| Martucci, Leonardo (et al.) |
The Cyber Range Lite: Lightweight Infrastructure for Training and Education
|
2026 |
| Johansson, Anton ; Ramaswamy, Arunselvan |
Approximate Probabilistic Inference for Time-Series Data: A Robust Latent Gaussian Model with Temporal Awareness
|
2025 |
| Friesen, J. (et al.) |
Comparative Analysis of Manual Slum Identification Using Satellite Data: A Case Study of Medellin, Colombia
|
2025 |
| Maqbool, Bilal ; Herold, Sebastian |
Digital Touchpoints: Generating Synthetic Data for Elderly Smartphone Interactions
|
2025 |
| Usman, Muhammad |
Effortless Lifecycle Management for Experimental IIoT Workloads in Containerized Environments
|
2025 |
| Rosa, Felipe (et al.) |
End-to-End 360° Video Streaming over HTTP/3: Architecture and Implementation
|
2025 |
| Parastar, P. (et al.) |
Energy-Efficient Task Computation at the Edge for Vehicular Services
|
2025 |
| Jansson, Jörgen (et al.) |
Enhancing prehospital competence through high-fidelity simulation utilizing beyond-5G and 6G technologies
|
2025 |
| Jagstedt, Siri (et al.) |
Exploring AI as a lever for personalised tourism services
|
2025 |
| Magnusson, Jonathan |
Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization
|
2025 |
| Nammouchi, Amal (et al.) |
Instance-Based Transfer Learning for Short-Term Load Forecasting in Data-Scarce Buildings
|
2025 |
| Chahed, Hamza (et al.) |
Inter-Stream Dependencies in Time-Sensitive Networking
|
2025 |
| Ståhl, Emil (et al.) |
On the Benefits of Predictable Traffic in Virtual Switches: A Case Study
|
2025 |
| Ali, Jameel (et al.) |
Optimizing Energy Consumption in NB-IoT Networks through Enhanced Cell Selection and Reselection Strategy
|
2025 |
| Memarian, Mohsen (et al.) |
Power Efficiency of a Hybrid 5G gNB Data Plane Combining SmartNICs and Commodity Servers
|
2025 |
| Memarian, Mohsen (et al.) |
Power Efficiency of a Hybrid 5G gNB Data Plane Combining SmartNICs and Commodity Servers
|
2025 |
| Lindström, Alexander ; Ramaswamy, Arunselvan ; Grinnemo, Karl-Johan |
Pre-Training Deep Q-Networks Eliminates the Need for Target Networks: An Empirical Study
|
2025 |
| Lindström, Alexander ; Ramaswamy, Arunselvan ; Grinnemo, Karl-Johan |
Pre-training Deep Q-Networks Eliminates the Need for Target Networks: An Empirical Study
|
2025 |
| Ahmed, Bestoun S. (et al.) |
Quality Assurance for LLM-RAG Systems: Empirical Insights from Tourism Application Testing
|
2025 |
| Ahmed, Bestoun S. (et al.) |
Quality Assurance for LLM-RAG Systems: Empirical Insights from Tourism Application Testing
|
2025 |
| Hagen, Lukas ; Brunstrom, Anna |
Reproducing and Solving a Fallback Issue in TCP Prague
|
2025 |
| Gbadamosi, Bolaji ; Pulls, Tobias ; Høiland-Jørgensen, Toke |
Secure Deployment of eBPF Programs Made Manifest
|
2025 |
| Forsberg, Albin ; Iwaya, Leonardo H |
Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study
|
2025 |
| Garcia, Johan ; Sundberg, Simon ; Brunstrom, Anna |
TCP Congestion Control Performance over Starlink
|
2025 |
| Aupke, Phil (et al.) |
Towards Uncertainty-Aware Forecasting Using Tree-Based Aggregation in Federated Learning
|
2025 |
| Larsson, Emil ; Jensen, Meiko |
Understanding Corporate Ransomware – A Case Study in the Nordics
|
2025 |
| Ahmad, Muhammad Ovais |
5G Secure Solution Development and Security Master Role
|
2024 |
| Akil, Mahdi (et al.) |
A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs
|
2024 |
| Akil, Mahdi ; Martucci, Leonardo ; Hoepman, Jaap-Henk |
A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs
|
2024 |
| Caso, Giuseppe (et al.) |
A Standard-compliant Assessment of Beyond-eMBB QoS/QoE in 5G Networks
|
2024 |
| Maqbool, Bilal ; Karegar, Farzaneh ; Herold, Sebastian |
A Survey on Usability Evaluation in Digital Health and Potential Efficiency Issues
|
2024 |
| Hansen, M. ; Gruschka, N. ; Jensen, Meiko |
A Universal Data Model for Data Sharing Under the European Data Strategy
|
2024 |
| Ahmed, Bestoun S. |
An Adaptive Metaheuristic Framework for Changing Environments
|
2024 |
| Usman, Muhammad ; Brunstrom, Anna |
Benchmarking Lightweight Container Orchestration Distributions for Edge-Based IoT Applications
|
2024 |
| Ahmad, Muhammad Ovais ; Al-Baik, O. |
Beyond Technical Debt Unravelling Organisational Debt Concept
|
2024 |
| Rafiee, Milad ; Taherkordi, Amir ; Alay, Özgü |
