Ahmad, Muhammad Ovais |
5G Secure Solution Development and Security Master Role
|
2024 |
Ahmad, Muhammad Ovais |
5G Secure Solution Development and Security Master Role
|
2024 |
Akil, Mahdi (et al.) |
A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs
|
2024 |
Hansen, M. ; Gruschka, N. ; Jensen, Meiko |
A Universal Data Model for Data Sharing Under the European Data Strategy
|
2024 |
Ahmad, Muhammad Ovais ; Al-Baik, Osama |
Beyond Technical Debt Unravelling Organisational Debt Concept
|
2024 |
Ahmad, Muhammad Ovais ; Al-Baik, O. |
Beyond Technical Debt Unravelling Organisational Debt Concept
|
2024 |
Kumar, Pattiwar Shravan ; Saxena, Paresh ; Alay, Özgü |
DEAR: DRL Empowered Actor-Critic ScheduleR for Multipath QUIC Under 5G/B5G Hybrid Networks
|
2024 |
Rajiullah, Mohammad (et al.) |
Enhancing Healthcare Remote Education with 6G and XR Technologies
|
2024 |
Saeeda, Hina ; Ahmad, Muhammad Ovais ; Gustavsson, Tomas |
Exploring Process Debt in Large-Scale Agile Software Development For Secure Telecom Solutions
|
2024 |
Garcia, Johan ; Sundberg, Simon ; Brunstrom, Anna |
Fine-Grained Starlink Throughput Variation Examined With State-Transition Modeling
|
2024 |
Nougnanke, Benoit (et al.) |
gPerfIsol: GNN-Based Rate-Limits Allocation for Performance Isolation in Multi-Tenant Cloud
|
2024 |
Wittek, Stefan ; Herold, Sebastian ; Rausch, Andres |
HICSS-57 Minitrack: AI-based Methods and Applications for Software Engineering
|
2024 |
Garcia, Johan ; Sundberg, Simon ; Brunstrom, Anna |
Inferring Starlink Physical Layer Transmission Rates Through Receiver Packet Timestamps
|
2024 |
Ramaswamy, Arunselvan (et al.) |
Information Theoretic Deductions Using Machine Learning with an Application in Sociology
|
2024 |
Islami, Lejla ; Kitkowska, Agnieszka ; Fischer-Hübner, Simone |
Inter-regional Lens on the Privacy Preferences of Drivers for ITS and Future VANETs
|
2024 |
Chahed, Hamza (et al.) |
Linux-Based End-Station Design for Seamless TSN Plug-And-Play
|
2024 |
Rahal, Manal ; Ahmed, Bestoun S. ; Samuelsson, Jörgen |
Machine Learning Data Suitability and Performance Testing Using Fault Injection Testing Framework
|
2024 |
Khalid, Hifza (et al.) |
Modeling Batch Tasks Using Recurrent Neural Networks in Co-Located Alibaba Workloads
|
2024 |
Ahmad, Muhammad Ovais ; Gustavsson, Tomas |
Nexus Between Psychological Safety and Non-Technical Debt in Large-Scale Agile Enterprise Resource Planning Systems Development
|
2024 |
Chahed, Hamza ; Kassler, Andreas |
Optimizing TSN Routing, Scheduling, and Task Placement in Virtualized Edge-Compute Platforms
|
2024 |
Reuben, Jenni ; Alaqra, Ala Sarah |
Private Training Approaches - A Primer
|
2024 |
Figueiredo, R. (et al.) |
Quality of Service Performance of Multi-Core Broadband Network Gateways
|
2024 |
Savelli, Marco (et al.) |
Range-Free Positioning in NB-IoT Networks by Machine Learning
|
2024 |
Memarian, Mohsen (et al.) |
Utilizing Hybrid P4 Solutions to Enhance 5G gNB with Data Plane Programmability
|
2024 |
Alfredsson, Freysteinn (et al.) |
XDQ: Enhancing XDP with Queuing and Packet Scheduling
|
2024 |
Khamdamov, Ulugbek ; Usman, Muhammad ; Kim, JongWon |
A Cost-effective High-throughput Testbed for Supporting AI-enabled DevSecOps Services
|
2023 |
Paiva, Thomas William Do Prado (et al.) |
A First Look at Adaptive Video Streaming over Multipath QUIC with Shared Bottleneck Detection
|
2023 |
Magnusson, Jonathan (et al.) |
A Second Look at DNS QNAME Minimization
|
2023 |
Brisch, Fabian (et al.) |
Accelerating Transport Layer Multipath Packet Scheduling for 5G-ATSSS
|
2023 |
Ahmad, Muhammad Ovais ; Iftikhar, Ahmad ; Iqra, Sadaf Khan |
An Empirical Investigation on Electronic Government Services Continuance and Trust
|
2023 |
Caso, Giuseppe (et al.) |
An Initial Look into the Performance Evolution of 5G Non-Standalone Networks
|
2023 |
Palm, Jonas ; Jensen, Meiko |
Analysis of a Consent Management Specification and Prototype Under the GDPR
|
2023 |
Ma, Yunpeng (et al.) |
Automated and Systematic Digital Twins Testing for Industrial Processes
|
2023 |
Morel, Victor ; Fischer-Hübner, Simone |
Automating privacy decisions -where to draw the line?
|
2023 |
Rajiullah, Mohammad (et al.) |
CARL-W: a Testbed for Empirical Analyses of 5G and Starlink Performance
|
2023 |
Sundberg, Simon ; Garcia, Johan ; Brunstrom, Anna |
Characterizing Wireless Link Throughput with eBPF and Hardware Timestamps
|
2023 |
Haile, Habtegebreil Kassaye (et al.) |
Copa-D: Delay Consistent Copa for Dynamic Cellular Networks
|
2023 |
Ahmad, Muhammad Ovais ; Gustavsson, Tomas ; Saeeda, Hina |
Customised Roles in Scrum Teams for the Development of Secure Solution
|
2023 |
Usman, Muhammad (et al.) |
DESK: Distributed Observability Framework for Edge-Based Containerized Microservices
|
2023 |
Bayram, Firas (et al.) |
DQSOps: Data Quality Scoring Operations Framework for Data-Driven Applications
|
2023 |
Fernández, Fátima (et al.) |
Flexible Priority-based Stream Schedulers in QUIC
|
2023 |
Ramaswamy, Arunselvan |
Gradient Clipping in Deep Learning: A Dynamical Systems Perspective
|
2023 |
Knoche, Hendrik (et al.) |
Identifying Challenges and Opportunities for Intelligent Data-Driven Health Interfaces to Support Ongoing Care
|
2023 |
Hansen, Malte ; Gruschka, Nils ; Jensen, Meiko |
Introducing the Concept of Data Subject Rights as a Service Under the GDPR
|
2023 |
Sinkala, Zipani Tom ; Herold, Sebastian |
Investigating the Effect of Partial and Real-Time Feedback in INMAP Code-to-Architecture Mapping
|
2023 |
Rubak, Adam ; Taheri, Javid |
Machine Learning for Predictive Resource Scaling of Microservices on Kubernetes Platforms
|
2023 |
Pulls, Tobias ; Witwer, Ethan |
Maybenot: A Framework for Traffic Analysis Defenses
|
2023 |
Garcia, Johan (et al.) |
Multi-Timescale Evaluation of Starlink Throughput
|
2023 |
Saeeda, Hina ; Ahmad, Muhammad Ovais ; Gustavsson, Tomas |
Multivocal Literature Review on Non-Technical Debt in Software Development: An Exploratory Study
|
2023 |
Akil, Mahdi ; Martucci, Leonardo ; Hoepman, Jaap-Henk |
Non-Interactive Privacy-Preserving Sybil-Free Authentication Scheme in VANETs
|
2023 |
Pieskä, Marcus ; Brunstrom, Anna ; Kassler, Andreas |
On the Feasibility of Reliable Tunneling: Modelling Delay Imposed by Re-Transmissions
|
2023 |
Martucci, Leonardo ; Magnusson, Jonathan ; Akil, Mahdi |
On-Campus Hands-On Ethical Hacking Course: Design, Deployment and Lessons Learned
|
2023 |
Figueiredo, Rubens (et al.) |
Performance Measurements of Broadband Network Gateways
|
2023 |
Fischer-Hübner, Simone (et al.) |
Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning
|
2023 |
Ahmad, Muhammad Ovais |
Psychological Safety, Leadership and Non-Technical Debt in Large Scale Agile Software Development
|
2023 |
Aupke, Phil (et al.) |
PV Power Production and Consumption Estimation with Uncertainty bounds in Smart Energy Grids
|
2023 |
Nammouchi, Amal ; Kassler, Andreas ; Theocharis, Andreas |
Quantum Machine Learning in Climate Change and Sustainability: a Review
|
2023 |
Nammouchi, Amal (et al.) |
Robust Operation of Energy Communities in the Italian Incentive System
|
2023 |
Romare, Piero (et al.) |
Tapping into Privacy: A Study of User Preferences and Concerns on Trigger-Action Platforms
|
2023 |
Dahlberg, Rasmus ; Pulls, Tobias |
Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache
|
2023 |
Alaqra, Ala Sarah ; Fischer-Hübner, Simone ; Karegar, Farzaneh |
Transparency of Privacy Risks Using PIA Visualizations
|
2023 |
Herold, Sebastian ; Sinkala, Zipani Tom |
Using Automatically Recommended Seed Mappings for Machine Learning-Based Code-to-Architecture Mappers
|
2023 |
Taheri, Javid ; Gördén, Arvid ; Al-Dulaimy, Auday |
Using Machine Learning to Predict the Exact Resource Usage of Microservice Chains
|
2023 |
Bayram, Firas (et al.) |
A Drift Handling Approach for Self-Adaptive ML Software in Scalable Industrial Processes
|
2022 |
Hansen, Malte ; Jensen, Meiko |
A Generic Data Model for Implementing Right of Access Requests
|
2022 |
Redder, Adrian ; Ramaswamy, Arunselvan ; Karl, Hogler |
Age of Information Process under Strongly Mixing Communication - Moment Bound, Mixing Rate and Strong Law
|
2022 |
Mahjoubi, Ayeh ; Grinnemo, Karl-Johan ; Taheri, Javid |
An Efficient Simulated Annealing-based Task Scheduling Technique for Task Offloading in a Mobile Edge Architecture
|
2022 |
Usman, Muhammad (et al.) |
An Observability Framework for Containerized Microservices in Edge Infrastructures
|
2022 |
Kitkowska, Agnieszka ; Högberg, Johan ; Wästlund, Erik |
Barriers to a Well-Functioning Digital Market: Exploring Dark Patterns and How to Overcome Them
|
2022 |
Nordin, Anna ; Ängeby, Karin ; Fritsch, Lothar |
Body-Area Sensing in Maternity Care: Evaluation of Commercial Wristbands for Pre-birth Stress Management
|
2022 |
Ahrens, Ken ; Palm, Jonas ; Jensen, Meiko |
CampusTracer: A Privacy-Aware Contact Tracing Protocol for Campus Environments
|
2022 |
Kousias, Konstantinos (et al.) |
Coverage and performance analysis of 5G non-standalone deployments
|
2022 |
Mahjoubi, Ayeh ; Grinnemo, Karl-Johan ; Taheri, Javid |
EHGA: A Genetic Algorithm Based Approach for Scheduling Tasks on Distributed Edge-Cloud Infrastructures
|
2022 |
Mahjoubi, Ayeh ; Grinnemo, Karl-Johan ; Taheri, Javid |
EHGA: A Genetic Algorithm Based Approach for Scheduling Tasks on Distributed Edge-Cloud Infrastructures
|
2022 |
Garcia, Johan ; Hurtig, Per ; Hammar, Jonas |
Evaluating and Modeling 5G MPTCP Performance
|
2022 |
Karegar, Farzaneh ; Alaqra, Ala Sarah ; Fischer-Hübner, Simone |
Exploring User-Suitable Metaphors for Differentially Private Data Analyses
