmann, Elmar Gerhards-Padilla
Das schwächste Glied - Wie sich Unternehmen und Behörden vor Cyber-Attacken schützen können
Sicherheitstechnischer Report, Bonn, Germany, Vol. 2012: April 2012

Daniel Plohmann, Elmar Gerhards-Padilla
Malware and Botnet Analysis Methodology
ERCIM-News, No. 90, Vol. 2012: p. 22, July 2012
http://ercim-news.ercim.eu/en90/special/malware-and-botnet-analysis-methodology

Daniel Plohmann, Christopher Kannen
AntiRE - An Executable Collection of Anti-Reversing Techniques
Proceedings of the Seventh GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), No. SR-2012-01, Berlin, Germany, p. 23, July 5-6, 2012
http://www.sec.t-labs.tu-berlin.de/spring/content/spring7-book_of_abstracts.pdf

Sebastian Pöplau, Jan Gassen, Elmar Gerhards-Padilla
A Honeypot for Arbitrary Malware on USB Storage Devices
7th International Conference on Risks and Security of Internet and Systems (CriSIS), Cork, Ireland, October 10-12, 2012

Florian Schmitt, Jan Gassen, Elmar Gerhards-Padilla
PDF Scrutinizer: Detecting JavaScript-based Attacks in PDF Documents
Proc. of the 10th Annual Conference on Privacy, Security and Trust (PST), Paris, France, July 16-18, 2012

Andre Wichmann, Elmar Gerhards-Padilla
Using Infection Markers as a Vaccine against Malware Attacks
Proc. of the 2nd Workshop on Security of Systems and Software resiLiency, 3SL, Besancon, France, November 20-23, 2012


2011

Nils Aschenbruck, Jan Bauer, Jakob Bieling, Alexander Bothe, Matthias Schwamborn
WSNLab - a Security Testbed and Security Architecture for WSNs
Demo at the 36th IEEE Conference on Local Computer Networks (LCN), Bonn, Germany, Oct. 4-7, 2011
http://www.ieeelcn.org/prior/LCN36/lcn36demos/lcn-demo2011_aschenbruck_2.pdf

Nils Aschenbruck, Jan Bauer, Jakob Bieling, Elmar Gerhards-Padilla, Matthias Schwamborn
WSNLab - A Security Testbed for WSNs
Proc. of the 6th Future Security Research Conference, Berlin, Germany, p. 575-579, Sep. 5-7, 2011

Nils Aschenbruck, Jan Bauer, Raphael Ernst, Christoph Fuchs, Jonathan Kirchhoff
A Mesh-based Command and Control Sensing System for Public Safety Scenarios
Demo at the 9th ACM Conference on Embedded Networked Sensor Systems (SenSys), Seattle, Washington, USA, p. 395-396, Nov. 1-4, 2011
http://doi.acm.org/10.1145/2070942.2071007

Nils Aschenbruck, Jan Bauer, Raphael Ernst, Christoph Fuchs, Jonathan Kirchhoff
Deploying a Mesh-based Command and Control Sensing System in a Disaster Area Maneuver
Poster at the 9th ACM Conference on Embedded Networked Sensor Systems (SenSys), Seattle, Washington, USA, p. 335-336, Nov. 1-4, 2011
http://doi.acm.org/10.1145/2070942.2070977

Nils Aschenbruck, Jan Bauer, Raphael Ernst, Elmar Gerhards-Padilla
Parametrization of Terrestrial Ad-Hoc Routing Protocols for Tactical Underwater Networks
Proc. of the 4th International Workshop on Tactical Mobile Ad Hoc Networking in conjunction with the 12th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc), Paris, France, May 16, 2011

Nils Aschenbruck, Raphael Ernst, Arne Schulz
Practical Network Challenges with Multistatic Sonar Systems
Proc. of the 4th Conference and Exhibition on Underwater Acoustic Measurements: Technologies and Results (UAM), Island of Kos, Greece, Jun. 20-24, 2011
http://promitheas.iacm.forth.gr/UAM_Proceedings/uam2011/UAM2011%20Paper%2028.9.pdf

Nils Aschenbruck, Christoph Fuchs
An Integrated Simulation Environment for Sensor Data Fusion Applications in Wireless Mesh Networks
Proc. of the Military Communications Conference (MILCOM), Baltimore, Maryland, USA, p. 1778-1783, Nov. 7-11, 2011
http://xplqa30.ieee.org/stamp/stamp.jsp?tp=&arnumber=6127569

Nils Aschenbruck, Christoph Fuchs
STMP - Sensor data transmission and management protocol
Local Computer Networks (LCN), 2011 IEEE 36th Conference on, Bonn, Germany, p. 475-483, Oct. 4-7, 2011
http://dx.doi.org/10.1109/LCN.2011.6115509

Nils Aschenbruck, Christoph Fuchs, Sascha Jopen, Tim Schneider
Demonstration of the Sensor Data Transmission and Management Protocol (STMP)
Demo at the 36th IEEE Conference on Local Computer Networks (LCN), Bonn, Germany, Oct. 4-7, 2011
http://www.ieeelcn.org/prior/LCN36/lcn36demos/lcn-demo2011_aschenbruck.pdf

Nils Aschenbruck, Aarti Munjal, Tracy Camp
Trace-based Mobility Modeling for Multi-hop Wireless Networks
Computer Communications, Vol. 34: p. 704-714, May 2011
http://dx.doi.org/10.1016/j.comcom.2010.11.002

Uli Bornhauser, Peter Martini, Martin Horneffer
Scalability of iBGP Path Diversity Concepts
Proceedings of the 10th IFIP Networking 2011, Valencia, Spain, May 2011

Uli Bornhauser, Peter Martini, Martin Horneffer
The Scope of the iBGP Routing Anomaly Problem
Proceedings of the 17th Communication in Distributed Systems (KIVS), Kiel, Germany, March 2011

Matthias Frank
An Experimental Architecture of IP-based Network Control of Laser Show Projection Systems
The 36th IEEE Conference on Local Computer Networks (LCN), Bonn, Germany, October 2011
https://www.ieeelcn.org/prior/LCN36/lcn36demos/lcn-demo2011_frank.pdf

Christoph Fuchs, Monika Wieneke, Nils Aschenbruck, Peter Martini
A Survey on Indoor Tracking for Mission Critical Scenarios
Pervasive and Mobile Computing, No. 1, Vol. 7: p. 1-15, February 2011
http://www.sciencedirect.com/science/article/B7MF1-50HYGH0-1/2/fdc40d80a0ac900096f516795c88e62e

Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini
TOGBAD - An Approach to Detect Routing Attacks in Tactical Environments
Security and Communication Networks, Vol. 4: p. 793-806, Aug. 2011
http://dx.doi.org/10.1002/sec.185

Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini
TOGBAD-LQ - Using Challenge-Response to Detect Fake Link Qualities
17th GI/ITG Conference on Communication in Distributed Systems (KiVS 2011), Kiel, Germany, Vol. 17: p. 85-96, March 08-11, 2011
http://drops.dagstuhl.de/opus/volltexte/2011/2960

Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini
Wormhole Detection using Topology Graph based Anomaly Detection
6th Workshop on Wireless and Mobile Ad-Hoc Networks, WMAN, Kiel, Germany, March 10, 2011
http://journal.ub.tu-berlin.de/eceasst/article/view/503/551

Daniel Plohmann, Elmar Gerhards-Padilla, Felix Leder
Botnets: 10 Tough Questions
Heraklion, Greece, March 07, 2011
http://www.enisa.europa.eu/activities/Resilience-and-CIIP/networks-and-services-resilience/botnets/botnets-10-tough-questions/at_download/fullReport

Daniel Plohmann, Elmar Gerhards-Padilla, Felix Leder
Botnets: Detection, Measurement, Disinfection & Defence
Heraklion, Greece, March 07, 2011
http://www.enisa.europa.eu/activities/Resilience-and-CIIP/networks-and-services-resilience/botnets/botnets-measurement-detection-disinfection-and-defence/at_download/fullReport

Daniel Plohmann, Elmar Gerhards-Padilla, Felix Leder, Jan Gassen, Andre Wichmann, Sebastian Eschweiler
Botnets: Detection, Measurement and Defense
Proc. of the 6th Future Security, Berlin, Germany, p. 562-567, September 05-07, 2011