Cross Network Layer Cognitive Service Orchestration in Edge Computing Systems
|
2024 |
| Kumar, Pattiwar Shravan ; Saxena, Paresh ; Alay, Özgü |
DEAR: DRL Empowered Actor-Critic ScheduleR for Multipath QUIC Under 5G/B5G Hybrid Networks
|
2024 |
| Gustavsson, Tomas ; Ahmad, Muhammad Ovais ; Saeeda, Hina |
Development Of a Measurement Instrument for Process Debt Detection in Agile Software Development Organizations
|
2024 |
| Rajiullah, Mohammad (et al.) |
Enhancing Healthcare Remote Education with 6G and XR Technologies
|
2024 |
| Ukwen, David (et al.) |
Examining the Predictability of Starlink Downlink Throughput
|
2024 |
| Saeeda, Hina ; Ahmad, Muhammad Ovais ; Gustavsson, Tomas |
Exploring Process Debt in Large-Scale Agile Software Development For Secure Telecom Solutions
|
2024 |
| Garcia, Johan ; Sundberg, Simon ; Brunstrom, Anna |
Fine-Grained Starlink Throughput Variation Examined With State-Transition Modeling
|
2024 |
| Garrett, Rachael (et al.) |
Five Political Provocations for Soma Design: A Relational Perspective on Emotion and Politics
|
2024 |
| Weijers, Florian ; Jensen, Meiko ; Raab-Düsterhöft, Antje |
Forensic strategies and methods in advanced software-defined networks
|
2024 |
| Nougnanke, Benoit (et al.) |
gPerfIsol: GNN-Based Rate-Limits Allocation for Performance Isolation in Multi-Tenant Cloud
|
2024 |
| Gokan Khan, Michel (et al.) |
Graph Attention Networks and Deep Q-Learning for Service Mesh Optimization: A Digital Twinning Approach
|
2024 |
| Wittek, Stefan ; Herold, Sebastian ; Rausch, Andres |
HICSS-57 Minitrack: AI-based Methods and Applications for Software Engineering
|
2024 |
| Garcia, Johan ; Sundberg, Simon ; Brunstrom, Anna |
Inferring Starlink Physical Layer Transmission Rates Through Receiver Packet Timestamps
|
2024 |
| Ramaswamy, Arunselvan (et al.) |
Information Theoretic Deductions Using Machine Learning with an Application in Sociology
|
2024 |
| Islami, Lejla ; Kitkowska, Agnieszka ; Fischer-Hübner, Simone |
Inter-regional Lens on the Privacy Preferences of Drivers for ITS and Future VANETs
|
2024 |
| Chahed, Hamza (et al.) |
Linux-Based End-Station Design for Seamless TSN Plug-And-Play
|
2024 |
| Rahal, Manal ; Ahmed, Bestoun S. ; Samuelsson, Jörgen |
Machine Learning Data Suitability and Performance Testing Using Fault Injection Testing Framework
|
2024 |
| Sundberg, Simon (et al.) |
Measuring Network Latency from a Wireless ISP: Variations Within and Across Subnets
|
2024 |
| Chemouil, Prosper (et al.) |
Message from the 6GNet 2024 Chairs
|
2024 |
| Khalid, Hifza (et al.) |
Modeling Batch Tasks Using Recurrent Neural Networks in Co-Located Alibaba Workloads
|
2024 |
| Rabitsch, Alexander (et al.) |
Monty: A Framework for Latency-aware Multi-flow ATSSS Scheduling
|
2024 |
| Ahmad, Muhammad Ovais ; Gustavsson, Tomas |
Nexus Between Psychological Safety and Non-Technical Debt in Large-Scale Agile Enterprise Resource Planning Systems Development
|
2024 |
| Ahmad, Muhammad Ovais (et al.) |
Non- Technical Aspects of Technical Debt in the Context of Large-Scale Agile Development: A Qualitative Study
|
2024 |
| Garshasbi Herabad, Mohammadsadeq (et al.) |
Optimal Placement of Edge-to-Cloud AR/VR Services with Reconfiguration Cost
|
2024 |
| Chahed, Hamza ; Kassler, Andreas |
Optimizing TSN Routing, Scheduling, and Task Placement in Virtualized Edge-Compute Platforms
|
2024 |
| Brisch, Fabian (et al.) |
P4-MTAGG - a Framework for Multi-Tenant P4 Network Devices
|
2024 |
| Brisch, Fabian (et al.) |
P4-MTAGG - A Framework for Multi-Tenant P4 Network Devices
|
2024 |
| Jensen, Meiko ; Hansen, Marit ; Hansen, Malte |
Privacy Challenges in the Metaverse
|
2024 |
| Reuben, Jenni ; Alaqra, Ala Sarah |
Private Training Approaches - A Primer
|
2024 |
| Zinno, Stefania (et al.) |
QoE for Interactive Services in 5G Networks: Data-driven Analysis and ML-based Prediction
|
2024 |
| Figueiredo, R. (et al.) |
Quality of Service Performance of Multi-Core Broadband Network Gateways
|
2024 |
| Savelli, Marco (et al.) |
Range-Free Positioning in NB-IoT Networks by Machine Learning
|
2024 |
| Ahmad, Muhammad Ovais ; Gustavsson, Tomas |
Social Sustainability and Large-Scale Agile Software Development
|
2024 |
| Beckman, Claes (et al.) |
Starlink and Cellular Connectivity under Mobility: Drive Testing Across the Arctic Circle
|
2024 |
| Nammouchi, Amal (et al.) |