|
2022 |
Alcalá-Marín, Sergi (et al.) |
Global Mobile Network Aggregators: Taxonomy, Roaming Performance and Optimization
|
2022 |
Sinkala, Zipani Tom ; Herold, Sebastian |
Hierarchical Code-to-Architecture Mapping
|
2022 |
Aupke, Phil (et al.) |
Impact of Clustering Methods on Machine Learning-based Solar Power Prediction Models
|
2022 |
Kousias, Konstantinos (et al.) |
Implications of handover events in commercial 5G non-standalone deployments in Rome
|
2022 |
Amend, Markus (et al.) |
In-network Support for Packet Reordering for Multiaccess Transport Layer Tunneling
|
2022 |
Rabitsch, Alexander (et al.) |
Integrated Network and End-host Policy Management for Network Slicing
|
2022 |
HoseinyFarahabady, M. Reza (et al.) |
Low Latency Execution Guarantee Under Uncertainty in Serverless Platforms
|
2022 |
Garcia, Johan (et al.) |
Measuring and Modeling Aggregate LTE Connection Reliability for Train Operations
|
2022 |
Wairimu, Samuel ; Fritsch, Lothar |
Modelling privacy harms of compromised personal medical data - Beyond data breach
|
2022 |
Abbas, Muhammad Tahir (et al.) |
On the Energy-efficient Use of Discontinuous Reception and Release Assistance in NB-IoT
|
2022 |
Kitkowska, Agnieszka ; Högberg, Johan ; Wästlund, Erik |
Online Terms and Conditions: Improving User Engagement, Awareness, and Satisfaction through UI Design
|
2022 |
Rechtberger, Vaclav ; Bures, Miroslav ; Ahmed, Bestoun S. |
Overview of Test Coverage Criteria for Test Case Generation from Finite State Machines Modelled as Directed Graphs
|
2022 |
Sundberg, Simon (et al.) |
Passive Monitoring of Network Latency at High Line Rates
|
2022 |
Haile, Habtegebreil Kassaye (et al.) |
Performance of QUIC congestion control algorithms in 5G networks
|
2022 |
Rechtberger, Vaclav (et al.) |
Prioritized Variable-length Test Cases Generation for Finite State Machines
|
2022 |
Dahlberg, Rasmus (et al.) |
Sauteed Onions: Transparent Associations from Domain Names to Onion Addresses
|
2022 |
Beckerle, Matthias ; Magnusson, Jonathan ; Pulls, Tobias |
Splitting Hairs and Network Traces: Improved Attacks Against Traffic Splitting as a Website Fingerprinting Defense
|
2022 |
Chatterjee, Ayan (et al.) |
Testing of machine learning models with limited samples: an industrial vacuum pumping application
|
2022 |
Ma, Yunpeng (et al.) |
Using Deep Reinforcement Learning for Zero Defect Smart Forging
|
2022 |
Ahlgren, Bengt ; Grinnemo, Karl-Johan |
ZQTRTT: A Multipath Scheduler for Heterogeneous Traffic in ICNs Based on Zero Queueing Time Ratio
|
2022 |
Florean, Alexander (et al.) |
A Comparison of Machine Learning-Based Text Classifiers for Mapping Source Code to Architectural Modules
|
2021 |
Nguyen, Van-Giang (et al.) |
Adaptive and Latency-aware Load Balancing for Control Plane Traffic in the 4G/5G Core
|
2021 |
Pieskä, Marcus (et al.) |
Adaptive cheapest path first scheduling in a transport-layer multi-path tunnel context
|
2021 |
Pettersson, K. (et al.) |
AI-based enhancement of access and mobility procedures in cellular networks: An experimental study
|
2021 |
Figueiredo, Rubens ; Kassler, Andreas |
BNG-HAL: A Unified API for Disaggregated BNGs
|
2021 |
Hillblom, J. ; Garcia, Johan ; Waldenborg, A. |
Building Efficient Regular Expression Matchers Through GA Optimization with ML Surrogates
|
2021 |
Ahmad, Muhammad Ovais |
Business Analytics Continuance in Software Development Projects: A Preliminary Analysis
|
2021 |
Moreno, N. R. (et al.) |
CCID5: An implementation of the BBR congestion control algorithm for DCCP and its impact over multi-path scenarios
|
2021 |
Maqbool, Bilal ; Herold, Sebastian |
Challenges in Developing Software for the Swedish Healthcare Sector
|
2021 |
Sykora, Krystof ; Ahmed, Bestoun S. ; Bures, Miroslav |
Code Coverage Aware Test Generation Using Constraint Solver
|
2021 |
Myklebust, Thor (et al.) |
Data Safety, Sources, and Data Flow in the Offshore Industry
|
2021 |
Hoseiny Farahabady, M. Reza (et al.) |
Data-Intensive Workload Consolidation in Serverless (Lambda/FaaS) Platforms
|
2021 |
Tavallaie, Omid ; Taheri, Javid ; Zomaya, Albert Y. |
Design and Optimization of Traffic-Aware TSCH Scheduling for Mobile 6TiSCH Networks
|
2021 |
Wairimu, Samuel |
e-Health as a Target in Cyberwar: Expecting the Worst
|
2021 |
Xylouris, Georgios (et al.) |
Experimentation and 5G KPI measurements in the 5GENESIS platforms
|
2021 |
Rabitsch, Alexander (et al.) |
Extending Network Slice Management to the End-host
|
2021 |
Tavallaie, Omid ; Taheri, Javid ; Zomaya, Albert Y. |
Game-Theoretic Optimization of the TSCH Scheduling Function for Low-Power IoT Networks
|
2021 |
Alaqra, Ala Sarah ; Kitkowska, Agnieszka |
Impact of Intrinsic Factors and COVID-19 Pandemic on the Use of Technology
|
2021 |
Sinkala, Zipani Tom ; Herold, Sebastian |
InMap: Automated Interactive Code-to-Architecture Mapping
|
2021 |
Sinkala, Zipani Tom ; Herold, Sebastian |
InMap: Automated Interactive Code-to-Architecture Mapping Recommendations
|
2021 |
Nammouchi, Amal (et al.) |
Integration of AI, IoT and Edge-Computing for Smart Microgrid Energy Management
|
2021 |
Al-Dulaimy, A. (et al.) |
LOOPS: A Holistic Control Approach for Resource Management in Cloud Computing
|
2021 |
Nika, Grigor ; Vernescu, Bogdan |
Micro-geometry Effects on the Nonlinear Effective Yield Strength Response of Magnetorheological Fluids
|
2021 |
Nguyen, Van-Giang (et al.) |
On Auto-scaling and Load Balancing for User-plane Functions in a Softwarized 5G Core
|
2021 |
Nguyen, Van-Giang (et al.) |
On Auto-scaling and Load Balancing for User-plane Gateways in a Softwarized 5G Network
|
2021 |
Mahjoubi, Ayeh (et al.) |
Optimal Placement of Recurrent Service Chains on Distributed Edge-Cloud Infrastructures
|
2021 |
Galletta, Antonino (et al.) |
Overcoming security limitations of Secret Share techniques: The Nested Secret Share
|
2021 |
Bures, Miroslav (et al.) |
PatrIoT: IoT Automated Interoperability and Integration Testing Framework
|
2021 |
Fischer-Hübner, Simone ; Lambrinoudakis, C. |
Preface
|
2021 |
Herold, Sebastian ; Buckley, Jim ; van der Werf, Jan Martijn |
Preface of the 8th Workshop on Software Architecture Erosion and Architectural Consistency (SAEroCon)
|
2021 |
Wairimu, Samuel ; Momen, Nurul |
Privacy Analysis of COVID-19 Contact Tracing Apps in the EU
|
2021 |
Dahlberg, Rasmus (et al.) |
Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor
|
2021 |
Hernandez Benet, Cristian (et al.) |
Providing In-network Support to Coflow Scheduling
|
2021 |
HoseinyFarahabady, M. Reza (et al.) |
QSpark: Distributed Execution of Batch & Streaming Analytics in Spark Platform
|
2021 |
Bures, Miroslav (et al.) |
Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting Their Security and Reliability
|
2021 |
Chahed, Hamza ; Kassler, Andreas |
Software-Defined Time Sensitive Networks Configuration and Management
|
2021 |
Tavallaie, O. ; Taheri, Javid ; Zomaya, A. Y. |
Throughput Maximization in Low-Power IoT Networks via Tuning the Size of the TSCH Slotframe
|
2021 |
Matthias, Beckerle ; Chatzopoulou, Argyro ; Fischer-Hübner, Simone |
Towards cybersecurity MOOC certification
|
2021 |
Sinkala, Zipani Tom ; Herold, Sebastian |
Towards Hierarchical Code-to-Architecture Mapping Using Information Retrieval
|
2021 |
Sundberg, Simon ; Brunstrom, Anna |
Using BPF to Measure Latency at High LinkSpeeds
|
2021 |
Afzal, Zeeshan ; Brunström, Anna ; Lindskog, Stefan |
Using Features of Encrypted Network Traffic to Detect Malware
|
2021 |
Karegar, Farzaneh ; Fischer-Hübner, Simone |
Vision: A Noisy Picture or a Picker Wheel to Spin? Exploring Suitable Metaphors for Differentially Private Data Analyses
|
2021 |
Haile, Habtegebreil Kassaye (et al.) |
WIP: Leveraging QUIC for a Receiver-driven BBR for Cellular Networks
|
2021 |
Nguyen, Van-Giang (et al.) |
A Deployable Containerized 5G Core Solution for Time Critical Communication in Smart Grid
|
2020 |
Kramer, Z. (et al.) |
A Lightweight Performance Enhancing Proxy for Evolved Protocols and Networks
|
2020 |
Richardson, Omar ; Garcia, Johan |
A Novel Flow-level Session Descriptor with Application to OS and Browser Identification
|
2020 |
Gokan Khan, Michel (et al.) |
A Performance Modelling Approach for SLA-Aware Resource Recommendation in Cloud Native Network Functions
|
2020 |
Momen, Nurul ; Bock, Sven ; Fritsch, Lothar |
Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android
|
2020 |
Ahmed, Bestoun S. ; Gargantin, Angelo ; Bures, Miroslav |
An Automated Testing Framework For Smart TVapps Based on Model Separation
|
2020 |
Herold, Sebastian |
An initial study on the association between architectural smells and degradation
|
2020 |
Khatouni, A. S. (et al.) |
An open dataset of operational mobile networks
|
2020 |
Momen, Nurul ; Fritsch, Lothar |
App-generated digital identities extracted through Androidpermission-based data access - a survey of app privacy
|
2020 |
Richter, Jan (et al.) |
Avocado: Open-Source Flexible ConstrainedInteraction Testing for Practical Application
|
2020 |
Garcia, Johan ; Vehkajärvi, Tobias |
Boot Log Anomaly Detection with K-Seen-Before
|
2020 |
Haque, Mubin U. ; Iwaya, Leonardo H ; Ali Babar, M. |
Challenges in Docker Development: A Large-scale Study Using Stack Overflow
|
2020 |
Bisztray, Tamas (et al.) |
Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics
|
2020 |
Garcia, Johan ; Korhonen, Topi |
DIOPT: Extremely Fast Classification Using Lookups and Optimal Feature Discretization
|
2020 |
Bock, Sven ; Momen, Nurul |
Einfluss einer Datenschutzskala auf das Auswahlverhalten in einem App-Markt.