Simon Schwarzer, Patrick Peschlow, Lukas Pustina, Peter Martini
Automatic Estimation of Performance Requirements for Software Tasks of Mobile Devices
ICPE'11: Proceedings of the 2nd ACM/SPEC International Conference on Performance Engineering, Karlsruhe, Germany, Mar 2011
http://icpe2011.ipd.kit.edu


2010

Nils Aschenbruck, Raphael Ernst, Elmar Gerhards-Padilla, Matthias Schwamborn
BonnMotion - a Mobility Scenario Generation and Analysis Tool
SIMUTools2010, 3rd International ICST Conference on Simulation Tools and Techniques, Torremolinos, Málaga, Spain, Mar 15-19, 2010

Nils Aschenbruck, Raphael Ernst, Peter Martini
Evaluation of Wireless Multi-Hop Networks in Tactical Scenarios using BonnMotion
16th European Wireless Conference, Lucca, Tuscany, Italy, Apr 12-15, 2010

Nils Aschenbruck, Raphael Ernst, Peter Martini
Indoor Mobility Modeling
IEEE Global Communications Conference (IEEE GLOBECOM 2010), Miami, Florida, USA, Dec 6-10, 2010

Nils Aschenbruck, Elmar Gerhards-Padilla
Intrusion Detection in Hierarchically Structured Wireless Multi-Hop Networks
Proc. of the 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies, Special session on ICT for Development and Disaster Recovery (ISABEL), Rome, Italy, November 7-10, 2010

Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini
Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop Networks
Proc. of the 7th Workshop on Wireless Ad hoc and Sensor Networks (WWASN), Genoa, Italy, June 25, 2010

Jan Bauer, Nils Aschenbruck, Raphael Ernst, Elmar Gerhards-Padilla, Peter Martini
Optimizing ODMRP for Underwater Networks
Proc. of the Military Communications Conference (MILCOM), San Jose, CA, USA, p. 623-628, Oct./Nov. 31-3, 2010
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=5680458

Jakob Bieling, Patrick Peschlow, Peter Martini
An Efficient GPU Implementation of the Revised Simplex Method
Proceedings of the 24th IEEE International Parallel and
Distributed Processing Symposium (IPDPS'10), 12th Workshop on Advances
in Parallel and Distributed Computational Models (APDCM'10),
Atlanta, Georgia, USA, April 2010

Uli Bornhauser, Peter Martini, Martin Horneffer
Root Causes for iBGP Routing Anomalies
Proceedings of the 35th IEEE Conference on Local Computer Networks (LCN 2010), Denver, Colorado, USA, October 2010

David Dittrich, Felix Leder, Tillmann Werner
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Proceedings of Workshop on Ethics in Computer Security Research (WECSR 2010), Tenerife, Canary Islands, Spain, Jan 28, 2010

Felix Govaers, Christoph Fuchs, Nils Aschenbruck
Evaluation of Network Effects on the Kalman Filter and Accumulated State Density Filter
Proc. of the 2nd International Workshop on Cognitive Information Processing (CIP2010), Elba Island, Italy, June 14-16, 2010

Felix Leder, Daniel Plohmann
PyBox - A Python approach to sandboxing
Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), No. SR-2010-01, Bonn, Germany, p. 4, July 7, 2010
https://eldorado.tu-dortmund.de/bitstream/2003/27336/1/BookOfAbstracts_Spring5_2010.pdf

Felix Leder, Bastian Steinbock, Peter Martini
Using Value Set Analysis for Classification of metamorphic Malware Samples
CARO Workshop, Helsinki, Finland, May 26-27, 2010


2009

Nils Aschenbruck, Christoph Fuchs, Peter Martini
Traffic Characteristics and Modeling of Emergency Calls at the PSAP
Proc. of the 17th Annual IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, London, UK, Sep. 21-23, 2009

Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini
Modeling Mobility in Disaster Area Scenarios
Elsevier Performance Evaluation, 2009

Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini
Modelling Mobility in Disaster Area Scenarios
Performance Evaluation, Vol. 66: p. 773-790, December 2009
http://dx.doi.org/10.1016/j.peva.2009.07.009

Nils Aschenbruck, Peter Martini
Modeling Public Safety Scenarios to Evaluate Wireless Communication Systems
Proc. of the Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Aalborg, Denmark, Oct. 17-20, 2009

Uli Bornhauser, Peter Martini, Martin Horneffer
An Inherently Anomaly-free iBGP Architecture
Proceedings of the 34rd IEEE Conference on Local Computer Networks (LCN 2009), Zurich, Switzerland, October 2009

Sergi Figuerola, Joan A. Garcia-Espin, Jordi Ferrer, Alexander Willner
Scalability Analysis and Evaluation of the Multi-domain, Optical Network Service Plane in Harmony
Published on the 35th European Conference and Exhibition on Optical Communication, Austria Center Vienna, Austria, 9 2009

Sergi Figuerola, Joan A. García-Espín, Jordi. Ferrer, Alexander Willner
Performance Analysis of Harmony: An Optical, Multi-domain Network Resource Broker
11th International Conference on Transparent Optical Networks, June 2009

Matthias Frank
Network based real-time control of a laser show projection system
The 34th IEEE Conference on Local Computer Networks (LCN), Zurich, Switzerland, October 2009
https://www.ieeelcn.org/prior/LCN34/lcn34demos/lcn-demo2009_frank.pdf

Elmar Gerhards-Padilla, Marko Jahnke, Alexander Wenzel
Intrusion Detection in Tactical Multi-hop Networks
Demo on 34th IEEE Conference on Local Computer Networks (LCN), Zürich, Switzerland, October 20-23, 2009

Felix Govaers, Simon Hunke, Elmar Gerhards-Padilla, Peter Martini
Neuartige Gefahrenbewertung von Schadsoftware
Proc. of the 16th DFN Workshop "Sicherheit in vernetzten Systemen", Hamburg, Germany, March 17-18, 2009

Felix Govaers, Monika Wieneke
Rao-Blackwellized Particle Filter for Security Surveillance
Proc. of the 39. Congress of the "Gesellschaft für Informatik", Lübeck, Germany, September 28-02, 2009

Marko Jahnke, Jens Tölle, Christian Thul, Peter Martini
Validating GrADAR - An Approach for Graph-based Automated DoS Attack Response
Proc. of the 34. IEEE Conference on Local Computer Networks (LCN2009), Zurich, Switzerland, 2009

G. Klein, M. Jahnke, J. Toelle, P. Martini
Enhancing Graph-based Automated DoS Attack Response
Proc. of the Cyber Warfare Conference, Cooperative Cyber Defense Centre of Excellence (CCD-CoE), Tallinn, Estonia, 2009

Felix Leder, Peter Martini
NGBPA Next Generation BotNet Protocol Analysis
Proc. of the 24th International Information Security Conference, Paphos, Cyprus, April 2009

Felix Leder, Peter Martini, Andre Wichmann
Finding and Extracting Crypto Routines from Malware
Proceedings of the 2nd IEEE International Workshop on Information and Data Assurance (WIDA'09), Phoenix, Arizona, USA, December 14, 2009

Felix Leder, Bastian Steinbock, Peter Martini
Classification and Detection of Metamorphic Malware using Value Set Analysis
Proc. of 4th International Conference on Malicious and Unwanted Software (Malware 2009), Montreal, Canada, October 2009

Felix Leder, Tillmann Werner
Containing Conficker - To Tame A Malware
March 2009

Felix Leder, Tillmann Werner, Peter Martini
Proactive Botnet Countermeasures - An Offensive Approach
Proc. of 1st CCDCEO Conference on Cyber Warfare, Tallinn - Estonia, June 17-19, 2009

Patrick Peschlow, Andreas Voss, Peter Martini
Good News for Parallel Wireless Network Simulations
Proceedings of the 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM'09), Tenerife, Canary Islands, Spain, October 2009

Lukas Pustina, Michael Gerharz, Peter Martini, Simon Schwarzer, Volker Deichmann
A Practical Approach for Performance-Driven UML Modelling of Handheld Devices - A Case Study
Journal of Systems and Software, Volume 82, Issue 1, Special Issue: Software Performance - Modeling and Analysis, 2009

Pavel Pustina, Albert Bradac, Lukas Pustina
Möglichkeiten zur Eingrenzung der Kollisionstelle auf der Fahrbahn anhand des Splitterfeldes
In the Proceedings of the XVIII. International Scientific Conference on Forensic Engineering, Brno, Czech Republic, January 23-24, 2009