Towards Explainable Renewable Energy Communities Operations Using Generative AI
|
2024 |
| Maqbool, Bilal ; Jala, Laoa ; Herold, Sebastian |
Towards Using Synthetic User Interaction Data in Digital Healthcare Usability Evaluation
|
2024 |
| Kaynak, Özgür Ozan (et al.) |
TSN Scheduling Robust to Wireless PerformanceUncertainties: A Problem and Model Definition
|
2024 |
| Aupke, Phil ; Nakao, Akihiro ; Kassler, Andreas |
Uncertainty-Aware Forecasting of Computational Load in MECs Using Distributed Machine Learning: A Tokyo Case Study
|
2024 |
| Memarian, Mohsen (et al.) |
Utilizing Hybrid P4 Solutions to Enhance 5G gNB with Data Plane Programmability
|
2024 |
| Memarian, Mohsen (et al.) |
Utilizing Hybrid P4 Solutions to Enhance 5G gNB with Data Plane Programmability
|
2024 |
| Alfredsson, Freysteinn (et al.) |
XDQ: Enhancing XDP with Queuing and Packet Scheduling
|
2024 |
| Khamdamov, Ulugbek ; Usman, Muhammad ; Kim, JongWon |
A Cost-effective High-throughput Testbed for Supporting AI-enabled DevSecOps Services
|
2023 |
| Paiva, Thomas William Do Prado (et al.) |
A First Look at Adaptive Video Streaming over Multipath QUIC with Shared Bottleneck Detection
|
2023 |
| Magnusson, Jonathan (et al.) |
A Second Look at DNS QNAME Minimization
|
2023 |
| Brisch, Fabian (et al.) |
Accelerating Transport Layer Multipath Packet Scheduling for 5G-ATSSS
|
2023 |
| Ahmad, Muhammad Ovais ; Iftikhar, Ahmad ; Iqra, Sadaf Khan |
An Empirical Investigation on Electronic Government Services Continuance and Trust
|
2023 |
| Caso, Giuseppe (et al.) |
An Initial Look into the Performance Evolution of 5G Non-Standalone Networks
|
2023 |
| Palm, Jonas ; Jensen, Meiko |
Analysis of a Consent Management Specification and Prototype Under the GDPR
|
2023 |
| Ma, Yunpeng (et al.) |
Automated and Systematic Digital Twins Testing for Industrial Processes
|
2023 |
| Morel, Victor ; Fischer-Hübner, Simone |
Automating privacy decisions -where to draw the line?
|
2023 |
| Rajiullah, Mohammad (et al.) |
CARL-W: a Testbed for Empirical Analyses of 5G and Starlink Performance
|
2023 |
| Sundberg, Simon ; Garcia, Johan ; Brunstrom, Anna |
Characterizing Wireless Link Throughput with eBPF and Hardware Timestamps
|
2023 |
| Dejaeghere, Jules (et al.) |
Comparing Security in eBPF and WebAssembly
|
2023 |
| Haile, Habtegebreil Kassaye (et al.) |
Copa-D: Delay Consistent Copa for Dynamic Cellular Networks
|
2023 |
| Ahmad, Muhammad Ovais ; Gustavsson, Tomas ; Saeeda, Hina |
Customised Roles in Scrum Teams for the Development of Secure Solution
|
2023 |
| Usman, Muhammad (et al.) |
DESK: Distributed Observability Framework for Edge-Based Containerized Microservices
|
2023 |
| Bayram, Firas (et al.) |
DQSOps: Data Quality Scoring Operations Framework for Data-Driven Applications
|
2023 |
| Fernández, Fátima (et al.) |
Flexible Priority-based Stream Schedulers in QUIC
|
2023 |
| Ramaswamy, Arunselvan |
Gradient Clipping in Deep Learning: A Dynamical Systems Perspective
|
2023 |
| Knoche, Hendrik (et al.) |
Identifying Challenges and Opportunities for Intelligent Data-Driven Health Interfaces to Support Ongoing Care
|
2023 |
| Hansen, Malte ; Gruschka, Nils ; Jensen, Meiko |
Introducing the Concept of Data Subject Rights as a Service Under the GDPR
|
2023 |
| Sinkala, Zipani Tom ; Herold, Sebastian |
Investigating the Effect of Partial and Real-Time Feedback in INMAP Code-to-Architecture Mapping
|
2023 |
| Rubak, Adam ; Taheri, Javid |
Machine Learning for Predictive Resource Scaling of Microservices on Kubernetes Platforms
|
2023 |
| Pulls, Tobias ; Witwer, Ethan |
Maybenot: A Framework for Traffic Analysis Defenses
|
2023 |
| Garcia, Johan (et al.) |
Multi-Timescale Evaluation of Starlink Throughput
|
2023 |
| Saeeda, Hina ; Ahmad, Muhammad Ovais ; Gustavsson, Tomas |
Multivocal Literature Review on Non-Technical Debt in Software Development: An Exploratory Study
|
2023 |
| Akil, Mahdi ; Martucci, Leonardo ; Hoepman, Jaap-Henk |
Non-Interactive Privacy-Preserving Sybil-Free Authentication Scheme in VANETs
|
2023 |
| Pieskä, Marcus ; Brunstrom, Anna ; Kassler, Andreas |
On the Feasibility of Reliable Tunneling: Modelling Delay Imposed by Re-Transmissions
|
2023 |
| Martucci, Leonardo ; Magnusson, Jonathan ; Akil, Mahdi |
On-Campus Hands-On Ethical Hacking Course: Design, Deployment and Lessons Learned
|
2023 |
| Figueiredo, Rubens (et al.) |