|
2020 |
Kitkowska, Agnieszka (et al.) |
Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affe
|
2020 |
Warner, Mark (et al.) |
Evaluating 'Prefer not to say' Around Sensitive Disclosures
|
2020 |
Nguyen, Van-Giang (et al.) |
Experimental Evaluation of a Virtualized 5G Core for Smart Grid Applications
|
2020 |
Kitkowska, Agnieszka (et al.) |
Facilitating Privacy Attitudes & Behaviors with Affective Visual Design
|
2020 |
Abbas, Muhammad Tahir (et al.) |
Guidelines for an Energy Efficient Tuning of the NB-IoT Stack
|
2020 |
Fritsch, Lothar |
Identification collapse - contingency in Identity Management
|
2020 |
Fritsch, Lothar |
Identity Management as a target in cyberwar
|
2020 |
Kitkowska, Agnieszka ; Wästlund, Erik ; Martucci, Leonardo |
(In)escapable Affect? Exploring Factors Influencing Privacy-RelatedBehavioral Intentions
|
2020 |
Rajiullah, Mohammad (et al.) |
Mobile Network Performance during the COVID-19 Outbreak from a Testbed Perspective
|
2020 |
Voronkov, Artem ; Martucci, Leonardo |
Natural vs. Technical Language Preference and its Impact on Firewall Configuration
|
2020 |
Momen, Nurul ; Bock, S. |
Neither Do I Want to Accept, nor Decline; Is There an Alternative?
|
2020 |
Bock, Sven ; Momen, Nurul |
Nudging the User with Privacy Indicator: A Study on the App Selection Behavior of the User
|
2020 |
Nguyen, Van-Giang (et al.) |
On the Use of a Virtualized 5G Core for Time Critical Communication in Smart Grid
|
2020 |
Ahmed, Bestoun S. |
Open-source Defect Injection Benchmark Testbed for the Evaluation of Testing
|
2020 |
Schlehahn, Eva (et al.) |
Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics
|
2020 |
Sharma, Yogesh (et al.) |
Performance benchmarking of virtualized network functions to correlate key performance metrics with system activity
|
2020 |
Toresson, Ludwig (et al.) |
PISA: A Privacy Impact Self-assessment App Using Personas to Relate App Behavior to Risks to Smartphone Users
|
2020 |
Klima, Matej (et al.) |
Quality and Reliability Metrics for IoT Systems: A Consolidated View
|
2020 |
Fischer-Hübner, Simone (et al.) |
Quality Criteria for Cyber Security MOOCs
|
2020 |
Pettersson, John Sören |
The Utility of Digitally Supported Manual Interactive Mockups
|
2020 |
Herold, Sebastian (et al.) |
Towards Improving Software Architecture Degradation Mitigation by Machine Learning
|
2020 |
Alaqra, Ala Sarah (et al.) |
Using PAPAYA for eHealth – Use Case Analysis and Requirements
|
2020 |
Bagnato, A. (et al.) |
Workshop on privacy challenges in public and private organizations
|
2020 |
Amend, Markus (et al.) |
A Framework for Multiaccess Support for Unreliable Internet Traffic Using Multipath DCCP
|
2019 |
Bauschert, Thomas (et al.) |
A matheuristic for green and robust 5G virtual network function placement
|
2019 |
Hatamian, Majid (et al.) |
A Multilateral Privacy Impact Analysis Method for Android Apps
|
2019 |
Theocharis, Andreas ; Popov, Marjan |
A piece-wise linearized transformer winding model for the analysis of internal voltage propagation
|
2019 |
Dahlberg, Rasmus (et al.) |
Aggregation-Based Certificate Transparency Gossip
|
2019 |
Ahmad, Muhammad Ovais |
Agile methods and cyber-physical systems development: A review with preliminary analysis
|
2019 |
Boodaghian Asl, Arsineh ; Gokan Khan, Michel |
An Empirical Study On GUI-ii Interview Methods In Participatory Design
|
2019 |
Ahmad, Muhammad Ovais |
Antecedents To Achieve Kanban Optimum Benefits In Software Companies
|
2019 |
HoseinyFarahabady, MohammadReza (et al.) |
Dynamic Control of CPU Cap Allocations in Stream Processing and Data-Flow Platforms
|
2019 |
Iwaya, Leonardo H (et al.) |
E-Consent for Data Privacy: Consent Management for Mobile Health Technologies in Public Health Surveys and Disease Surveillance
|
2019 |
Veseli, Fatbardh (et al.) |
Engineering privacy by design: Lessons from the design and implementation of an identity wallet platform
|
2019 |
Santos, Ricardo (et al.) |
Fast Steerable Wireless Backhaul Reconfiguration
|
2019 |
Hernandez Benet, Cristian ; Kassler, Andreas |
FlowDyn: Towards a Dynamic Flowlet Gap Detection using Programmable Data Planes
|
2019 |
Yedugundla, Kiran ; Hurtig, Per ; Brunström, Anna |
Handling Packet Losses in Cloud-Based Application Traffic
|
2019 |
Colesky, Michael (et al.) |
Helping Software Architects Familiarize with the General Data Protection Regulation
|
2019 |
Liu, Zihao ; Halonen, Raija ; Ahmad, Muhammad Ovais |
ICT support supporting healting healthcare for chinese elderl thcare for chinese elderly at home: perspectives of informal caregivers and professionalsICT suppor t supporting heal ting healthcare for chinese elderl thcare for chinese elderly at home: perspectives of informal caregivers and professionals
|
2019 |
Abbas, Muhammad Tahir (et al.) |
Impact of Tunable Parameters in NB-IoT Stack onthe Energy Consumption
|
2019 |
Garcia, Johan (et al.) |
Interactions Between Train Velocity andCellular Link Throughput - An Extensive Study
|
2019 |
Bhamare, Deval (et al.) |
IntOpt: In-Band Network Telemetry Optimization for NFV Service Chain Monitoring
|
2019 |
Ahlgren, Bengt (et al.) |
Latency-aware Multipath Scheduling inInformation-centric Networks
|
2019 |
Sundberg, Simon ; Garcia, Johan |
Localization Performance for eNodeBs using Solitary and Fused RSS-Modeling Approaches
|
2019 |
Parichehreh, Ali (et al.) |
LTE as a Road Toward 5G: QoS Analysis in Mobility Scenario Using The Monroe Platform
|
2019 |
Garcia, Johan ; Sundberg, Simon ; Brunstrom, Anna |
LTE for Trains - Performance Interactions Examined with DL, ML and Resampling
|
2019 |
Tavallaie, O. ; Taheri, Javid ; Zomaya, A. Y. |
MARA: Mobility-Aware Rate Adaptation for Low Power IoT Networks Using Game Theory
|
2019 |
Shamseddine, Maha (et al.) |
Mitigating Rogue Node Attacks in Edge Computing
|
2019 |
Galletta, A. ; Taheri, Javid ; Villari, M. |
On the applicability of secret share algorithms for saving data on iot, edge and cloud devices
|
2019 |
Fischer, Andreas ; Bhamare, Deval ; Kassler, Andreas |
On the Construction of Optimal Embedding Problems for Delay-Sensitive Service Function Chains
|
2019 |
Alizadeh Noghani, Kyoomars ; Kassler, Andreas ; Taheri, Javid |
On the Cost-Optimality Trade-off for Service Function Chain Reconfiguration
|
2019 |
Nguyen, Van-Giang (et al.) |
On the Use of 5G for Inter-substation GOOSE Transmission in Smart Grid
|
2019 |
Khoshkholghi, Mohammad Ali (et al.) |
Optimized Service Chain Placement Using Genetic Algorithm
|
2019 |
Nakamura, M. (et al.) |
Performance evaluation of prefetching algorithm for real-time edge content delivery in 5G system
|
2019 |
Høiland-Jørgensen, Toke ; Hurtig, Per ; Brunström, Anna |
PoliFi: Airtime Policy Enforcement for WiFi
|
2019 |
Al-Dulaimy, Auday (et al.) |
Privacy-Aware Job Submission in the Cloud
|
2019 |
Vestin, Jonathan (et al.) |
Programmable Event Detection for In-Band Network Telemetry
|
2019 |
Tavallaie, O. ; Taheri, Javid ; Zomaya, A. Y. |
QCF: QoS-Aware Communication Framework for Real-Time IoT Services
|
2019 |
Haile, Habtegebreil Kassaye (et al.) |
Rate Change Detection in Stationary Cellular Nodes
|
2019 |
Haile, Habtegebreil Kassaye ; Hurtig, Per ; Grinnemo, Karl-Johan |
Rate Measurement Over Short Time Scales inStationary Cellular Receivers
|
2019 |
Alaqra, Ala Sarah ; Wästlund, Erik |
Reciprocities or Incentives?: Understanding Privacy Intrusion Perspectives and Sharing Behaviors
|
2019 |
Alizadeh Noghani, Kyoomars ; Kassler, Andreas |
Reconfiguration of Service Function Chains: Trade-off between Optimality and Effort
|
2019 |
Ahmad, Muhammad Ovais |
Software factory project for enhancement of student experiential learning
|
2019 |
Zamli, K. Z. (et al.) |
Software module clustering based on the fuzzy adaptive teaching learning based optimization algorithm
|
2019 |
Boodaghian Asl, Arsineh ; Gokan Khan, Michel |
Studying the effect of online medical applications on patients healing time and doctors utilization using discrete event simulation
|
2019 |
Voronkov, Artem ; Martucci, Leonardo ; Lindskog, Stefan |
System Administrators Prefer Command Line Interfaces, Don’t They?: An Exploratory Study of Firewall Interfaces
|
2019 |
Ahmed, Bestoun S. ; Bures, M. |
Testing of Smart TV applications: Key ingredients, challenges and proposed solutions
|
2019 |
Murmann, Patrick ; Reinhardt, Delphine ; Fischer-Hübner, Simone |