Thiemo Voigt, Joakim Eriksson, Fredrik Österlind, Robert Sauter, Nils Aschenbruck, Pedro J. Marron, Vinny Reynolds, Lei Shu, Otto Visser, Anis Kouba, Andreas Köpke
Towards Comparable Simulations of Cooperating Objects and Wireless Sensor Networks
1st International Workshop on Performance Methodologies and Tools for Wireless Sensor Networks, Pisa, Italy, Oct. 23, 2009

Tillmann Werner, Christoph Fuchs, Elmar Gerhards-Padilla, Peter Martini
Nebula ­- Generating Syntactical Network Intrusion Signatures
Proc. of 4th International Conference on Malicious and Unwanted Software (Malware 2009), Montreal, Canada, October 2009

Alexander Willner, Christoph Barz, Joan Garcia Espin, Jordi Ferrer Riera, Sergi Figuerola
Harmony: Advance Reservations in Heterogeneous Multi-domain Environments
Proceedings of the 8th IFIP Networking conference, Springer's LNCS, Aachen, Germany, 5 2009


2008

Nils Aschenbruck, Elmar Gerhards-Padilla, Marko Jahnke, Gabriel Klein, Alexander Wenzel
Intrusion Detection in Tactical Multi-hop Networks
Demo on 14th Annual International Conference on Mobile Computing and Networking (Mobicom), San Francisco, USA, September 14-19, 2008

Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini
A Survey on Mobility Models for Performance Analysis in Tactical Mobile Networks
Journal of Telecommunications and Information Technology (JTIT), Vol. 2: p. 54-61, 2008

Nils Aschenbruck, Peter Martini
Evaluation and Parameterization of Voice Traffic Models for Disaster Area Scenarios
Proc. of the 33rd IEEE Conference on Local Computer Networks, Montreal, Canada, Oct. 14-17, 2008

Nils Aschenbruck, Christian de Waal, Peter Martini
Distribution of Nodes in Disaster Area Scenarios and its Impact on Topology Control Strategies
Proc. of the 2nd Workshop on Mission-Critical Networking in conjunction with the IEEE Infocom, Phoenix, AZ, USA, April 18, 2008

T. Aurisch, T. Ginzler, P. Martini
Optimization techniques for military multicast key management
Proceedings of the IEEE MILCOM 2008, San Diego, USA, Nov 17-19, 2008

T. Aurisch, T. Ginzler, P. Martini, R. Ogden, T. Tran, H. Seifert
Automatic Multicast IPSec by using a proactive IPSec Discovery Protocol and a Group Key Management
Journal of Telecommunications and Information Technology (JTIT), No. 2, p. 77-83, 2008

Thomas Bachran, Frank E. Schneider, Christian de Waal
Mehrrobotersysteme in der vernetzten Operationsführung
Ergonomie und Mensch-Maschine-Systeme, p. 307-329, 2008

Christoph Barz, Uli Bornhauser, Peter Martini, Markus Pilz
Timeslot-based Resource Management in Grid Environments
Proceedings of the IASTED Conference on Parallel and Distributed Computing and Networks (PDCN2008), Innsbruck, Austria, p. 22-31, February 2008

Christoph Barz, Uli Bornhauser, Peter Martini, Markus Pilz, Christian de Waal, Alexander Willner
ARGON: Reservation in Grid-enabled Networks
Proceedings of the 1. DFN-Forum on Communication Technologies, Kaiserslautern, Germany, May 2008

Christoph Barz, Markus Pilz, Andre Wichmann
Temporal Routing Metrics for Networks with Advance Reservations
Proceedings of the Workshop on High Performance Grid Networks, co-located with CCGrid 2008, Lyon, France, May 2008

Uli Bornhauser, Peter Martini
A Divergence Analysis in Autonomous Systems using Full-mesh iBGP
Proceedings of the Sixth Annual Communication Networks and Services Research Conference (CNSR 2008), Halifax, Nova Scotia, Canada, p. 600-608, May 2008

Uli Bornhauser, Peter Martini, Martin Horneffer
Scalability Considerations for an Anomaly-free iBGP Routing
Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN 2008), Montreal, Quebec, Canada, p. 136-143, October 2008

Edmund Coersmeier, Sven Jaborek, Patrick Paul, Martin Bucker, Marc Hoffmann, Lukas Pustina, Simon Schwarzer, Felix Leder, Peter Martini
Multicore Processing for Object Recognition in Mobile Devices
Proceedings of the embedded world Conference 2008, Nürnberg, Germany, February 26-27, 2008

S. Figuerola, J. A. Garcia, A. Sanchez, C. de Waal, Alexander Willner
The network service plane: An approach for inter-domain network reservations
Transparent Optical Networks, 2008. ICTON 2008. 10th Anniversary International Conference on, Vol. 1: June 2008

Christoph Fuchs, Nils Aschenbruck, Felix Leder, Peter Martini
Detecting VoIP based DoS attacks at the Public Safety Answering Point
Proceedings of the ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, p. 148-155, March 18-20, 2008

Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini
Enhancements on and Evaluation of TOGBAD in Tactical MANETS
Proceedings of the 27th Military Communication Conference (MILCOM'08), San Diego, USA, November 17-19, 2008

Marko Jahnke, Christian Thul, Peter Martini
Comparison and Improvement of Metrics for Selecting Intrusion Response Measures against DoS Attacks
Proceedings of the GI Sicherheit2008 Conference, Saarbrücken, Germany, Apr 2008

Marko Jahnke, Alexander Wenzel, Gabriel Klein, Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Ebinger, Stefan Karsch
MITE - MANET Intrusion Detection for Tactical Environments
Proc. of the RTO IST-22-PBM Symposium, Ljubljana, Slovenia, October 15-17, 2008

Felix Leder, M. Schloesser, Tillmann Werner, G. Wicherski
Stormfucker: Owning the Storm Botnet
25C3, 25th Chaos Communication Congress, Berlin, Germany, Dec. 2008

Patrick Peschlow, Martin Geuer, Peter Martini
Logical Process based Sequential Simulation Cloning
Proceedings of the 41st IEEE Annual Simulation Symposium (ANSS'08), Ottawa, Canada, p. 237-244, April 2008

Patrick Peschlow, Peter Martini, Jason Liu
Interval Branching
Proceedings of the 22nd IEEE/ACM/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'08), Rome, Italy, p. 99-108, June 2008

Lukas Pustina, Simon Schwarzer, Peter Martini
A Methodology for Performance Predictions of Future ARM Systems Modelled in UML
Proceedings of the 2nd Annual IEEE International Systems Conference Syscon 2008, Montreal, Canada, April 7-10, 2008

Lukas Pustina, Simon Schwarzer, Peter Martini
Using Representative Intervals for Trace-Based Performance Analysis of Mobile Phone Use Cases
Proceedings of the 24th UK Performance Engineering Workshop, London, UK, July 3-4, 2008


2007

Nils Aschenbruck, Elmar Gerhards-Padilla, Michael Gerharz, Matthias Frank, Peter Martini
Modelling Mobility in Disaster Area Scenarios
Proc. of the 10th ACM-IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Chania, Crete Island, Greece, p. 4-12, October 22-26, 2007

Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini
A Survey on Mobility Models for Performance Analysis in Tactical Mobile Networks
Proc. of the Military Communications and Information Systems Conference, Bonn, Germany, September 25-26, 2007

Nils Aschenbruck, Michael Gerharz, Peter Martini
Characterisation and Modelling of Voice Traffic in First Responder Networks
Proc. of the 32nd IEEE Conference on Local Computer Networks, Dublin, Ireland, p. 295-302, October 15-18, 2007

Nils Aschenbruck, Michael Gerharz, Peter Martini
How to Assign Traffic Sources to Nodes in Disaster Area Scenarios
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, New Orleans, Louisiana, p. 289-296, April 11-13, 2007

Christoph Barz, Thomas Eickermann, Markus Pilz, Oliver Wäldrich, Lidia Westphal, Wolfgang Ziegler
Co-Allocating Compute and Network Resources - Bandwidth on Demand in the VIOLA Testbed
CoreGRID Symposium, Rennes, France, p. 193-202, August 2007

Christoph Barz, Peter Martini, Markus Pilz, Florian Purnhagen
Experiments on Network Services for the Grid
Proceedings of the IEEE Local Computer Networks Conference, Dublin, Ireland, October 2007