Performance Measurements of Broadband Network Gateways
|
2023 |
| Fischer-Hübner, Simone (et al.) |
Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning
|
2023 |
| Ahmad, Muhammad Ovais |
Psychological Safety, Leadership and Non-Technical Debt in Large Scale Agile Software Development
|
2023 |
| Aupke, Phil (et al.) |
PV Power Production and Consumption Estimation with Uncertainty bounds in Smart Energy Grids
|
2023 |
| Nammouchi, Amal ; Kassler, Andreas ; Theocharis, Andreas |
Quantum Machine Learning in Climate Change and Sustainability: A Short Review
|
2023 |
| Nammouchi, Amal (et al.) |
Robust Operation of Energy Communities in the Italian Incentive System
|
2023 |
| Graßhoff, Henrik ; Adamsky, Florian ; Schiffner, Stefan |
Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-App
|
2023 |
| Romare, Piero (et al.) |
Tapping into Privacy: A Study of User Preferences and Concerns on Trigger-Action Platforms
|
2023 |
| Dahlberg, Rasmus ; Pulls, Tobias |
Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache
|
2023 |
| Alaqra, Ala Sarah ; Fischer-Hübner, Simone ; Karegar, Farzaneh |
Transparency of Privacy Risks Using PIA Visualizations
|
2023 |
| Herold, Sebastian ; Sinkala, Zipani Tom |
Using Automatically Recommended Seed Mappings for Machine Learning-Based Code-to-Architecture Mappers
|
2023 |
| Taheri, Javid ; Gördén, Arvid ; Al-Dulaimy, Auday |
Using Machine Learning to Predict the Exact Resource Usage of Microservice Chains
|
2023 |
| Bayram, Firas (et al.) |
A Drift Handling Approach for Self-Adaptive ML Software in Scalable Industrial Processes
|
2022 |
| Hansen, Malte ; Jensen, Meiko |
A Generic Data Model for Implementing Right of Access Requests
|
2022 |
| Redder, Adrian ; Ramaswamy, Arunselvan ; Karl, Hogler |
Age of Information Process under Strongly Mixing Communication - Moment Bound, Mixing Rate and Strong Law
|
2022 |
| Mahjoubi, Ayeh ; Grinnemo, Karl-Johan ; Taheri, Javid |
An Efficient Simulated Annealing-based Task Scheduling Technique for Task Offloading in a Mobile Edge Architecture
|
2022 |
| Usman, Muhammad (et al.) |
An Observability Framework for Containerized Microservices in Edge Infrastructures
|
2022 |
| Kitkowska, Agnieszka ; Högberg, Johan ; Wästlund, Erik |
Barriers to a Well-Functioning Digital Market: Exploring Dark Patterns and How to Overcome Them
|
2022 |
| Nordin, Anna ; Ängeby, Karin ; Fritsch, Lothar |
Body-Area Sensing in Maternity Care: Evaluation of Commercial Wristbands for Pre-birth Stress Management
|
2022 |
| Ahrens, Ken ; Palm, Jonas ; Jensen, Meiko |
CampusTracer: A Privacy-Aware Contact Tracing Protocol for Campus Environments
|
2022 |
| Kousias, Konstantinos (et al.) |
Coverage and performance analysis of 5G non-standalone deployments
|
2022 |
| Mahjoubi, Ayeh ; Grinnemo, Karl-Johan ; Taheri, Javid |
EHGA: A Genetic Algorithm Based Approach for Scheduling Tasks on Distributed Edge-Cloud Infrastructures
|
2022 |
| Mahjoubi, Ayeh ; Grinnemo, Karl-Johan ; Taheri, Javid |
EHGA: A Genetic Algorithm Based Approach for Scheduling Tasks on Distributed Edge-Cloud Infrastructures
|
2022 |
| Garcia, Johan ; Hurtig, Per ; Hammar, Jonas |
Evaluating and Modeling 5G MPTCP Performance
|
2022 |
| Karegar, Farzaneh ; Alaqra, Ala Sarah ; Fischer-Hübner, Simone |
Exploring User-Suitable Metaphors for Differentially Private Data Analyses
|
2022 |
| Alcalá-Marín, Sergi (et al.) |
Global Mobile Network Aggregators: Taxonomy, Roaming Performance and Optimization
|
2022 |
| Sinkala, Zipani Tom ; Herold, Sebastian |
Hierarchical Code-to-Architecture Mapping
|
2022 |
| Aupke, Phil (et al.) |
Impact of Clustering Methods on Machine Learning-based Solar Power Prediction Models
|
2022 |
| Kousias, Konstantinos (et al.) |
Implications of handover events in commercial 5G non-standalone deployments in Rome
|
2022 |
| Amend, Markus (et al.) |
In-network Support for Packet Reordering for Multiaccess Transport Layer Tunneling
|
2022 |
| Rabitsch, Alexander (et al.) |
Integrated Network and End-host Policy Management for Network Slicing
|
2022 |
| HoseinyFarahabady, M. Reza (et al.) |
Low Latency Execution Guarantee Under Uncertainty in Serverless Platforms
|
2022 |
| Garcia, Johan (et al.) |
Measuring and Modeling Aggregate LTE Connection Reliability for Train Operations
|
2022 |
| Wairimu, Samuel ; Fritsch, Lothar |