To Be, or Not to Be Notified: Eliciting Privacy Notification Preferences for Online mHealth Services
|
2019 |
Ahmed, Bestoun S. (et al.) |
Towards an Automated Unified Framework to Run Applications for Combinatorial Interaction Testing
|
2019 |
Langlet, Jonatan ; Kassler, Andreas ; Bhamare, Deval |
Towards Neural Network Inference on Programmable Switches
|
2019 |
Afzal, Zeeshan (et al.) |
Using Partial Signatures in Intrusion Detection for Multipath TCP
|
2019 |
Oljira, Dejene Boru (et al.) |
Validating the Sharing Behavior and Latency Characteristics of the L4S Architecture
|
2019 |
Rajiullah, Mohammad (et al.) |
Web Experience in Mobile Networks: Lessons from Two Million Page Visits
|
2019 |
Arvidsson, Åke (et al.) |
Web metrics for the next generation performance enhancing proxies
|
2019 |
Angulo, Julio ; Ortlieb, Martin |
“WTH..!?!” Experiences, reactions, and expectations related to online privacy panic situations
|
2019 |
Koumaras, Harilaos (et al.) |
5GENESIS: The Genesis of a flexible 5G Facility
|
2018 |
Garcia, Johan |
A Fragment Hashing Approach for Scalable and Cloud-Aware Network File Detection
|
2018 |
Alizadeh Noghani, Kyoomars ; Ghazzai, Hakim ; Kassler, Andreas |
A Generic Framework for Task Offloading in mmWave MEC Backhaul Networks
|
2018 |
Sinkala, Zipani Tom ; Blom, Martin ; Herold, Sebastian |
A mapping study of software architecture recovery for software product lines
|
2018 |
Fischer-Hübner, Simone (et al.) |
A MOOC on Privacy by Design and the GDPR
|
2018 |
Rabitsch, Alexander ; Hurtig, Per ; Brunström, Anna |
A Stream-Aware Multipath QUIC Scheduler for Heterogeneous Paths
|
2018 |
Grazia, Carlo Augusto (et al.) |
Adapting TCP Small Queues for IEEE 802.11 Networks
|
2018 |
Mayer, Peter ; Volkamer, Melanie |
Addressing misconceptions about password security effectively
|
2018 |
Fritsch, Lothar ; Fischer-Hübner, Simone |
Applications of Privacy and Security Research in the Upcoming Battlefield of Things
|
2018 |
Gokan Khan, Michel (et al.) |
Automated Analysis and Profiling of VirtualNetwork Functions: the NFV-Inspector Approach
|
2018 |
Garcia, Johan ; Brunström, Anna |
Clustering-based separation of media transfers in DPI-classified cellular video and VoIP traffic
|
2018 |
Abrahamsson, Henrik (et al.) |
Connected Vehicles in Cellular Networks: Multi-access versus Single-access Performance
|
2018 |
Nasim, Robayet (et al.) |
Cost-Efficient Resource Scheduling under QoS Constraints for Geo-Distributed Data Centers
|
2018 |
Garcia, Johan |
Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files
|
2018 |
Garcia, Johan ; Korhonen, Topi |
Efficient Distribution-Derived Features for High-Speed Encrypted Flow Classification
|
2018 |
Özgü, Alay (et al.) |
End to End 5G Measurements with MONROE: Challenges and Opportunities
|
2018 |
Alizadeh Noghani, Kyoomars ; Kassler, Andreas ; Sankar Gopannan, Prem |
EVPN/SDN Assisted Live VM Migration between Geo-Distributed Data Centers
|
2018 |
Mandalari, Anna Maria (et al.) |
Experience: Implications of Roaming in Europe
|
2018 |
Vestin, Jonathan ; Kassler, Andreas ; Akerberg, Johan |
FastReact: In-Network Control And Caching For Industrial Control Networks Using Programmable Data Planes
|
2018 |
Länger, Thomas (et al.) |
HCI patterns for cryptographically equipped cloud services
|
2018 |
Ahlgren, Bengt (et al.) |
ICN Congestion Control for Wireless Links
|
2018 |
Hurtig, Per (et al.) |
Impact of TCP BBR on CUBIC Traffic: A mixed workload evaluation
|
2018 |
Pieskä, Marcus (et al.) |
Improving TCP Fairness over Latency Controlled 5G mmWave Communication Links
|
2018 |
Hatamian, Majid (et al.) |
“It’s shocking!": Analysing the impact and reactions to the A3: Android apps behaviour analyser
|
2018 |
Lenhard, Jörg (et al.) |
Lessons Learned from Evaluating Workflow Management Systems
|
2018 |
Oljira, Dejene Boru (et al.) |
MDTCP: Towards a Practical Multipath Transport Protocol for Telco Cloud Datacenters
|
2018 |
Parichehreh, Ali ; Alfredsson, Stefan ; Brunström, Anna |
Measurement Analysis of TCP Congestion Control Algorithms in LTE Uplink
|
2018 |
Iwaya, Leonardo H (et al.) |
mHealth: A Privacy Threat Analysis for Public Health Surveillance Systems
|
2018 |
Hernandez Benet, Cristian (et al.) |
MP-HULA: Multipath transport aware load balancing using programmable data planes
|
2018 |
Gokan Khan, Michel (et al.) |
NFV-Inspector: A Systematic Approach to Profile and Analyze Virtual Network Functions
|
2018 |
Nguyen, Van-Giang (et al.) |
On Load Balancing for a Virtual and Distributed MME in the 5G Core
|
2018 |
Johansson, David ; Kassler, Andreas ; Taheri, Javid |
On the Energy Cost of Robustness and Resiliency for Virtual Network Function Placement
|
2018 |
Santos, Ricardo ; Ghazzai, Hakim ; Kassler, Andreas |
Optimal Steerable mmWave Mesh Backhaul Reconfiguration
|
2018 |
Iwaya, Leonardo H. (et al.) |
Overview of Privacy Challenges in Mobile Health Data Collection Systems
|
2018 |
Høiland-Jørgensen, Toke ; Täht, Dave ; Morton, Jonathan |
Piece of CAKE: A Comprehensive Queue Management Solution for Home Gateways
|
2018 |
Kosta, E. (et al.) |
Preface
|
2018 |
Zeljkovic, Ensar (et al.) |
Proactive Access Point Driven Handovers in IEEE 802.11 Networks
|
2018 |
Kitkowska, Agnieszka |
Reaching Beyond Borders: Investigating Differences in Privacy Harms Concerns
|
2018 |
Koslowski, Konstantin (et al.) |
SDN Orchestration to Optimize Meshed Millimeter-Wave Backhaul Networks for MEC-enhanced eMBB Use Cases
|
2018 |
Chiaro, Pasquale (et al.) |
Secure and privacy-friendly storage and data processing in the cloud
|
2018 |
Abrahamsson, Henrik (et al.) |
Selecting Operator in 3G/4G Networks for Time-Critical C-ITS Applications
|
2018 |
Afzal, Zeeshan (et al.) |
Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications
|
2018 |
Pulls, Tobias ; Dahlberg, Rasmus |
Steady: A Simple End-to-End Secure Logging System
|
2018 |
Kühlewind, Mirja (et al.) |
TAPS: an abstract application interface for QUIC
|
2018 |
Kosta, Eleni (et al.) |
The Smart World Revolution
|
2018 |
Hoseinyfarahabady, M. Reza (et al.) |
Toward designing a dynamic CPU cap manager for timely dataflow platforms
|
2018 |
Garcia, Johan (et al.) |
Towards Video Flow Classification at a Million Encrypted Flows Per Second
|
2018 |
Ghazzai, Hakim (et al.) |
Trajectory Optimization for Cooperative Dual-Band UAV Swarms
|
2018 |
Momen, Nurul |
Turning the Table Around: Monitoring App Behavior
|
2018 |
Murmann, Patrick |
Usable Transparency for Enhancing Privacy in Mobile Health Apps
|
2018 |
Karegar, Farzaneh (et al.) |
User Evaluations of an App Interface for Cloud-Based Identity Management
|
2018 |
Dahlberg, Rasmus ; Pulls, Tobias |
Verifiable Light-Weight Monitoring for Certificate Transparency Logs
|
2018 |
Gustiené, Prima |
Visualization for Open Access: A Case Study of Karlstad University and the University of Makerere in Uganda
|
2018 |
Garcia, Johan |
A clustering-based analysis of DPI-labeled video flow characteristics in cellular networks
|
2017 |
Hoseiny Farahabady, Mohammad Reza (et al.) |
A Dynamic Resource Controller for a Lambda Architecture
|
2017 |
Lenhard, Jörg ; Fritsch, Lothar ; Herold, Sebastian |
A Literature Study on Privacy Patterns Research
|
2017 |
Oljira, Dejene Boru (et al.) |
A Model for QoS-Aware VNF Placement and Provisioning
|
2017 |
Hurtig, Per (et al.) |
A NEAT Approach to Mobile Communication
|
2017 |
Santos, Ricardo (et al.) |
A NEAT framework for application-awareness in SDN environments
|
2017 |
Bozakov, Zdravko (et al.) |
A NEAT framework for enhanced end-host integration in SDN environments
|
2017 |
Weinrank, Felix (et al.) |
A NEAT Way to Browse the Web
|
2017 |
Harrer, Simon (et al.) |
A Pattern Language for Workflow Engine Conformance and Performance Benchmarking
|
2017 |
Nasim, Robayet ; Kassler, Andreas |
A Robust Tabu Search Heuristic for VM Consolidation under Demand Uncertainity in Virtualized Datacenters
|
2017 |
Mayer, Peter ; Kirchner, Jan ; Volkamer, Melanie |
A second look at password composition policies in the wild: Comparing samples from 2010 and 2016
|
2017 |
Kulyk, Oksana (et al.) |
Advancing Trust Visualisations for Wider Applicability and User Acceptance
|
2017 |
Reuben, Jenni ; Fischer-Hübner, Simone |
An Authorization Model for Data Modeled using Semantic Web Technologies
|
2017 |
Lenhard, Jörg (et al.) |
Are Code Smell Detection Tools Suitable For Detecting Architecture Degradation?