Harald Bongartz, Thomas Bachran, Christian de Waal, Matthias Frank
Performance evaluation of a proactive link quality based uni- and multicast routing protocol for MANETs
Proceedings of 15. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen, KiVS, Berne, Switzerland, February 26-28, 2007

Edmund Coersmeier, Juergen Goetze, Marc Hoffmann, Klaus Hueske, Felix Leder, Peter Martini
Parallelization of Radio Algorithms for Multi-Processor Platforms
Proc. of the 12th Int. OFDM-Workshop (InOWo'07), Hamburg, Germany, August 2007

Edmund Coersmeier, Klaus Hueske, Marc Hoffmann, Felix Leder, Peter Martini, Harald Bothe
Combining Cognitive Radio and Software Radio Approach for Low Complexity Receiver Architecture
Proceedings of the International Symposium on Advanced Radio Technologies (ISART), Boulder, Colorado, February 26-28, 2007

Elmar Gerhards-Padilla, Nils Aschenbruck
Detection of Attacks on Application and Routing Layer in Tactical MANETs
Proceedings of the Second GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), Dortmund, Germany, July 2007

Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini, Marko Jahnke, Jens Tölle
Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs
Proceedings of the 3rd IEEE LCN Workshop on Network Security (WNS'07), Dublin, Ireland, p. 1043-1050, October 2007

Elmar Gerhards-Padilla, Marko Jahnke
Spezielle Sicherheitsrisiken für taktische mobile Adhoc-Netzwerke (MANETs)
Report Verlag IT-Report, p. 59-62, May 2007

Marko Jahnke, Christian Thul, Peter Martini
Graph based Metrics for Intrusion Response Measures in Computer Networks
Proceedings of the 3rd IEEE LCN Workshop on Network Security (WNS'07), Dublin, Ireland, October 2007

Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini
Methodologies and Frameworks for Testing IDS in Adhoc Networks
Proc. of the 3-rd ACM International Workshop on QoS and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, p. 113-122, October 22, 2007

Patrick Peschlow, Tobias Honecker, Peter Martini
A Flexible Dynamic Partitioning Algorithm for Optimistic Distributed Simulation
Proceedings of the 21st IEEE/ACM/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'07), San Diego, California, USA, p. 219-228, June 2007

Patrick Peschlow, Peter Martini
A Discrete-event Simulation Tool for the Analysis of Simultaneous Events
Proceedings of the 2nd International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'07), 1st International Workshop on Network Simulation Tools (NSTools'07), Nantes, France, October 2007

Patrick Peschlow, Peter Martini
Analyzing Simultaneous Events in Distributed Simulation
Proceedings of the 4th International Mediterranean Modelling Multiconference (I3M'07), 19th European Modeling and Simulation Symposium (EMSS'07), Bergeggi, Italy, p. 29-36, October 2007

Patrick Peschlow, Peter Martini
Efficient Analysis of Simultaneous Events in Distributed Simulation
Proceedings of the 11th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT'07), Chania, Crete Island, Greece, p. 244-251, October 2007

Lukas Pustina, Michael Gerharz, Peter Martini, Simon Schwarzer, Volker Deichmann
Performance Evaluation of a DVB-H Enabled Mobile Device System Model
Proceedings of the 6th International Workshop on Software and Performance WOSP 2007, Buenos Aires, Argentina, p. 164-171, February 5-8, 2007

Pavel Pustina, Albert Bradac, Lukas Pustina
Bestimmung der Kollisionsgeschwindigkeit bei Fußgängerunfällen
Proceedings of the XVI. EVU-Conference 2007: Uncertainty in Reconstruction of Road Accidents, Krakau, Poland, November 8-11, 2007


2006

Nils Aschenbruck, Matthias Frank, Peter Martini, Jens Tölle, Roland Legat, Heinz-Dieter Richmann
Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks
Proceedings of the Fourth IEEE International Workshop on Information Assurance, Royal Holloway, United Kingdom, p. 103-108, April 13-14, 2006

Nils Aschenbruck, Michael Gerharz, Matthias Frank, Peter Martini
Modelling Voice Communication in Disaster Area Scenarios
Proceedings of the 31st IEEE Conference on Local Computer Networks LCN 2006, Tampa, Florida, p. 211-220, November 14-16, 2006

Christoph Barz, Markus Pilz, Thomas Eickermann, Lidia Kirtchakova, Oliver Wäldrich, Wolfgang Ziegler
Co-Allocation of Compute and Network Resources in the VIOLA-Testbed
Terena Networking Conference 2006, Sicily, Italy, May 2006

Harald Bongartz, Thomas Bachran, Christian de Waal, Matthias Frank
Performance evaluation of a proactive link quality based uni- and multicast routing protocol for MANETs
No. FKIE/KOM-EFS/2006/01, December 2006
http://web.informatik.uni-bonn.de/IV/Mitarbeiter/dewaal/wnet-tr-2006.html

Edmund Coersmeier, Carlos Saez, Andreas Hotz, Marc Hoffman, Martin Kosakowski, Yuhuan Xu, Andreas Bauer, Felix Leder
Improving Channel Estimation for Software Radios
Proceedings of the IASTED Conference on Communication Systems and Applications 2006, Banff, Canada, July 3-5, 2006

Patrick Peschlow, Peter Martini
Towards an Efficient Branching Mechanism for Simultaneous Events in Distributed Simulation
Proceedings of the 20th IEEE/ACM/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'06), Singapore, p. 133, May 2006

Lukas Pustina, Michael Gerharz, Peter Martini, Simon Schwarzer, Volker Deichmann
Performance Aware Design of Communication Systems
Proceedings of the 31st IEEE Conference on Local Computer Networks LCN 2006, Tampa, Florida, p. 39-46, November 14-16, 2006

Jens Toelle, Marko Jahnke, Nils gentschen Felde, Peter Martini
Impact of Sanitized Message Flows in a Cooperative Intrusion Warning System
Proc. of MILCOM 2006, Washington DC, USA, Oktober 2006

Christian de Waal
Dezentrale Sendeleistungsregelung zur Kapazitätssteigerung drahtloser Netze mit gemeinsam genutztem Übertragungskanal
March 2006
http://nbn-resolving.de/urn:nbn:de:hbz:5N-08281


2005

M. Amanowicz, P. Sevenich, J. Jarmakiewicz, M. Pilz
Quality of Service Support in IPv6-Based Military Networks with Limited Bandwidth
Proceedings of the RTO IST-054 Symposium on 'Military Communications', Rome, Italy, April 2005

Nils Aschenbruck, Matthias Frank, Peter Martini
Statistical Analysis of Traffic Measurements in a Disaster Area Scenario Considering Heavy Load Periods
Proceedings of the 2nd International Workshop on Wireless Ad-hoc Networks, IWWAN 2005, London, United Kingdom, May 23-26, 2005

Nils Aschenbruck, Matthias Frank, Peter Martini, Jens Tölle
Traffic Measurement and Statistical Analysis in a Disaster Area Scenario
Proceedings of the 1st Workshop on Wireless Network Measurements, WiNMee 2005, Trentino, Italy, April 3, 2005

Nils Aschenbruck, Sascha Lettgen
Geocast Routing - Performance of LBM and GeoGRID
Proceedings of the 3rd German Workshop on Mobile Ad-Hoc Netzworks, WMAN 2005, Bonn, Germany, September 21, 2005

T. Aurisch
Optimization techniques for military multicast key management
Proceedings of the IEEE MILCOM 2005, Atlantic City, USA, Vol. 4: p. 2570-2576, Oct 17-20, 2005

Christoph Barz, Matthias Frank, Peter Martini, Markus Pilz
Receiver-Based Path Capacity Estimation for TCP
KIVS'05, Kaiserslautern, Germany, February/March 2005

Edmund Coersmeier, Andreas Bauer, Martin Kosakowski, Nadine Pfuhl, Boris Spahl, Daniel Tolksdorf, Yuhuan Xu, Michael Gerharz, Wolfgang Hansmann, Felix Leder
Evaluation Architecture For Digital Radio Mondiale Multimedia Applications
Proc. of the IASTED International Conference on Communication Systems and Applications (CSA 2005), Banff, Canada, July 2005

Matthias Frank, Michael Holschbach, Peter Martini, Marc Plaggemeier
Analyzing the Effect of Cooperation Approaches
10th IFIP International Conference on Personal Wireless Communications, PWC'05, Colmar, 2005