Modelling privacy harms of compromised personal medical data - Beyond data breach
|
2022 |
| Abbas, Muhammad Tahir (et al.) |
On the Energy-efficient Use of Discontinuous Reception and Release Assistance in NB-IoT
|
2022 |
| Kitkowska, Agnieszka ; Högberg, Johan ; Wästlund, Erik |
Online Terms and Conditions: Improving User Engagement, Awareness, and Satisfaction through UI Design
|
2022 |
| Rechtberger, Vaclav ; Bures, Miroslav ; Ahmed, Bestoun S. |
Overview of Test Coverage Criteria for Test Case Generation from Finite State Machines Modelled as Directed Graphs
|
2022 |
| Sundberg, Simon (et al.) |
Passive Monitoring of Network Latency at High Line Rates
|
2022 |
| Haile, Habtegebreil Kassaye (et al.) |
Performance of QUIC congestion control algorithms in 5G networks
|
2022 |
| Rechtberger, Vaclav (et al.) |
Prioritized Variable-length Test Cases Generation for Finite State Machines
|
2022 |
| Dahlberg, Rasmus (et al.) |
Sauteed Onions: Transparent Associations from Domain Names to Onion Addresses
|
2022 |
| Beckerle, Matthias ; Magnusson, Jonathan ; Pulls, Tobias |
Splitting Hairs and Network Traces: Improved Attacks Against Traffic Splitting as a Website Fingerprinting Defense
|
2022 |
| Chatterjee, Ayan (et al.) |
Testing of machine learning models with limited samples: an industrial vacuum pumping application
|
2022 |
| Ma, Yunpeng (et al.) |
Using Deep Reinforcement Learning for Zero Defect Smart Forging
|
2022 |
| Ahlgren, Bengt ; Grinnemo, Karl-Johan |
ZQTRTT: A Multipath Scheduler for Heterogeneous Traffic in ICNs Based on Zero Queueing Time Ratio
|
2022 |
| Florean, Alexander (et al.) |
A Comparison of Machine Learning-Based Text Classifiers for Mapping Source Code to Architectural Modules
|
2021 |
| Nguyen, Van-Giang (et al.) |
Adaptive and Latency-aware Load Balancing for Control Plane Traffic in the 4G/5G Core
|
2021 |
| Pieskä, Marcus (et al.) |
Adaptive cheapest path first scheduling in a transport-layer multi-path tunnel context
|
2021 |
| Pettersson, K. (et al.) |
AI-based enhancement of access and mobility procedures in cellular networks: An experimental study
|
2021 |
| Figueiredo, Rubens ; Kassler, Andreas |
BNG-HAL: A Unified API for Disaggregated BNGs
|
2021 |
| Hillblom, J. ; Garcia, Johan ; Waldenborg, A. |
Building Efficient Regular Expression Matchers Through GA Optimization with ML Surrogates
|
2021 |
| Ahmad, Muhammad Ovais |
Business Analytics Continuance in Software Development Projects: A Preliminary Analysis
|
2021 |
| Moreno, N. R. (et al.) |
CCID5: An implementation of the BBR congestion control algorithm for DCCP and its impact over multi-path scenarios
|
2021 |
| Maqbool, Bilal ; Herold, Sebastian |
Challenges in Developing Software for the Swedish Healthcare Sector
|
2021 |
| Sykora, Krystof ; Ahmed, Bestoun S. ; Bures, Miroslav |
Code Coverage Aware Test Generation Using Constraint Solver
|
2021 |
| Myklebust, Thor (et al.) |
Data Safety, Sources, and Data Flow in the Offshore Industry
|
2021 |
| Hoseiny Farahabady, M. Reza (et al.) |
Data-Intensive Workload Consolidation in Serverless (Lambda/FaaS) Platforms
|
2021 |
| Tavallaie, Omid ; Taheri, Javid ; Zomaya, Albert Y. |
Design and Optimization of Traffic-Aware TSCH Scheduling for Mobile 6TiSCH Networks
|
2021 |
| Wairimu, Samuel |
e-Health as a Target in Cyberwar: Expecting the Worst
|
2021 |
| Xylouris, Georgios (et al.) |
Experimentation and 5G KPI measurements in the 5GENESIS platforms
|
2021 |
| Rabitsch, Alexander (et al.) |
Extending Network Slice Management to the End-host
|
2021 |
| Tavallaie, Omid ; Taheri, Javid ; Zomaya, Albert Y. |
Game-Theoretic Optimization of the TSCH Scheduling Function for Low-Power IoT Networks
|
2021 |
| Alaqra, Ala Sarah ; Kitkowska, Agnieszka |
Impact of Intrinsic Factors and COVID-19 Pandemic on the Use of Technology
|
2021 |
| Sinkala, Zipani Tom ; Herold, Sebastian |
InMap: Automated Interactive Code-to-Architecture Mapping
|
2021 |
| Sinkala, Zipani Tom ; Herold, Sebastian |
InMap: Automated Interactive Code-to-Architecture Mapping Recommendations
|
2021 |
| Nammouchi, Amal (et al.) |
Integration of AI, IoT and Edge-Computing for Smart Microgrid Energy Management
|
2021 |
| Al-Dulaimy, A. (et al.) |
LOOPS: A Holistic Control Approach for Resource Management in Cloud Computing
|
2021 |
| Nika, Grigor ; Vernescu, Bogdan |