|
2017 |
Karegar, Farzaneh (et al.) |
Assessments of a Cloud-Based Data Wallet for Personal Identity Management
|
2017 |
Alizadeh Noghani, Kyoomars (et al.) |
Automating Ethernet VPN deployment in SDN-based Data Centers
|
2017 |
Fida, Mah-Rukh (et al.) |
Demo: experimentation in controlled and operational LTE settings with FLEX-MONROE
|
2017 |
Fritsch, Lothar ; Momen, Nurul |
Derived Partial Identities Generated from App Permissions
|
2017 |
Neumann, Stephan ; Reinheimer, Benjamin Maximmilian ; Volkamer, Melanie |
Don’t Be Deceived: The Message Might Be Fake
|
2017 |
Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie |
Election-Dependent Security Evaluation of Internet Voting Schemes
|
2017 |
Høiland-Jørgensen, Toke (et al.) |
Ending the Anomaly: Achieving Low Latency and Airtime Fairness in WiFi
|
2017 |
Garcia, Johan ; Alfredsson, Stefan ; Brunström, Anna |
Examining cellular access systems on trains: Measurements and change detection
|
2017 |
Alay, Özgü (et al.) |
Experience: An open platform for experimentation with commercial mobile broadband networks
|
2017 |
Høiland-Jørgensen, Toke (et al.) |
Flent: The FLExible Network Tester
|
2017 |
Momen, Nurul (et al.) |
How much Privilege does an App Need? Investigating Resource Usage of Android Apps
|
2017 |
Agapi, Mesodiakaki ; Zola, Enrica ; Kassler, Andreas |
Joint User Association and Backhaul Routing for Green 5G Mesh Millimeter Wave Backhaul Networks
|
2017 |
Vestin, Jonathan ; Kassler, Andreas |
Low frequency assist for mmWave backhaul - the case for SDN resiliency mechanisms
|
2017 |
Beckman, Claes (et al.) |
On the Impact of Velocity on the Train-to-Earth MIMO Propagation Channel: Statistical Observations and Qualitative Analysis
|
2017 |
Atxutegi, Eneko (et al.) |
On the move with TCP in current and future mobile networks
|
2017 |
Hernandez Benet, Cristian (et al.) |
OpenStackEmu - A Cloud Testbed Combining Network Emulation with OpenStack and SDN
|
2017 |
Fritsch, Lothar |
Partial commitment – "Try before you buy" and "Buyer’s remorse" for personal data in Big Data & Machine learning
|
2017 |
Hernandez Benet, Cristian (et al.) |
Policy-based routing and load balancing for EVPN-based data center interconnections
|
2017 |
Fritsch, Lothar |
Privacy dark patterns in identity management
|
2017 |
Yedugundla, Kiran ; Hurtig, Per ; Brunström, Anna |
Probe or Wait: Handling tail losses using Multipath TCP
|
2017 |
Taheri, Javid ; Cho, Daewoong ; Zomaya, Albert Y |
Real-Time Virtual Network Function (VNF) Migration toward Low Network Latency in Cloud Environments
|
2017 |
Pieskä, Marcus ; Kassler, Andreas |
Reducing the Latency of TCP for 5G mmWave Links
|
2017 |
Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie |
Reliable behavioural factors in the information security context
|
2017 |
Peón-Quirós, Miguel (et al.) |
Results from Running an Experiment as a Service Platform for Mobile Networks
|
2017 |
Vestin, Jonathan ; Kassler, Andreas |
SDN enabled resiliency in LTE assisted small cell mmWave backhaul networks
|
2017 |
Alizadeh Noghani, Kyoomars ; Kassler, Andreas |
SDN Enhanced Ethernet VPN for Data Center Interconnect
|
2017 |
Bernhard, David ; Oksana, Kulyk ; Volkamer, Melanie |
Security proofs for Participation privacy, receipt-freeness and ballot privacy for the helios voting scheme
|
2017 |
Kulyk, Oksana ; Reinheimer, Benjamin Maximillian ; Volkamer, Melanie |
Sharing Information with Web Services: A Mental Model Approach in the Context of Optional Information
|
2017 |
Santos, Ricardo ; Kassler, Andreas |
Small Cell Wireless Backhaul Reconfiguration Using Software-Defined Networking
|
2017 |
Khatouni, Ali Safari (et al.) |
Speedtest-like Measurements in 3G/4G Networks: the MONROE Experience
|
2017 |
Pieskä, Marcus ; Kassler, Andreas |
TCP Performance over 5G mmWave Links - Tradeoff between Capacity and Latency
|
2017 |
Greschbach, Benjamin (et al.) |
The Effect of DNS on Tor´s Anonymity
|
2017 |
Knodel, Jens ; Buckley, Jim ; Herold, Sebastian |
The need for an open corpus of software architecture descriptions
|
2017 |
Momen, Nurul ; Piekarska, Marta |
Towards Improving Privacy Awareness Regarding Apps’ Permissions
|
2017 |
Kostopoulos, Alexandros (et al.) |
Towards the Adoption of Secure Cloud Identity Services
|
2017 |
Garcia, Johan (et al.) |
Train Velocity and Data Throughput: A Large Scale LTE Cellular Measurements Study
|
2017 |
Santos, Ricardo (et al.) |
Turning the knobs on OpenFlow-based resiliency in mmWave small cell meshed networks
|
2017 |
Rajiullah, Mohammad (et al.) |
Understanding Multistreaming for Web Traffic: An Experimental Study
|
2017 |
Mesodiakaki, Agapi ; Zola, Enrica ; Kassler, Andreas |
User Association in 5G Heterogeneous Networks with Mesh Millimeter Wave Backhaul Links
|
2017 |
Cho, Daewoong (et al.) |
Virtual Network Function Placement: Towards Minimizing Network Latency and Lead Time
|
2017 |
Karegar, Farzaneh ; Pulls, Tobias ; Fischer-Hübner, Simone |
Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This?
|
2017 |
Ferme, Vincenzo (et al.) |
Workflow Management Systems Benchmarking: Unfulfilled Expectations and Lessons Learned
|
2017 |
Ahmed, Bestoun S. ; Gambardella, L. M. ; Zamli, K. Z. |
A new approach to speed up combinatorial search strategies using stack and hash table
|
2016 |
Marotta, Antonio ; Kassler, Andreas |
A Power Efficient and Robust Virtual Network Functions Placement Problem
|
2016 |
Santos, Ricardo ; Kassler, Andreas |
A SDN Controller Architecture for Small Cell Wireless Backhaul using a LTE Control Channel
|
2016 |
Afzal, Zeeshan (et al.) |
A Wireless Intrusion Detection System for 802.11 networks
|
2016 |
Gilje Jaatun, Martin (et al.) |
Accountability Through Transparency for Cloud Customers
|
2016 |
Oljira, Dejene Boru (et al.) |
Analysis of Network Latency in Virtualized Environments
|
2016 |
Reuben, Jenni ; Martucci, Leonardo A ; Fischer-Hübner, Simone |
Automated Log Audits for Privacy Compliance Validation: A Literature Survey
|
2016 |
Robert, Rémi (et al.) |
Behaviour of common TCP variants over LTE
|
2016 |
Kulyk, Oksana (et al.) |
Coercion-resistant Proxy Voting
|
2016 |
Kulyk, Oksana ; Volkamer, Melanie |
Efficiency Comparison of Various Approaches in E-Voting Protocols
|
2016 |
Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna |
Efficient Scheduling to Reduce Latency for Signaling Traffic using CMT-SCTP
|
2016 |
Dahlberg, Rasmus ; Pulls, Tobias ; Peeters, Roel |
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs
|
2016 |
Kulyk, Oksana (et al.) |
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do
|
2016 |
Mesodiakaki, Agapi (et al.) |
Energy Efficient Line-of-Sight Millimeter Wave Small Cell Backhaul: 60, 70, 80 or 140 GHz?