Michael Gerharz, Christian de Waal, Peter Martini, Paul James
A Cooperative Nearest Neighbours Topology Control Algorithm for Wireless Ad Hoc Networks
Telecommunication Systems, No. 3-4, Vol. 28: p. 317-331, March 2005
http://www.springerlink.com/openurl.asp?genre=article&issn=1018-4864&volume=28&issue=3&spage=317

Bernd Lamparter, Marc Plaggemeier und Dirk Westhoff
Estimating the Value of Co-operation Approaches for Multihop Ad Hoc Networks
Elsevier Ad Hoc Networks Journal, Januar 2005

M. Lies, P. Sevenich, C. Karg, C. Barz
Resource Management in Tactical Military Networks
Proceedings of the RTO IST-054 Symposium on 'Military Communications', Rome, Italy, April 2005

M. Wolf, T. Leinmüller, A. Petrescu, C. Janneteau, H. Lach, C. Barz, M. Frank, M. Pilz, M. Ronai, K. Fodor, R. Tönjes
IPv6 based OverDRiVE Moving Networks for Vehicles
IEEE Vehicular Technology Society (VTS) News, No. 4, Vol. 52: November 2005


2004

Nils Aschenbruck, Matthias Frank, Wolfgang Hansmann, Peter Martini, Christoph Scholz, Jens Tölle
Integration of 3G Protocols into the Linux Kernel to Enable the Use of Generic Bearers
Proceedings of 7th IEEE International Conference on High Speed Networks and Multimedia Communications, HSNMC'04, No. 3079, Toulouse, France, June/July 30-2, 2004

Nils Aschenbruck, Matthias Frank, Peter Martini, Jens Tölle
Human Mobility in MANET Disaster Area Simulation - A Realistic Approach
Proceedings of the Fourth International IEEE Workshop on Wireless Local Networks, WLN 2004, Tampa, Florida, November 16-18, 2004

T. Aurisch
Using Key Trees for Securing Military Multicast Communication
IEEE MilCom 2004, Monterey, USA, 2004

Matthias Frank, Peter Martini, Marc Plaggemeier
CineMA: Cooperation Enhancement in Manets
LCN 2004, Tampa, USA, 2004

Michael Gerharz, Christian de Waal, Matthias Frank, Peter Martini
Influence of Transmission Power Control on the Transport Capacity of Wireless Multihop Networks
Proc. of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Barcelona, Spain, p. 1016-1021, September 2004

Michael Gerharz, Christian de Waal, Peter Martini
How To Discover Optimal Routes In Wireless Multihop Networks
Proc. of the 6th IFIP IEEE International Conference on Mobile and Wireless Communication Networks (MWCN), Paris, France, p. 323-334, October 2004

Martin Lies, Peter Sevenich, Christoph Barz, Markus Pilz, Piotr Lubkowski, Rafal Brys, Jaroslaw Milewski
The Effective QoS Mechanism for Real Time Services in IP Military Network
6th NATO RCMCIS, Zegrze, Poland, October 6-8, 2004

Patrick Peschlow, Michael Gerharz, Christian de Waal, Peter Martini
An Efficient Transport Capacity Estimation Method for Wireless Multihop Network Topologies
Proceedings of the 34th Annual Conference of the Gesellschaft für Informatik, 2nd German Workshop on Mobile Ad-hoc Networks (WMAN), Ulm, Germany, Vol. 1: p. 90-94, September 2004

Alexandru Petrescu, Hong-Yon Lach, Christophe Janneteau, Michael Wolf, Tim Leinmüller, Christoph Barz, Markus Pilz, Matthias Frank, Ralf Tönjes
IPv6-based OverDRiVE Moving Networks: Mobility Management and Testbed Implementation
13th IST Summit on Mobile and Wireless Communications, Lyon, France, June 27-30, 2004


2003

Markus Albrecht, Rolf Göpffarth, Matthias Frank
A scalable method for treating bottlenecks in a dynamically controlled DiffServ environment
Proceedings of the 28th Annual Conference on Local Computer Networks LCN 2003, Königswinter, October 2003

Simon Baatz, Matthias Frank, Peter Martini, Christoph Scholz
A Worst-Case Model for Co-Channel Interference in the Bluetooth Wireless System
Proc. of the 28th IEEE Conference on Local Computer Networks (LCN) 2003, Bonn/Königswinter, Germany, October 2003

Christoph Barz, Matthias Frank, Hong-Yong Lach, Christian Maihoefer, Alexandru Petrescu, Markus Pilz, Laslo Zombik
Network Access Control in OverDRiVE Mobile Networks
12th IST Summit on Mobile and Wireless Communications, Aveiro, Portugal, June 15-18, 2003

Christoph Barz, Matthias Frank, Hong-Yon Lach, Alexandru Petrescu, Markus Pilz, Miklós Rónai, Michael Wolf, Huamin Xu
Access Control in Vehicular Environments: Challenges and Approaches
ITG/IEEE Workshop on Multiradio Multimedia Communications (MMC 2003) - Communication Technology for Vehicles, Dortmund, Germany, February 2003

Christoph Barz, Rolf Göpffarth, Peter Martini, Andre Wenzel
A new Framework for the Analysis of Simultaneous Events
Proc. of SCSC'03 (Summer Computer Simulation Conference), Montreal, Canada, July 2003

C. Barz, M. Pilz, M. Frank
Complementary Topics for Moving Networks -Dynamic IVAN Management and Intra-Vehicular Mobility
HyWiN workshop, Turin, Italy, December 2003

Gundula Dörries, Peter Martini
Adaptive Access Regulation for VBR Video Streams
Interactive Multimedia on Next Generation Networks, No. 2899, p. 16-29, 2003

G. Dörries, P. Martini
Exploiting Decoder Schedules for the Stabilization of Internet Video Streams in Bottlenecks
Proc. 13th Packet Video Workshop 2003, Nantes, France, April 2003

Michael Gerharz, Christian Vogt, Christian de Waal
Current Approaches Towards Improved Quality-of-Service Provision in Mobile Ad-hoc Networks
March 2003
http://web.informatik.uni-bonn.de/IV/Mitarbeiter/dewaal/qos-report.html

Michael Gerharz, Christian de Waal, Matthias Frank, Paul James
A Practical View on Quality-of-Service Support in Wireless Ad Hoc Networks
Proc. of the 3rd IEEE Workshop on Applications and Services in Wireless Networks (ASWN), Berne, Switzerland, p. 185-196, July 2003

Michael Gerharz, Christian de Waal, Peter Martini, Paul James
A Cooperative Nearest Neighbours Topology Control Algorithm for Wireless Ad Hoc Networks
Proc. of the 12th International Conference on Computer Communications and Networks (ICCCN) 2003, Dallas, Texas, p. 412-417, October 2003
http://web.informatik.uni-bonn.de/IV/Mitarbeiter/dewaal/icccn03.html

Michael Gerharz, Christian de Waal, Peter Martini, Paul James
Strategies for Finding Stable Paths in Mobile Wireless Ad Hoc Networks
Proc. of the 28th IEEE Conference on Local Computer Networks (LCN) 2003, Bonn/Königswinter, Germany, p. 130-139, October 2003
http://web.informatik.uni-bonn.de/IV/Mitarbeiter/dewaal/lcn03.html

Wolfgang Hansmann, Matthias Frank
On Things to happen during a TCP Handover
28th Annual Conference on Local Computer Networks, LCN'03, Königswinter, Germany, October 2003

Hong-Yon Lach, Christophe Janneteau, Alexis Olivereau, Alexandru Petrescu, Tim Leinmueller, Michael M. Wolf, Markus Pilz
Laboratory and "Field" Experiments with IPv6 Mobile Networks in Vehicular Environments
June 2003
http://www.mobilenetworks.org/nemo/drafts/draft-lach-nemo-experiments-overdrive-01.txt

Bernd Lamparter, Marc Plaggemeier, Dirk Westhoff
About the impact of Co-operation Approaches for Ad Hoc Networks
ACM MobiHoc 2003: The Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Annapolis, Maryland, USA, Juni 2003

Bernd Lamparter, Marc Plaggemeier, Dirk Westhoff
Analysis of Co-operation Approaches in Ad Hoc Networks
WiOpt'03: Modeling and Organization in Mobile, Ad Hoc and Wireless Networks, INRIA Sophia-Antipolis, France, März 2003