Micro-geometry Effects on the Nonlinear Effective Yield Strength Response of Magnetorheological Fluids
|
2021 |
| Nguyen, Van-Giang (et al.) |
On Auto-scaling and Load Balancing for User-plane Functions in a Softwarized 5G Core
|
2021 |
| Nguyen, Van-Giang (et al.) |
On Auto-scaling and Load Balancing for User-plane Gateways in a Softwarized 5G Network
|
2021 |
| Mahjoubi, Ayeh (et al.) |
Optimal Placement of Recurrent Service Chains on Distributed Edge-Cloud Infrastructures
|
2021 |
| Galletta, Antonino (et al.) |
Overcoming security limitations of Secret Share techniques: The Nested Secret Share
|
2021 |
| Bures, Miroslav (et al.) |
PatrIoT: IoT Automated Interoperability and Integration Testing Framework
|
2021 |
| Fischer-Hübner, Simone ; Lambrinoudakis, C. |
Preface
|
2021 |
| Herold, Sebastian ; Buckley, Jim ; van der Werf, Jan Martijn |
Preface of the 8th Workshop on Software Architecture Erosion and Architectural Consistency (SAEroCon)
|
2021 |
| Wairimu, Samuel ; Momen, Nurul |
Privacy Analysis of COVID-19 Contact Tracing Apps in the EU
|
2021 |
| Dahlberg, Rasmus (et al.) |
Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor
|
2021 |
| Hernandez Benet, Cristian (et al.) |
Providing In-network Support to Coflow Scheduling
|
2021 |
| HoseinyFarahabady, M. Reza (et al.) |
QSpark: Distributed Execution of Batch & Streaming Analytics in Spark Platform
|
2021 |
| Bures, Miroslav (et al.) |
Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting Their Security and Reliability
|
2021 |
| Chahed, Hamza ; Kassler, Andreas |
Software-Defined Time Sensitive Networks Configuration and Management
|
2021 |
| Tavallaie, O. ; Taheri, Javid ; Zomaya, A. Y. |
Throughput Maximization in Low-Power IoT Networks via Tuning the Size of the TSCH Slotframe
|
2021 |
| Matthias, Beckerle ; Chatzopoulou, Argyro ; Fischer-Hübner, Simone |
Towards cybersecurity MOOC certification
|
2021 |
| Sinkala, Zipani Tom ; Herold, Sebastian |
Towards Hierarchical Code-to-Architecture Mapping Using Information Retrieval
|
2021 |
| Sundberg, Simon ; Brunstrom, Anna |
Using BPF to Measure Latency at High LinkSpeeds
|
2021 |
| Afzal, Zeeshan ; Brunström, Anna ; Lindskog, Stefan |
Using Features of Encrypted Network Traffic to Detect Malware
|
2021 |
| Karegar, Farzaneh ; Fischer-Hübner, Simone |
Vision: A Noisy Picture or a Picker Wheel to Spin? Exploring Suitable Metaphors for Differentially Private Data Analyses
|
2021 |
| Haile, Habtegebreil Kassaye (et al.) |
WIP: Leveraging QUIC for a Receiver-driven BBR for Cellular Networks
|
2021 |
| Nguyen, Van-Giang (et al.) |
A Deployable Containerized 5G Core Solution for Time Critical Communication in Smart Grid
|
2020 |
| Kramer, Z. (et al.) |
A Lightweight Performance Enhancing Proxy for Evolved Protocols and Networks
|
2020 |
| Richardson, Omar ; Garcia, Johan |
A Novel Flow-level Session Descriptor with Application to OS and Browser Identification
|
2020 |
| Gokan Khan, Michel (et al.) |
A Performance Modelling Approach for SLA-Aware Resource Recommendation in Cloud Native Network Functions
|
2020 |
| Momen, Nurul ; Bock, Sven ; Fritsch, Lothar |
Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android
|
2020 |
| Ahmed, Bestoun S. ; Gargantin, Angelo ; Bures, Miroslav |
An Automated Testing Framework For Smart TVapps Based on Model Separation
|
2020 |
| Herold, Sebastian |
An initial study on the association between architectural smells and degradation
|
2020 |
| Khatouni, A. S. (et al.) |
An open dataset of operational mobile networks
|
2020 |
| Momen, Nurul ; Fritsch, Lothar |
App-generated digital identities extracted through Androidpermission-based data access - a survey of app privacy
|
2020 |
| Richter, Jan (et al.) |
Avocado: Open-Source Flexible ConstrainedInteraction Testing for Practical Application
|
2020 |
| Garcia, Johan ; Vehkajärvi, Tobias |
Boot Log Anomaly Detection with K-Seen-Before
|
2020 |
| Haque, Mubin U. ; Iwaya, Leonardo H ; Ali Babar, M. |
Challenges in Docker Development: A Large-scale Study Using Stack Overflow
|
2020 |
| Bisztray, Tamas (et al.) |
Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics
|
2020 |
| Garcia, Johan ; Korhonen, Topi |
DIOPT: Extremely Fast Classification Using Lookups and Optimal Feature Discretization
|
2020 |
| Bock, Sven ; Momen, Nurul |
Einfluss einer Datenschutzskala auf das Auswahlverhalten in einem App-Markt.