|
2016 |
Garcia, Johan ; Alfredsson, Stefan ; Brunström, Anna |
Estimating data transfer capacity for intermittent connectivity: A transport aware model
|
2016 |
Herold, Sebastian ; Blom, Martin ; Buckley, Jim |
Evidence in Architecture Degradation and Consistency Checking Research: Preliminary Results from a Literature Review
|
2016 |
Garcia, Johan ; Hurtig, Per |
Getting What You Want When You Want It: Deterministic Network Emulation
|
2016 |
Marotta, Antonio ; Kassler, Andreas |
Green Virtual Network Functions Placement Under Uncertainty Constraints
|
2016 |
Winter, Philipp (et al.) |
Identifying and characterizing Sybils in the Tor network
|
2016 |
Peeters, Roel ; Pulls, Tobias |
Insynd: Improved Privacy-Preserving Transparency Logging
|
2016 |
Kulyk, Oksana (et al.) |
Introducing Proxy Voting to Helios
|
2016 |
Oljira, Dejene Boru (et al.) |
Measurement and Analysis of Network Performance in Virtualized Environments
|
2016 |
Alay, Özgü (et al.) |
Measuring and Assessing Mobile Broadband Networks with MONROE
|
2016 |
Høiland-Jørgensen, Toke (et al.) |
Measuring Latency Variation in the Internet
|
2016 |
Hernandez Benet, Cristian ; Alizadeh Noghani, Kyoomars ; Kassler, Andreas |
Minimizing Live VM Migration Downtime Using OpenFlow based Resiliency Mechanisms
|
2016 |
Alay, Özgü (et al.) |
MONROE, a distributed platform to measure and assess mobile broadband networks: demo
|
2016 |
Papastergiou, Georgios (et al.) |
On the Cost of Using Happy Eyeballs for Transport Protocol Selection
|
2016 |
Geiger, Matthias (et al.) |
On the Evolution of BPMN 2.0 Support and Implementation
|
2016 |
Iwaya, L H (et al.) |
Ontology-based Obfuscation and Anonymisation for Privacy: A Case Study on Healthcare
|
2016 |
Karegar, Farzaneh (et al.) |
Opportunities and challenges of CREDENTIAL: Towards a metadata-privacy respecting identity provider
|
2016 |
Nasim, Robayet ; Taheri, Javid ; Kassler, Andreas |
Optimizing Virtual Machine Consolidation in Virtualized Datacenters Using Resource Sensitivity
|
2016 |
Luz, Saturnino ; Kane, Bridget |
Perspectives on intelligent systems support for multidisciplinary medical teams
|
2016 |
Reuben, Jenni (et al.) |
Privacy Impact Assessment Template for Provenance
|
2016 |
Samani, Hamid R. Dehghani ; Taheri, Javid ; Zomaya, Albert Y. |
RBT-MF: a Distributed Rubber Band Technique for Maximum Flow Problem in Azure
|
2016 |
Vestin, Jonathan ; Kassler, Andreas |
Resilient SDN based Small Cell Backhaul Networks using mm Wave Bands
|
2016 |
Ruebsamen, Thomas ; Pulls, Tobias ; Reich, Christoph |
Security and Privacy Preservation of Evidence in Cloud Accountability Audits
|
2016 |
Alaqra, Ala (et al.) |
Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario
|
2016 |
Eklund, Johan ; Grinnemo, Karl-Johan ; Brunström, Anna |
Stream-aware Scheduling to Improve Latency for Signaling Traffic using CMT-SCTP
|
2016 |
Atxutegi, Eneko (et al.) |
TCP behaviour in LTE: impact of flow start-up and mobility
|
2016 |
Hassan, Mahdi Mohammad (et al.) |
Testability and software performance: A systematic mapping study
|
2016 |
Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin |
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
|
2016 |
Grinnemo, Karl-Johan (et al.) |
Towards a Flexible Internet Transport Layer Architecture
|
2016 |
Fischer-Hübner, Simone (et al.) |
Transparency, Privacy and Trust: Technology for Tracking and Controlling my Data Disclosures – Does this work?
|
2016 |
Taheri, Javid ; Zomaya, Albert ; Kassler, Andreas |
vmBBThrPred: A Black-Box Throughput Predictor for Virtual Machines in Cloud Environments
|
2016 |
Gutmann, Andreas (et al.) |
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology
|
2016 |
Grinnemo, Karl-Johan ; Brunström, Anna |
A First Study on Using MPTCP to Reduce Latency for Cloud Based Mobile Applications
|
2015 |
Sepasian, Neda ; Kumar, Kundan ; Breeuwer, Marcel |
A geometrical approach to find corresponding patches in 3D medical surfaces
|
2015 |
Volkamer, Melanie (et al.) |
A Socio-Technical Investigation into Smartphone Security
|
2015 |
Kolb, Stefan ; Lenhard, Jörg ; Wirtz, Guido |
Application Migration Effort in the Cloud: The Case of Cloud Platforms
|
2015 |
Blom, Martin ; Hassan, Mohammad Mahdi |
Applying clustering to analyze opinion diversity
|
2015 |
Afzal, Zeeshan ; Lindskog, Stefan |
Automated Testing of IDS Rules
|
2015 |
Pulls, Tobias ; Peeters, Roel |
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
|
2015 |
Voronkov, Artem ; Lindskog, Stefan ; Martucci, Leonardo |
Challenges in Managing Firewalls
|
2015 |
Garcia, Johan ; Alfredsson, Stefan ; Brunstrom, Anna |
Delay metrics and delay characteristics: A study of four Swedish HSDPA+ and LTE networks
|
2015 |
Volkamer, Melanie (et al.) |
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
|
2015 |
Kulyk, Oksana (et al.) |
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
|
2015 |
Zola, Enrica ; Kassler, Andreas |
Energy Efficient Control of Virtual Machine Consolidation under Uncertain Input Parameters for the Cloud
|
2015 |
Zola, Enrica ; Kassler, Andreas |
Energy Efficient Virtual Machine Consolidation under Uncertain Input Parameters for Green Data Centers
|
2015 |
Garcia, Johan ; Alfredsson, Stefan ; Brunström, Anna |
Examining TCP Short Flow Performance in Cellular Networks Through Active and Passive Measurements
|
2015 |
Garcia, Johan |
Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints
|
2015 |
Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie |
Extending Helios Towards Private Eligibility Verifiability
|
2015 |
Söderman, Pehr (et al.) |
Mind the SmartGap: A Buffer Management Algorithm for Delay Tolerant Wireless Sensor Networks
|
2015 |
Zola, Erica ; Kassler, Andreas |
Minimizing the Impact of Handover in WLAN: A Study on Performance Optimization
|
2015 |
Oljira, Dejene Boru (et al.) |
Models for Efficient Data Replication in Cloud Computing Datacenters
|
2015 |
Yedugundla, Kiran ; Hurtig, Per ; Brunström, Anna |
Multipath TCP: Can it Reduce Transport Latency for Web Traffic?
|
2015 |
Afzal, Zeeshan ; Lindskog, Stefan |
Multipath TCP IDS Evasion and Mitigation
|
2015 |
Santos, Ricardo ; Curadoo, Marilia ; Kassler, Andreas |
Multipathing In Software Defined Networking: Interaction between SDN and MPTCP
|
2015 |
Nasim, Robayet ; Kassler, Andreas |
Network-centric Performance Improvement for Live VM Migration
|
2015 |
Vestin, Jonathan ; Kassler, Andreas |
QoS Enabled WiFi MAC Layer Processing as an Example of a NFV Service
|
2015 |
Vestin, Jonathan ; Kassler, Andreas |
QoS Management for WiFi MAC layer processing in the Cloud: Demo Description
|
2015 |
Hurtig, Per (et al.) |
Reducing Transport Latency using Multipath Protocols
|
2015 |
Vestin, Jonathan ; Kassler, Andreas ; Akerberg, Johan |
Resilient Software Defined Networking for Industrial Control Networks
|
2015 |
Mayer, Peter ; Volkamer, Melanie |
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
|
2015 |
Rübsamen, Thomas ; Pulls, Tobias ; Reich, Christoph |
Secure Evidence Collection and Storage for Cloud Accountability Audits
|
2015 |
Alaqra, Ala(a) (et al.) |
Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements
|
2015 |
Kargar Bideh, Minoo (et al.) |
TADA: An Active Measurement Tool for Automatic Detection of AQM
|
2015 |
Hassan, Mahdi Mohammad (et al.) |
Testability and Software Robustness: A Systematic Literature Review
|
2015 |
Pettersson, John Sören ; Wik, Malin |
The longevity of general purpose Wizard-of-Oz tools
|
2015 |
Angulo, Julio |
Usable Transparency through network representations and analyses
|
2015 |
Angulo, Julio (et al.) |
Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures
|
2015 |
Pons, Xavier (et al.) |
An energy efficient vertical handover decision algorithm
|
2014 |
Garcia, Johan |
An Evaluation of Side-Information Assisted Forensic Hash Matching
|
2014 |
Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela |
Authentication Schemes - Comparison and Effective Password Spaces
|
2014 |
Bakar, Sakhinah Abu ; Taheri, Javid ; Zomaya, Albert |
Characterization of essential proteins based on network topology in proteins interaction networks
|
2014 |
Garcia, Johan |
Computer Assisted Reasoning as a Support for Knowledge Management
|
2014 |
Nasim, Robayet ; Kassler, Andreas |
Deploying OpenStack: Virtual Infrastructure or Dedicated Hardware
|
2014 |
Kulyk, Oksana (et al.) |
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design
|
2014 |
Mesodiakaki, Agapi (et al.) |
Energy Impact of Outdoor Small Cell Backhaul in Green Heterogeneous Networks
|
2014 |
Budurushi, Jurlind (et al.) |
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail
|
2014 |
Matloobi, Roozbeh ; Taheri, Javid ; Zomaya, Albert |
Fuzzy modeling to predict performance of collocated virtual machines in private clouds
|
2014 |
Anderson, Collin ; Winter, Philipp ; -, Roya |
Global Network Interference Detection over the RIPE Atlas Network
|
2014 |
Fischer-Hübner, Simone ; Angulo, Julio ; Pulls, Tobias |
How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used?
|
2014 |
Borges, Fabio ; Martucci, Leonardo |
iKUP keeps users' privacy in the Smart Grid
|
2014 |
Budurushi, Jurlind (et al.) |
Implementation and Evaluation of the EasyVote Tallying Component and Ballot
|
2014 |
Bartsch, Steffen (et al.) |
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten
|
2014 |
Mesodiakaki, Agapi (et al.) |
Joint uplink and downlink cell selection in cognitive small cell heterogeneous networks
|
2014 |
Riggio, Roberto ; Oljira, Dejene Boru ; Rasheed, Tinku |
Joule: Software-Defined Energy Metering
|
2014 |
Lavén, Andreas ; Kassler, Andreas ; Brunstrom, Anna |
Latency Aware Anypath Routing and Channel Scheduling for Multi-Radio Wireless Mesh Networks
|
2014 |
Ribeck, Judy ; Borin, Lars |
Lexical Bundles in Swedish Secondary School Textbooks
|
2014 |
Hurtig, Per ; Brunström, Anna ; Kassler, Andreas |
MPTCP PathFinder: Datacenter Bandwidth Aggregation
|
2014 |
Canova, Gamze (et al.) |
NoPhish: An Anti-Phishing Education App
|
2014 |
Sharif, S. (et al.) |
Online Multiple Workflow Scheduling under Privacy and Deadline in Hybrid Cloud Environment
|
2014 |
Budurushi, Jurlind (et al.) |
Paper Audit Trails and Voters’ Privacy Concerns
|
2014 |
Dobrijevic, Ognjen (et al.) |
QoE-Driven Path Optimization Model for Multimedia Services
|
2014 |
Herold, Sebastian ; Mair, Matthias |
Recommending Refactorings to Re-establish Architectural Consistency
|
2014 |
Doganay, Kivanc (et al.) |
Search-Based Testing for Embedded Telecom Software with Complex Input Structures
|
2014 |
Borges, Fábio (et al.) |
Secure and Privacy-Friendly Public Key Generation and Certification
|
2014 |
Winter, Philipp (et al.) |
Spoiled Onions: Exposing Malicious Tor Exit Relays
|
2014 |
Ahmad, Muhammad Ovais ; Liukkunen, Kari ; Markkula, Jouni |
Student perceptions and attitudes towards the software factory as a learning environment
|
2014 |
Garcia, Johan |
The GATM Computer Assisted Reasoning Framework in a Security Policy Reasoning Context
|
2014 |
Harrer, Simon (et al.) |
Towards Uniform BPEL Engine Management in the Cloud
|
2014 |
Klockar, Annika (et al.) |
User-centric pre-selection and scheduling for coordinated multipoint systems
|
2014 |
Grinnemo, Karl-Johan ; Brunstrom, Anna ; Cheng, Jun |
Using Concurrent Multipath Transfer to Improve the SCTP Startup Behavior for PSTN Signaling Traffic
|
2014 |
Angulo, Julio ; Wästlund, Erik ; Johan, Högberg |
What Would It Take for You to Tell Your Secrets to a Cloud?: Studying decision factors when disclosing information to cloud services
|
2014 |
Renaud, Karen ; Volkamer, Melanie ; Renkema-Padmos, Arne |
Why doesn’t Jane protect her privacy?