Michael Wolf, Alexandru Petrescu, Hong-Yon Lach, Huamin Xu, Markus Pilz, Matthias Frank, Miklós Rónai
In-Vehicular Mobile Router: Challenges and Approaches
ITG/IEEE Workshop on Multiradio Multimedia Communications (MMC 2003) - Communication Technology for Vehicles, Dortmund, Germany, February 2003


2002

S. Baatz, Ch. Bieschke, M. Frank, C. Kühl, P. Martini, Ch. Scholz
Building Efficient Bluetooth Scatternet Topologies from 1-Factors
Proc. of the IASTED International Conference on Wireless and Optical Communications, WOC 2002, Banaff, Alberta, Canada, p. 300-305, July 2002

S. Baatz, M. Frank, C. Kühl, P. Martini, Ch. Scholz
Bluetooth Scatternets: An Enhanced Adaptive Scheduling Scheme
Proc. of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2002, New York, p. 782-790, June 2002

Michael Gerharz, Christian de Waal, Matthias Frank, Peter Martini
Link Stability in Mobile Wireless Ad Hoc Networks
Proc. of the 27th IEEE Conference on Local Computer Networks (LCN) 2002, Tampa, Florida, p. 30-39, November 2002

Wolfgang Hansmann, Matthias Frank, Michael Wolf
Performance Analysis of TCP Handover in a Wireless/Mobile Multi-Radio Environment
Proceedings of the 27th Annual Conference on Local Computer Networks, LCN'02, Tampa, FL, USA, November 2002

Ch. Hinken, P. Martini, J. Tölle
Network Traffic Description with Protocol Specific Profiles Based on Separate Treatment of Tail Components
Proc. of Applied Simulation and Modelling (ASM) 2002, Crete, Greece, 2002

Carmen Kühl, Simon Baatz, Christoph Scholz
METHOD AND APPARATUS OF PRIORITISING THE USAGE OF SLOTTED LINKS BY SINGLE NETWORK DEVICES IN A WIRELESS NETWORK
Patent Cooperation Treaty (PCT) Publication, International Publication Number WO 02/080471 A1, 2002

M. Plaggemeier, J. Tölle
Secure Shell Proxy Intrusion Detection
Proc. of R.T.O. Information Systems Technology Panel Symposium on Real Time Intrusion Detection 2002, Estoril, Portugal, 2002

Jens Tölle, Christian de Waal
A Simple Traffic Model Using Graph Clustering For Anomaly Detection
Proc. of Applied Simulation and Modelling (ASM) 2002, Crete, Greece, 2002


2001

M. Albrecht, M. Köster, P. Martini
Congestion Handling in Dynamic Differentiated Services Networks
Proc. of the 26th Annual Conference on Local Computer Networks, LCN 2001, Tampa, FL, USA, November 2001

S. Baatz, M. Frank, C. Kühl, P. Martini, Ch. Scholz
Adaptive Scatternet Support for Bluetooth using Sniff Mode
Proc. of the 26th Annual Conference on Local Computer Networks, LCN 2001, Tampa, Florida, p. 112-120, November 2001

M. Frank, R. Göpffarth, W. Hansmann, P. Martini
Apparatus, and Associated Method, for Facilitating Communication
Patent Cooperation Treaty (PCT) Publication, International Publication NumberWO 01/20940 A1, 2001

Matthias Frank, Tomas Göransson, Wolfgang Hansmann, Ola Johansson, Thorsten Lohmar, Toni Paila, Ralf Tönjes, Lin Xu
Mobility management in a hybrid radio system
RSRCP Journal - Reseaux et systemes repartis, calculateurs paralleles, Special Issue on Mobility and Internet, Vol. 13: 2001

O. Niggemann, B. Stein, J. Tölle
Visualization of Traffic Structures
Proc. of the International Conference on Communications (ICC) 2001, Helsinki, Finland, June 2001

T. Paila, S. Aladdin, J. Ebenhard, M. Frank, T. Göransson, W. Hansmann, Th. Lohmar, R. Tönjes, L. Xu
Flexible Network Architecture for Future Hybrid Wireless Systems
IST Mobile Communications Summit 2001, Barcelona, Spain, 2001

Lin Xu, Toni Paila, Wolfgang Hansmann, Matthias Frank
IPv6 based Infrastructure for Wireless IP in Multi-Radio Environments with Quality of Service Support
Proceedings of the 26th Annual Conference on Local Computer Networks, LCN'01, Tampa, FL, USA, November 2001


2000

M. Albrecht, M. Köster, P. Martini, M. Frank
End-to-end QoS Management for Delay-sensitive Scalable Multimedia Streams over Di.Serv
Proc. of the 25th Annual Conference on Local Computer Networks, LCN 2000, Tampa, FL, USA, November 2000

S. Baatz, M. Frank, R. Göpffarth, D. Kassatkine, P. Martini, M. Schetelig, A. Vilavaara
Handoff Support for Mobility with IP over Bluetooth
Proc. of the 25th Annual Conference on Local Computer Networks, LCN 2000, Tampa, FL, USA, November 2000

S. Baatz, W. Hansmann, J. Tölle
Security of Routing Cache Updates in Cellular IP
Proc. of the 25th Annual Conference on Local Computer Networks, LCN 2000, Tampa, FL, USA, November 2000

J. Tölle, O. Niggemann
Supporting Intrusion Detection by Graph Clustering and Graph Drawing
RAID (Recent Advantages of Intrusion Detection), Toulouse, 2000

Ralf Tönjes, Peter Benkö, Johan Ebenhard, Matthias Frank, Tomas Göransson, Wolfgang Hansmann, Jörg Huschke, Thorsten Lohmar, Toni Paila, Fredrik Sällström, Wolfgang Stahl, Lin Xu
Architecture for a Future Generation Multi-Access Wireless System with Dynamic Spectrum Allocation
IST Mobile Communications Summit 2000, Galway, Ireland, October 1-4, 2000

L. Xu, R. Tönjes, T. Paila, W. Hansmann, M. Frank, M. Albrecht
DRiVE-ing to the Internet: Dynamic Radio for IP Services in Vehicular Environments
Proc. of the 25th Annual Conference on Local Computer Networks, LCN 2000, Tampa, FL, USA, November 2000


1999

M. Albrecht, M. Frank, P. Martini
Bluetooth Architecture and Services Overview: The Role of IP and Quality of Service Issues
First Workshop on IP Quality of Service for Wireless and Mobile Networks, IQWiM 1999, Aachen, 1999

M. Albrecht, M. Frank, P. Martini, M. Schetelig, A. Vilavaara, A. Wenzel
IP Services over Bluetooth: Leading the Way to a New Mobility
Proc. of the 24th Annual Conference on Local Computer Networks, LCN 1999, Boston, MA, 1999

M. Albrecht, J. Altmayer Pizzorno, J. Tölle
Praktische Erfahrungen mit der Implementierung eines DNS-Protokoll-Intrusion-Detection-Systems
Proceedings of KiVS 1999, 1999

S. Baatz, M. Frank, P. Martini, A. Wenzel
Flow Aggregation and Scalability with ROBIN: End-to-End Regulation of Bandwidth in Intra- Networks
Proc. of the 24th Annual Conference on Local Computer Networks, LCN 1999, Boston, MA, 1999

The I.L.D.A. Technical Committee
The ILDA Standard Projector
No. Revision 002, 1999

M. Frank, P. Martini
Eine Erweiterung der Transportebene zur Bandbreitenregelung auf Ende-zu-Ende Basis
Praxis der Informationsverarbeitung und Kommunikation, PIK 22 (1), 1999

H. Hessenmüller, K. Achtmann, J. Charzinski, J. Frank, J. Färber, E. Lehmann, S. Paul, U. Quecke, J. Tölle, W. Zirwas
Das europäische Projekt AMUSE - Der HFR-Feldversuch in München
Der Fernmeldeingenieur, No. 7+8, 1999

A. Wenzel
Experiences with Simultaneous Events Using Discrete-Event Simulation
IASTED International Conference: Modelling and Simulation 1999, MS 1999, Philadelphia, PA, 1999


1998

J. Charzinski, J. Färber, M. Frank, U. Gremmelmaier
The AMUSE Residential Multimedia Trials: Network Architecture, Usage Measurement and Modelling
9th IEEE Workshop on Local and Metropolitan Area Networks, Banff, May 1998