|
2020 |
| Kitkowska, Agnieszka (et al.) |
Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affe
|
2020 |
| Warner, Mark (et al.) |
Evaluating 'Prefer not to say' Around Sensitive Disclosures
|
2020 |
| Nguyen, Van-Giang (et al.) |
Experimental Evaluation of a Virtualized 5G Core for Smart Grid Applications
|
2020 |
| Kitkowska, Agnieszka (et al.) |
Facilitating Privacy Attitudes & Behaviors with Affective Visual Design
|
2020 |
| Abbas, Muhammad Tahir (et al.) |
Guidelines for an Energy Efficient Tuning of the NB-IoT Stack
|
2020 |
| Fritsch, Lothar |
Identification collapse - contingency in Identity Management
|
2020 |
| Fritsch, Lothar |
Identity Management as a target in cyberwar
|
2020 |
| Kitkowska, Agnieszka ; Wästlund, Erik ; Martucci, Leonardo |
(In)escapable Affect? Exploring Factors Influencing Privacy-RelatedBehavioral Intentions
|
2020 |
| Rajiullah, Mohammad (et al.) |
Mobile Network Performance during the COVID-19 Outbreak from a Testbed Perspective
|
2020 |
| Voronkov, Artem ; Martucci, Leonardo |
Natural vs. Technical Language Preference and its Impact on Firewall Configuration
|
2020 |
| Momen, Nurul ; Bock, S. |
Neither Do I Want to Accept, nor Decline; Is There an Alternative?
|
2020 |
| Bock, Sven ; Momen, Nurul |
Nudging the User with Privacy Indicator: A Study on the App Selection Behavior of the User
|
2020 |
| Nguyen, Van-Giang (et al.) |
On the Use of a Virtualized 5G Core for Time Critical Communication in Smart Grid
|
2020 |
| Ahmed, Bestoun S. |
Open-source Defect Injection Benchmark Testbed for the Evaluation of Testing
|
2020 |
| Schlehahn, Eva (et al.) |
Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics
|
2020 |
| Sharma, Yogesh (et al.) |
Performance benchmarking of virtualized network functions to correlate key performance metrics with system activity
|
2020 |
| Toresson, Ludwig (et al.) |
PISA: A Privacy Impact Self-assessment App Using Personas to Relate App Behavior to Risks to Smartphone Users
|
2020 |
| Klima, Matej (et al.) |
Quality and Reliability Metrics for IoT Systems: A Consolidated View
|
2020 |
| Fischer-Hübner, Simone (et al.) |
Quality Criteria for Cyber Security MOOCs
|
2020 |
| Pettersson, John Sören |
The Utility of Digitally Supported Manual Interactive Mockups
|
2020 |
| Herold, Sebastian (et al.) |
Towards Improving Software Architecture Degradation Mitigation by Machine Learning
|
2020 |
| Alaqra, Ala Sarah (et al.) |
Using PAPAYA for eHealth – Use Case Analysis and Requirements
|
2020 |
| Bagnato, A. (et al.) |
Workshop on privacy challenges in public and private organizations
|
2020 |
| Amend, Markus (et al.) |
A Framework for Multiaccess Support for Unreliable Internet Traffic Using Multipath DCCP
|
2019 |
| Bauschert, Thomas (et al.) |
A matheuristic for green and robust 5G virtual network function placement
|
2019 |
| Hatamian, Majid (et al.) |
A Multilateral Privacy Impact Analysis Method for Android Apps
|
2019 |
| Theocharis, Andreas ; Popov, Marjan |
A piece-wise linearized transformer winding model for the analysis of internal voltage propagation
|
2019 |
| Dahlberg, Rasmus (et al.) |
Aggregation-Based Certificate Transparency Gossip
|
2019 |
| Ahmad, Muhammad Ovais |
Agile methods and cyber-physical systems development: A review with preliminary analysis
|
2019 |
| Boodaghian Asl, Arsineh ; Gokan Khan, Michel |
An Empirical Study On GUI-ii Interview Methods In Participatory Design
|
2019 |
| Ahmad, Muhammad Ovais |
Antecedents To Achieve Kanban Optimum Benefits In Software Companies
|
2019 |
| HoseinyFarahabady, MohammadReza (et al.) |
Dynamic Control of CPU Cap Allocations in Stream Processing and Data-Flow Platforms
|
2019 |
| Iwaya, Leonardo H (et al.) |