|
2014 |
Nasim, Robayet ; Buchegger, Sonja |
XACML-Based Access Control for Decentralized Online Social Networks
|
2014 |
Alfredsson, Stefan |
A Case Study of Recent Mifare Classic Field Deployments From an (In-)Security Perspective
|
2013 |
Iwaya, Leonardo ; Rosso, R S U ; Hounsell, M S |
A Design for Assembly Application with Dynamic Information Retrieval from Case Database
|
2013 |
Volkamer, Melanie (et al.) |
Adopting the CMU/APWG anti-phishing landing page idea for Germany
|
2013 |
Renaud, Karen (et al.) |
Are Graphical Authentication Mechanisms As Strong As Passwords?
|
2013 |
Wu, Hao ; Taheri, Javid ; Zomaya, Albert |
B-Alarm: An Entropy Based Burst Traffic Prediction Approach for Ethernet Switches in Data Centers
|
2013 |
Chow, Lawrence (et al.) |
Channel Aware Rebuffering for Wireless Media Streaming with Handoff Control
|
2013 |
Herold, Sebastian ; Rausch, Andreas |
Complementing model-driven development for the detection of software architecture erosion
|
2013 |
Berthold, Stefan (et al.) |
Crime and Punishment in the Cloud: Accountability, Transparency, and Privacy
|
2013 |
Lenhard, Jörg ; Wirtz, Guido |
Detecting Portability Issues in Model-Driven BPEL Mappings
|
2013 |
Pulls, Tobias ; Peeters, Roel ; Wouters, Karel |
Distributed privacy-preserving transparency logging
|
2013 |
Mesodiakaki, Agapi (et al.) |
Energy Efficiency Analysis of Secondary Networks in Cognitive Radio Systems
|
2013 |
Oljira, Dejene Boru (et al.) |
Energy-Efficient Data Replication in Cloud Computing Datacenters
|
2013 |
Peeters, Roel ; Pulls, Tobias ; Wouters, Karel |
Enhancing Transparency with Distributed Privacy-Preserving Logging
|
2013 |
Zola, Enria (et al.) |
Expected Bit Rate for Terminals Moving According to the Random Waypoint Model in a WLAN Cell
|
2013 |
Beckerle, Matthias ; Martucci, Leonardo |
Formal Definitions for Usable Access Control Rule Sets: From Goals to Metrics
|
2013 |
Söderman, Pehr (et al.) |
Handover in the Wild: The Feasibility of Vertical Handover in Commodity Smartphones
|
2013 |
Angulo, Julio ; Wästlund, Erik |
Identity Management through “Profiles”: Prototyping an Online Information Segregation Service
|
2013 |
Alfredsson, Stefan (et al.) |
Impact of TCP Congestion Control on Bufferbloat in Cellular Networks
|
2013 |
Blom, Martin ; Eldh, Sigrid |
Is Common Test Data the Solution to Poor Quality?: Solving the Right Problem – An Analysis of a Public Health Information System
|
2013 |
Neumann, Stephan (et al.) |
Modeling the German Legal Latitude Principles
|
2013 |
Alfredsson, Stefan (et al.) |
Observations of Bufferbloat in Swedish Cellular Networks
|
2013 |
Harrer, Simon ; Lenhard, Jörg ; Wirtz, Guido |
Open Source versus Proprietary Software in Service-Orientation: The Case of BPEL Engines
|
2013 |
Angulo, Julio ; Wästlund, Erik |
Profiles: prototyping an online information segregation service
|
2013 |
Zola, Enrica (et al.) |
Robust Association for Multi-radio Devices under Coverage of Multiple Networks
|
2013 |
Winter, Philipp ; Pulls, Tobias ; Fuss, Juergen |
ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship
|
2013 |
Unander-Scharin, Åsa ; Unander-Scharin, Carl |
Sensory Digital Intonation
|
2013 |
Eldh, Sigrid |
Some researcher considerations when conducting empirical studies in industry
|
2013 |
Winter, Philipp |
Towards a Censorship Analyser for Tor
|
2013 |
Klockar, Annika (et al.) |
Utility as a User Selection Criterion for Coordinated Multi-Point Systems
|
2013 |
Gustas, Remigijus ; Gustiene, Prima |
A Graphical Method for Conceptual Modelling of Business and Software Scenarios
|
2012 |
Pearson, Siani (et al.) |
Accountability for cloud and other future Internet services
|
2012 |
Lundin, Reine ; Lindskog, Stefan |
An Investigation of Entropy of Selectively Encrypted Bitmap Images
|
2012 |
Söderman, Pehr (et al.) |
An SCTP-based Mobility Management Framework for Smartphones and Tablets
|
2012 |
Borges, Fábio ; Martucci, Leonardo ; Mühlhäuser, Max |
Analysis of privacy-enhancing protocols based on anonymity networks
|
2012 |
Cavalcanti de Castro, Marcel ; Kassler, Andreas ; Avallone, Stefano |
BestPeer: A Load-aware Multi-path Peer Selection for Wireless Mesh Networks
|
2012 |
Harrer, Simon ; Lenhard, Jörg ; Wirtz, Guido |
BPEL Conformance in Open Source Engines
|
2012 |
Kolb, Stefan ; Lenhard, Jörg ; Wirtz, Guido |
Bridging the Heterogeneity of Orchestrations - A Petri Net-based Integration of BPEL and Windows Workflow
|
2012 |
Paul, Thomas (et al.) |
C4PS-Helping Facebookers Manage Their Privacy Settings
|
2012 |
Neumann, Stephan ; Volkamer, Melanie |
Civitas and the Real World: Problems and Solutions from a Practical Point of View
|
2012 |
Dely, Peter (et al.) |
CloudMAC: An OpenFlow based Architecture for 802.11 MAC Layer Processing in the Cloud
|
2012 |
Moraveji, Reza (et al.) |
Data-Intensive Workload Consolidation on Hadoop Distributed File System
|
2012 |
Nasim, Robayet ; Kassler, Andreas |
Distributed Architectures for Intelligent Transport Systems: A Survey
|
2012 |
Mesodiakaki, Agapi (et al.) |
Energy-efficient contention-aware channel selection in Cognitive Radio Ad-Hoc Networks
|
2012 |
Hurtig, Per ; Brunstrom, Anna |
Enhanced Metric Caching for Short TCP Flows
|
2012 |
Rajiullah, Mohammad ; Brunström, Anna |
Evaluation and Analysis of NR-SACKs based PR-SCTP
|
2012 |
Wästlund, Erik ; Angulo, Julio ; Fischer-Hübner, Simone |
Evoking Comprehensive Mental Models of Anonymous Credentials
|
2012 |
Vliegen, Jo (et al.) |
Hardware strengthening a Distributed Logging Scheme
|
2012 |
Winter, Philipp ; Lindskog, Stefan |
How the Great Firewall of China is Blocking Tor
|
2012 |
Karlsson, Jonas (et al.) |
Impact of Multi-path Routing on TCP Performance
|
2012 |
Karlsson, Jonas (et al.) |
Impact of Multi-path Routing on TCP Performance in Wireless Mesh Networks
|
2012 |
Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna |
Implications of using a Large Initial Congestion Window to Improve mSCTP Handover Delay
|
2012 |
Christin, Delphine (et al.) |
IncogniSense: An anonymity-preserving reputation frameworkfor participatory sensing applications
|
2012 |
Pulls, Tobias |
(More) Side Channels in Cloud Storage: Linking Data to Users
|
2012 |
Rizvandi, Nikzad Babaii (et al.) |
Network Load Analysis and Provisioning of MapReduce Applications
|
2012 |
Andersson, Kerstin |
Numerical Evaluation of the Average Number of Successive Guesses
|
2012 |
Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna |
On the Use of an Increased Initial Congestion Window to Improve mSCTP Handover Performance
|
2012 |
Karlsson, Jonas (et al.) |
Performance Evaluation for TCP in Tactical Mobile Ad hoc Networks
|
2012 |
Chow, Lawrence (et al.) |
Playout-Buffer Aware Hand-Off Control for Wireless Video Streaming
|
2012 |
Martucci, Leonardo (et al.) |
Privacy, security and trust in cloud computing: The perspective of the telecommunication industry
|
2012 |
Pulls, Tobias |
Privacy-Friendly Cloud Storage for the Data Track: An Educational Transparency Tool
|
2012 |
Kassler, Andreas (et al.) |
Quality of Experience-based Routing in Multi-Service Wireless Mesh Networks
|
2012 |
Garcia, Johan |
Quantifying the Benefits of File Size Information for Forensic Hash Matching
|
2012 |
Eldh, Sigrid ; Sundmark, Daniel |
Robustness Testing of Mobile Telecommunication Systems: A Case Study on Industrial Practice and Challenges
|
2012 |
Söderman, Pehr (et al.) |
Sub-Second Transport Layer Vertical Handover Using mSCTP in Android Mobile Devices
|
2012 |
Eldh, Sigrid ; Punnekkat, Sasikumar |
Synergizing industrial needs and academic research for better software education
|
2012 |
Karlsson, Jonas (et al.) |
The Interaction Between TCP Reordering Mechanisms and Multi-path Forwarding in Wireless Mesh Networks
|
2012 |
Kassler, Andreas (et al.) |
Towards QoE-driven Multimedia Service Negotiation and Path Optimization with Software Defined Networking
|
2012 |
Angulo, Julio (et al.) |
Understanding the user experience of secure mobile online transactions in realistic contexts of use
|
2012 |
Ahammed, Farhan ; Taheri, Javid ; Zomaya, Albert |
Using simulated annealing to find lower bounds of localization with noisy measurements
|
2012 |
Ahammed, Farhan (et al.) |
VLOCI: Using Distance Measurements to Improve the Accuracy of Location Coordinates in GPS-Equipped VANETs