J. Charzinski, J. Färber, M. Frank, J. Tölle
The AMUSE Residential Multimedia Trials: Phase 1 Monitoring Results Summary
3rd European Conference on Networks & Optical Communications, NOC, Manchester, June 1998

M. Frank, P. Martini
Fairness and Delay/Loss Study of an End-to-End Bandwidth Regulation Scheme
23rd Annual Conference on Local Computer Networks, LCN `98, Boston, October 1998

M. Frank, P. Martini
Motivation of an End-to-End Regulation of Bandwidth in Intra-Networks: The ROBIN Concept
8th IFIP Conference on High Performance Networking, HPN '98, Vienna, September 1998

M. Frank, P. Martini
Performance Analysis of an End-to-End Bandwidth Regulation Scheme
Sixth International Symposium of Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS, Montreal, July 1998

M. Frank, P. Martini
Practical Experience with ROBIN: End-to-End Regulation Of Bandwidth in Intra-Networks
9th IEEE Workshop on Local and Metropolitan Area Networks, Banff, May 1998

M. Frank, P. Martini
Prototype Implementation and Simulation Study of an End-to-End Bandwidth Regulation Scheme
3rd European Conference on Networks & Optical Communications, NOC, Manchester, June 1998


1997

W. Breipohl, C. Johansson, P. Martini, J. Steiger, D. Ingram, H. Young
Recent Trends towards Online Education and Consultation in Medicine in Europe
Proc. of the Asia-Pacific Conference on the Formation of a Regional Network for Higher Education and Research: Policies, Strategies and Administration, 1997

J. Charzinski, J. Färber, J. Enssle, M. Frank
The AMUSE Residential Multimedia Trials: Network Architecture and First Results
European Conference on Networks & Optical Communications, NOC, Jun 1997
http://web.informatik.uni-bonn.de/IV/martini/Forschung/Publikationen/noc97.ps.zip

H. Elbert, J. Enssle, M. Frank, H. Hessenmüller, E. T. Hvannberg, T. Theimer
Multimedia Service Provisioning in the Munich Trial of the AMUSE Project
2nd Europoean Conference on Multimedia Applications, Services and Techniques, ECMAST, May 1997
http://web.informatik.uni-bonn.de/IV/martini/Forschung/Publikationen/ecmast97.ps.zip

J. Färber, J. Charzinski, M. Frank
The WWW-Service in the AMUSE Field Trials: Usage Evaluation and Traffic Modelling
EXPERT ATM Traffic Symposium, Mykonos, Sept 1997
http://web.informatik.uni-bonn.de/IV/martini/Forschung/Publikationen/expert97.ps.zip

M. Frank, P. Martini
Practical Experiences with a Transport Layer Extension for End-to-End Bandwidth Regulation
22nd Annual Conference on Computer Networks, LCN `97, Minneapolis, Nov 1997
http://web.informatik.uni-bonn.de/IV/martini/Forschung/Publikationen/lcn97.ps.zip

H. Hessenmüller, R. Bordewisch, H. Elbert, J. Enssle, M. Frank, U. Gremmelmaier, M.Gruber, E. Lehmann, H. Martin, U. Quecke, G. Seifert, T. Theimer
Das europäische Projekt AMUSE - Der HFC-Feldversuch in München -
Der Fernmeldeingenieur, No. 1+2, 1997

P. Martini, W. Breipohl, C. Johansson
Telecommunication Technologies of Online Education in Medicine
Proc. of the Asia-Pacific Conference on the Formation of a Regional Network for Higher Education and Research: Policies, Strategies and Administration, 1997

P. Martini, M. Rümekasten, J. Tölle
Tolerant Synchronization for Distributed Simulations of Interconnected Computer Networks
Proceeding of the '11th Workshop on Parallel and Distributed Simulation (PADS97)', IEEE, June 1997

W. Rascher, Th. Krause, H. Dietrich, J. Steiß, M. Rauwolf, M. Albrecht, P. Martini
Medical Training via World Wide Web
European Workshop on Multimedia Technologies in Medical Training, Sep 1997

M. Rümekasten
Parallele und verteilte Simulation von gekoppelten Rechnernetzen mit hybrider, toleranter Synchronisation auf Workstation-Clustern
Proceedings of the 'Arbeitsplatz-Rechensysteme, (APS97)', GI-ITG 1997, May 1997

S.Gumbrich, H.Emgrunt, T.Braun
Dynamic Bandwidth Allocation for Stored VBR Video in ATM End Systems
Seventh IFIP Conference on High Performance Networking (HPN'97), White Plains, New York, USA, April/May 28-2, 1997

T.Braun, S.Gumbrich, H.Stuettgen
Concepts for IP Multicast over ATM
Multicast for Multimedia: An International Workshop, University of Mannheim and ICSI Berkeley, Februar 28, 1997

J. Tölle
Leistungsbewertung von Bridges mit unterschiedlichen Prioritäten durch parallele und verteilte Simulation
May 1997


1996

M. Albrecht
Entwurf und Implementierung eines Multicast-Transportprotokolls zur Übertragung von Video-Daten
Mar 1996

R. Bordewisch, J. Enssle, M. Frank
Performance Evaluation of Multimedia Systems in the AMUSE-Project
8th IEEE Workshop on Local and Metropolitan Area Networks, Aug 1996

M. Frank, M. Köster, P. Martini
A Priority Based Multicast Video Transport Protocol
8th IEEE Workshop on Local and Metropolitan Area Networks, Aug 1996

M. Köster
Automatische Generierung und Optimierung paralleler Implementierungen von Transportprotokollen
Feb 1996

P. Martini
Real-Time Communication in Shared-Medium High Speed LANs
High-Speed Networking for Multimedia Applications, 1996

P. Martini, J. Ottensmeyer
On the Scalability of the Demand-Priority LAN - A Performance Comparison to FDDI for Multimedia Scenarios
Proc. of the 1996 International Zurich Seminar on Digital Communications, p. 149-160, 1996

S.Gumbrich
Dynamische Bandbreitenreservierung fuer VBR MPEG-2 Videos in ATM Endsystemen
Doktorandentreff Heidelberg, Stuttgart, Mannheim, University of Mannheim, March 8, 1996

T.Braun, S.Gumbrich
MARS and IP Multicast Router as ATM-Multicast-Server: Solutions to Provide IP Multicast Services in Local ATM Networks
8th IEEE Workshop on LOCAL and Metropolitan Area Networks, Potsdam, Germany, August 26-28, 1996

T.Braun, S.Gumbrich, H.Stuettgen
Comparison of Concepts for IP Multicast over ATM
IEEE ATM Workshop'96, San Francisco, CA, August 26-28, 1996

Andre Wenzel
Leistungsbewertung netzübergreifender Videoübertragungen in zell- und rahmenbasierten Hochgeschwindigkeitsnetzen
May 1996


1995

M. Frank, P. Martini, M. Rümekasten
SimCom - A Simulator for Interconnected Heterogeneous Networks
7th European Simulation Symposium, SCS, Oct 1995

P. Martini, J. Ottensmeyer
Performance Analysis of the Demand-Priority LAN
Proc. of the 6th IFIP International Conference on High Performance Networking, HPN'95, p. 255-266, 1995

P. Martini, J. Ottensmeyer
Real-Time Communication in the Demand-Priority LAN - The Effects on Normal Priority Traffic
Proc. of the 20th Annual Conference on Local Computer Networks, p. 350-357, 1995

J. Ottensmeyer, P. Martini
Improving the Demand-Priority Protocol
Proc. of ICCCN '95, p. 369-376, 1995

S.Gumbrich
Design und Implementierung von Filtermechanismen zur Medien-Skalierung von digitalen Videoströmen
Jan 1995

S.Gumbrich, J.Sandvoss
Comparison of Media Scaling Techniques for Real-Time Packet Video Transport
The Third IEEE Workshop on Architecture and Implementation of High Performance Communication Subsystems (HPCS'95), Mystic, Conneticut, August 23-25, 1995


1994

M. Frank
Design und Bewertung neuartiger Flusskontrollmechanismen für Hochgeschwindigkeits-Transportprotokolle
Jan 1994

M. Frank, R. Wittenberg
Flow Control Functions for High-Speed Transport Protocols in Local Workstation Environments
19th Conference on Local Computer Networks, LCN, Oct 1994