|
2012 |
Calvo, J.C. (et al.) |
A Method to Improve the Accuracy of Protein Torsion Angles
|
2011 |
Karlsson, Jonas (et al.) |
An Aggregation Aware Multi-path Forwarding Paradigm for Wireless Mesh Networks
|
2011 |
Karlsson, Jonas (et al.) |
An Aggregation Aware Multi-path Forwarding Paradigm for Wireless Mesh Networks : AA-L2R Aggregation Aware Multi-path Routing
|
2011 |
Wang, Tai-Chun ; Taheri, Javid ; Zomaya, Albert |
Averaging Measurement Strategies for Identifying Single Nucleotide Polymorphisms from Redundant Data Sets
|
2011 |
Hein, Patrick (et al.) |
Conflict Detection and Lifecycle Management for Access Control in Publish/Subscribe Systems
|
2011 |
Rajiullah, Mohammad (et al.) |
Data Modeling and Transport of Syslog Messages
|
2011 |
Eklund, Johan (et al.) |
Delay Penalty during SCTP Handover
|
2011 |
Lundin, Reine ; Lindskog, Stefan |
Entropy of Selectively Encrypted Strings
|
2011 |
Angulo, Julio ; Wästlund, Erik |
Exploring Touch-Screen Biometrics for User Identification on Smart Phones
|
2011 |
Ahammed, Farhan ; Taheri, Javid ; Zomaya, Albert |
Finding lower bounds of localization with noisy measurements using genetic algorithms
|
2011 |
Bakar, Sakhinah Abu ; Taheri, Javid ; Zomaya, Albert |
FIS-PNN: A Hybrid Computational Method for Protein-Protein Interactions Prediction Using the Secondary Structure Information
|
2011 |
Lundin, Reine ; Lindskog, Stefan |
Guesswork Changes in Multi-processor Attacks
|
2011 |
Bakar, Sakhinah Abu ; Taheri, Javid ; Zomaya, Albert |
Identifying Hub Proteins and Their Essentiality from Protein-protein Interaction Network
|
2011 |
Eklund, Johan (et al.) |
Impact of Slow Start on SCTP Handover Performance
|
2011 |
Eklund, Johan ; Brunstrom, Anna ; Grinnemo, Karl-Johan |
Improving mSCTP-based Vertical Handovers by Increasing the Initial Congestion Window
|
2011 |
Ries, Sebastian (et al.) |
Learning whom to trust in a privacy-friendly way
|
2011 |
Rajiullah, Mohammad ; Brunström, Anna |
On the Effectiveness of PR-SCTP in Networks with Competing Traffic
|
2011 |
Kassler, Andreas ; Dely, Peter ; Beyer, Nico |
OpenFlow for Wireless Mesh Networks
|
2011 |
Hurtig, Per ; Brunstrom, Anna |
Packet Reordering in TCP
|
2011 |
Castro C, Marcel (et al.) |
Peer-to-Peer Selection and Channel Assignment for Wireless Mesh Networks
|
2011 |
Rajiullah, Mohammad ; Brunström, Anna ; Lindskog, Stefan |
Priority Based Delivery of PR-SCTP Messages in a Syslog Context
|
2011 |
Brajdic, Agata ; Kassler, Andreas ; Matijasevic, Maja |
Quality of Experience based optimization of heterogeneous multimedia sessions in IMS
|
2011 |
Hurtig, Per ; John, Wolfgang ; Brunstrom, Anna |
Recent Trends in TCP Packet-Level Characteristics
|
2011 |
Kastrinogiannis, Timotheos ; Mesodiakaki, Agapi ; Papavassiliou, Symeon |
Service-oriented utility-based uplink power control in two-tier femtocell networks
|
2011 |
Hurtig, Per ; Brunström, Anna |
Short Flows and TCP Metric Caching in Linux
|
2011 |
Lenhard, Jörg ; Schönberger, Andreas ; Wirtz, Guido |
Streamlining Pattern Support Assessment for Service Composition Languages
|
2011 |
Rajiullah, Mohammad (et al.) |
Syslog Performance: Data Modeling and Transport
|
2011 |
Zhang, Ge ; Fischer-Huebner, Simone |
Timing Attacks on PIN Input in VoIP Networks: Short paper
|
2011 |
Berthold, Stefan |
Towards a Formal Language for Privacy Options
|
2011 |
Kassler, Andreas (et al.) |
TP-UrbanX - A New Transport Protocol for Cognitive Multi-Radio Mesh Networks
|
2011 |
Kim, Wooseong (et al.) |
Urban-X: A Self-Organizing Cognitive Wireless Mesh Network for Dense City Environments
|
2011 |
Jing, Su ; Kane, Bridget ; Luz, Saturnino |
Utilising Semantic Structures in the Interactions among Speakers at meetings
|
2011 |
Jungert, Erland (et al.) |
A generic architecture for surveillance systems
|
2010 |
Hedbom, Hans (et al.) |
Adding Secure Transparency Logging to the PRIME Core
|
2010 |
Dely, Peter (et al.) |
An Experimental Comparison of Burst Packet Transmission Schemes in IEEE 802.11-based Wireless Mesh Networks
|
2010 |
Jing, Su ; Kane, Bridget ; Luz, Saturnino |
Automatic meeting participant role detection by dialogue patterns
|
2010 |
Kassler, Andreas (et al.) |
Cognitive Multi-Radio Mesh Networks for the Future Wireless Internet
|
2010 |
Kim, Wooseong (et al.) |
Cognitive Multi-Radio Mesh Networks on ISM Bands: A Cross-Layer Architecture
|
2010 |
Reis, Andre B (et al.) |
Distortion Optimized Multi-Service Scheduling for Next-Generation Wireless Mesh Networks
|
2010 |
Trung Luong, Tuan (et al.) |
Efficient Channel Assignment and Routing Protocol for Multiple Channels Multiple Interfaces Wireless Mesh Network
|
2010 |
Hurtig, Per ; Brunström, Anna |
Emulation Support for Advanced Packet Reordering Models
|
2010 |
Lundin, Reine ; Lindskog, Stefan |
Extending the Definition of Guesswork
|
2010 |
Holleboom, Thijs Jan ; Garcia, Johan |
Fragment Retention Characteristics in Slack Space: Analysis and Measurements
|
2010 |
Dely, Peter (et al.) |
FUZPAG: A Fuzzy-Controlled Packet Aggregation Scheme for Wireless Mesh Networks
|
2010 |
Zhang, Ge ; Berthold, Stefan |
Hidden VoIP Calling Records from Networking Intermediaries
|
2010 |
Martucci, Leonardo ; Ries, Sebastian ; Mühlhäuser, Max |
Identifiers, Privacy and Trust in the Internet of Services
|
2010 |
Abdollahi, Kamran ; Shams Shafigh, Alireza ; Kassler, Andreas |
Improving Performance of On Demand Multicast Routing by deleting lost join query packet
|
2010 |
Shams Shafigh, Alireza ; Abdollahi, Kamran ; Kassler, Andreas |
Improving Performance of On Demand Multicast Routing by using Fuzzy Logic
|
2010 |
Beckerle, Matthias ; Martucci, Leonardo ; Ries, Sebastian |
Interactive access rule learning: Generating adapted access rule sets
|
2010 |
Blom, Martin |
Is Scrum and XP suitable for CSE Development?
|
2010 |
Cavalcanti de Castro, Marcel ; Kassler, Andreas ; Avallone, Stefano |
Measuring the Impact of ACI in Cognitive Multi-Radio Mesh Networks
|
2010 |
Lavén, Andreas ; Kassler, Andreas |
Multi-Channel Anypath Routing in Wireless Mesh Networks
|
2010 |
Cavalcanti de Castro, Marcel (et al.) |
On the comparison between performance of DHT-based protocols for opportunistic networks
|
2010 |
Zhang, Ge ; Fischer Hübner, Simone |
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
|
2010 |
Dely, Peter (et al.) |
Practical Considerations for Channel Assignment in Wireless Mesh Networks
|
2010 |
Zhang, Ge (et al.) |
Privacy and Identity Management for Life: 5th IFIP primelife international summer school revised selected papers
|
2010 |
Reis, Andre B. (et al.) |
Quality of Experience Optimized Scheduling in Multi-Service Wireless Mesh Networks
|
2010 |
Brunström, Anna |
Reliable and Secure Communication in SCTP
|
2010 |
Lundin, Reine ; Lindskog, Stefan |
Security Implications of Selective Encryption
|
2010 |
Lindskog, Stefan ; Faig, Zoltán ; Brunstrom, Anna |
Security Solution Suitability Analysis using Modified Multiplicative Analytic Hierarchy Process
|
2010 |
Zhang, Ge (et al.) |
SIP Proxies: New Reflectors? Attacks and Defenses
|
2010 |
Zhang, Ge (et al.) |
SIP Proxies: New Reflectors in the Internet
|
2010 |
Fischer Hübner, Simone ; Georgiadou, Yola |
Surveillance and Privacy
|
2010 |
Fischer Hübner, Simone |
The Conflict between Privacy and Digital Forensics
|
2010 |
Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna |
Theoretical Analysis of an Ideal Startup Scheme in Multihomed SCTP
|
2010 |
Dely, Peter ; Kassler, Andreas ; Sivchenko, Dmitry |
Theoretical and Experimental Analysis of the Channel Busy Fraction in IEEE 802.11
|
2010 |
Weber, Stefan G. (et al.) |
Towards trustworthy identity and access management for the future internet
|
2010 |
Hedbom, Hans ; Pulls, Tobias |
Unlinking Database Entries: Implementation Issues in Privacy Preserving Secure Logging
|
2010 |
Kim, Wooseong (et al.) |
Urban-X: Towards Distributed Channel Assignment in Cognitive Multi-Radio Mesh Networks
|
2010 |
Lindskog, Stefan (et al.) |
Using System Call Information to Reveal Hidden Attack Manifestations
|
2010 |
Hurtig, Per (et al.) |
Using Triggers for Emulation of Opportunistic Networking
|
2010 |
Klockar, Annika (et al.) |
Utility of Joint Processing Schemes
|
2010 |
Berthold, Stefan ; Böhme, Rainer |
Valuating Privacy with Option Pricing Theory
|
2010 |