P. Martini
Connection Oriented Data Service in DQDB
Computer Networks and ISDN Systems, No. 6-8, Vol. 26: p. 679-694, March 1994

M. Rümekasten
SimCom - Powerful Simulation of Heterogeneous Networks
EFOC & Networks, Heidelberg, Germany, Juni 1994

M. Rümekasten
Simulation of Heterogeneous Networks
Winter Simulation Conference, Orlando, Dec 1994

M. Rümekasten, E. Vazquez, M. Alvarez-Campana (Univ. Madrid)
SimCom - A Window-Based Simulator for Performance Analysis of Heterogeneous Networks
Interworking'94, Sophia Antipolis, France, Mai 1994

S.Gumbrich, B.Kownatski, J.Sandvoss
Media Scaling for Real-Time Packet Video Transport
4th Int'l Workshop on High-Speed Networks, Brest, September 1994

R. Wittenberg, P. Martini
Measurements in a FDDI Workstation Cluster
Proc. of the 19th Annual Conference on Local Computer Networks, p. 52-58, 1994


1993

P. Martini
A Simulation Study of Dynamic Bandwidth Allocation for Connection Oriented Data Service in DQDB
Proc. of SVNC '93, SysTech, 1993

P. Martini
Update on 802.6: Ongoing Work on DQDB
INTERWORKING in Broadband Networks, p. 77-87, 1993

P. Martini, M. Rümekasten
Interworking of DQDB and B-ISDN - A simulation study
1st International Conference on LAN Interconnection, Raleigh, USA, October 1993

P. Martini, M. Rümekasten
MAN/WAN Interworking - The ATM-to-DQDB Case
IEEE Conference on Local and Metropolitan Area Networks, Minneapolis, USA, September 1993

P. Martini, G. Werschmann
Connection Oriented Data Service in DQDB
Kommunikation in Verteilten Systemen, p. 159-172, 1993

P. Martini, G. Werschmann
Connection Oriented Data Service in DQDB - Simulation Studies of the Guaranteed Bandwidth Protocol
Proc. of IPCCC'93, Phoenix, IEEE, p. 339-345, 1993

J. Ottensmeyer, M. Rümekasten
Interconnection of DQDB and ATM using GBW
EFOC & Networks, The Hague, Netherlands, July 1993

M. Rümekasten
Strategies of ATM and DQDB Interconnection
EOS/SPIE Conference on Local and Metropolitan Area Networks, Berlin, Germany, April 1993


1992

M. Gumbold, P. Martini, R. Wittenberg
Temporary Overload in High Speed Backbone Networks
Proc. of INFOCOM '92, Florence, IEEE, p. 2280-2289, 1992

U. Killat, J. Ottensmeyer, M. Rümekasten, R. Vogt (Univ. Hamburg-Harburg)
A Concept for Interconnecting DQDB MANs through ATM-based B-ISDN and Related Issues with respect to Simulation
Interworking'92, Bern, Switzerland, November 1992

P. Martini, G. Werschmann
Real-time Communication in DQDB - A Comparison of Different Strategies
Proc. of the 17th Conference On Local Computer Networks, p. 446-453, 1992


1991

B. Heinrichs, P. Martini
Telefax-Kommunikation über Lokale Netze
Kommunikation in Verteilten Systemen, No. 267, p. 348-362, 1991

P. Martini, T. Meuser
Real-Time Traffic in FDDI-II: Packet Switching vs. Circuit Switching
Proc. of INFOCOM '91, Miami, IEEE, p. 1413-1419, 1991

P. Martini, R. Wittenberg
Performance Evaluation of FDDI - What about Packet Loss?
Proc. of the 16th Conference On Local Computer Networks, p. 18-23, 1991


1990

P. Davids, P. Martini
High Speed LANs and MANs - Protocols and Problems
Proc. of INDC-90, p. 119-132, 1990

P. Davids, P. Martini
Performance Analysis of DQDB
Proc. of the International Conference on Computers and Communications, IEEE, p. 548-555, 1990

B. Heinrichs, P. Martini
Telefax in Local Area Networks
Proc. of the 15th Conference On Local Computer Networks, p. 371-379, 1990

P. Martini
Dienstintegration in Lokalen Hochgeschwindigkeitsnetzen
Workshop 'Architektur von lokalen Netzen (LAN) für den Campus- und Cim-Bereich', Dresden, Oktober 1990

P. Martini
Towards High Speed Networking in Local and Metropolitan Areas
Computer Networking, p. 103-113, 1990

P. Martini, T. Meuser
Service Integration in FDDI
Proc. of the 15th Conference On Local Computer Networks, p. 23-32, 1990

P. Martini, R. Presty, Th. Welzel
New Low-Level Flow Control Strategies for Fiber Optic Token Rings
Proc. of GLOBECOM '90, San Diego, IEEE, p. 903.3.1-903.3.5, 1990

R. Presty, Th. Welzel, P. Martini
Low-Level Flow Control Strategies for FDDI
Proc. of EFOC/LAN 90, p. 283-286, 1990

M. Rupprecht, F. Fehlau, P. Martini
Interconnection of High Speed Devices - A New Parallel Controller-Architecture for High Speed Local Area Networks
High Speed Local Area Networks II, p. 223-231, 1990

M. Rupprecht, P. Martini
Gateway Performance - Requirements and Improvement
Decentralized Systems, p. 399-410, 1990

Th. Welzel, P. Martini, S. Rudloff
Performance Analysis of FDDI and Multiple Token Ring Backbones in a Mixed Traffic Environment
High Speed Local Area Networks II, p. 53-68, 1990


1989

P. Martini
Fairness Issues of the DQDB Protocol
Proc. of the 14th Conference On Local Computer Networks, p. 160-170, 1989

P. Martini
High Speed Bridges for High Speed Local Area Networks - Packets per Second vs. Bits per Second
Proc. of INFOCOM '89, Ottawa (Canada), IEEE, p. 474-483, 1989

P. Martini
High Speed Bridges for High Speed Local Area Networks - Packets per Second vs. Bits per Second
Proc. of INFOCOM '89, Ottawa (Canada), IEEE, p. 474-483, 1989

P. Martini
High Speed Local Area Networks
IEEE CompEuro'89 Tutorial: VLSI and Computer Peripherials, Hamburg, IEEE, p. T4-101 - T4-125, 1989

P. Martini
Leistungsbewertung von Hochgeschwindigkeitsnetzen
Messung, Modellierung und Bewertung von Rechensystemen und Netzen, No. 218, p. 267-288, 1989

P. Martini
The DQDB Protocol. What about fairness?
Proc. of GLOBECOM '89, Dallas, IEEE, p. 8.7.1.-8.7.5., 1989

P. Martini, M. Rupprecht
Designing High Speed Controllers for High Speed Local Area Networks
Proc. of GLOBECOM '89, Dallas, IEEE, p. 5.4.1.-5.4.5, 1989

P. Martini, Th. Welzel
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989

P. Martini, Th. Welzel
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989

P. Martini, Th. Welzel
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989

P. Martini, Th. Welzel
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989

P. Martini, Th. Welzel
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989

P. Martini, Th. Welzel
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989

P. Martini, Th. Welzel
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989

P. Martini, Th. Welzel
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989

P. Martini, Th. Welzel
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989

P. Martini, Th. Welzel
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989

P. Martini, Th. Welzel
Analysis of High Speed Token Rings For a Mixed Traffic Environment
Network Information Processing Systems, p. 155-162, 1989

M. Rupprecht, F. Fehlau, P. Martini
A Petri-Net Based Parallel Communications Controller for High Speed Local Area Networks
ICCI '89 - Computing and Information, Toronto (Canada), p. 168-172, 1989

M. Rupprecht, F. Fehlau, P. Martini
A Petri-Net Based Parallel Communications Controller for High Speed Local Area Networks
ICCI '89 - Computing and Information, Toronto (Canada), p. 168-172, 1989

M. Schümmer, Th. Welzel, P. Martini
Integration of Field Bus and MAP Networks - Hierarchical Communication Systems in Production Environments
Computer Applications in Production and Engineering, p. 581-588, 1989

Th. Welzel, M. Schümmer, P. Martini
Performance Comparison of Bridges and MAC Protocols for High Speed Backbone Networks
Information Processing '89 - Proc. of the IFIP 11th World Computer Congress, p. 639-644, 1989

Created by JabRef on 08/11/2024.