E-Consent for Data Privacy: Consent Management for Mobile Health Technologies in Public Health Surveys and Disease Surveillance
|
2019 |
| Veseli, Fatbardh (et al.) |
Engineering privacy by design: Lessons from the design and implementation of an identity wallet platform
|
2019 |
| Santos, Ricardo (et al.) |
Fast Steerable Wireless Backhaul Reconfiguration
|
2019 |
| Hernandez Benet, Cristian ; Kassler, Andreas |
FlowDyn: Towards a Dynamic Flowlet Gap Detection using Programmable Data Planes
|
2019 |
| Yedugundla, Kiran ; Hurtig, Per ; Brunström, Anna |
Handling Packet Losses in Cloud-Based Application Traffic
|
2019 |
| Colesky, Michael (et al.) |
Helping Software Architects Familiarize with the General Data Protection Regulation
|
2019 |
| Liu, Zihao ; Halonen, Raija ; Ahmad, Muhammad Ovais |
ICT support supporting healting healthcare for chinese elderl thcare for chinese elderly at home: perspectives of informal caregivers and professionalsICT suppor t supporting heal ting healthcare for chinese elderl thcare for chinese elderly at home: perspectives of informal caregivers and professionals
|
2019 |
| Abbas, Muhammad Tahir (et al.) |
Impact of Tunable Parameters in NB-IoT Stack onthe Energy Consumption
|
2019 |
| Garcia, Johan (et al.) |
Interactions Between Train Velocity andCellular Link Throughput - An Extensive Study
|
2019 |
| Bhamare, Deval (et al.) |
IntOpt: In-Band Network Telemetry Optimization for NFV Service Chain Monitoring
|
2019 |
| Ahlgren, Bengt (et al.) |
Latency-aware Multipath Scheduling inInformation-centric Networks
|
2019 |
| Sundberg, Simon ; Garcia, Johan |
Localization Performance for eNodeBs using Solitary and Fused RSS-Modeling Approaches
|
2019 |
| Parichehreh, Ali (et al.) |
LTE as a Road Toward 5G: QoS Analysis in Mobility Scenario Using The Monroe Platform
|
2019 |
| Garcia, Johan ; Sundberg, Simon ; Brunstrom, Anna |
LTE for Trains - Performance Interactions Examined with DL, ML and Resampling
|
2019 |
| Tavallaie, O. ; Taheri, Javid ; Zomaya, A. Y. |
MARA: Mobility-Aware Rate Adaptation for Low Power IoT Networks Using Game Theory
|
2019 |
| Shamseddine, Maha (et al.) |
Mitigating Rogue Node Attacks in Edge Computing
|
2019 |
| Galletta, A. ; Taheri, Javid ; Villari, M. |
On the applicability of secret share algorithms for saving data on iot, edge and cloud devices
|
2019 |
| Fischer, Andreas ; Bhamare, Deval ; Kassler, Andreas |
On the Construction of Optimal Embedding Problems for Delay-Sensitive Service Function Chains
|
2019 |
| Alizadeh Noghani, Kyoomars ; Kassler, Andreas ; Taheri, Javid |
On the Cost-Optimality Trade-off for Service Function Chain Reconfiguration
|
2019 |
| Nguyen, Van-Giang (et al.) |
On the Use of 5G for Inter-substation GOOSE Transmission in Smart Grid
|
2019 |
| Khoshkholghi, Mohammad Ali (et al.) |
Optimized Service Chain Placement Using Genetic Algorithm
|
2019 |
| Nakamura, M. (et al.) |
Performance evaluation of prefetching algorithm for real-time edge content delivery in 5G system
|
2019 |
| Høiland-Jørgensen, Toke ; Hurtig, Per ; Brunström, Anna |
PoliFi: Airtime Policy Enforcement for WiFi
|
2019 |
| Al-Dulaimy, Auday (et al.) |
Privacy-Aware Job Submission in the Cloud
|
2019 |
| Vestin, Jonathan (et al.) |
Programmable Event Detection for In-Band Network Telemetry
|
2019 |
| Tavallaie, O. ; Taheri, Javid ; Zomaya, A. Y. |
QCF: QoS-Aware Communication Framework for Real-Time IoT Services
|
2019 |
| Haile, Habtegebreil Kassaye (et al.) |
Rate Change Detection in Stationary Cellular Nodes
|
2019 |
| Haile, Habtegebreil Kassaye ; Hurtig, Per ; Grinnemo, Karl-Johan |
Rate Measurement Over Short Time Scales inStationary Cellular Receivers
|
2019 |
| Alaqra, Ala Sarah ; Wästlund, Erik |
Reciprocities or Incentives?: Understanding Privacy Intrusion Perspectives and Sharing Behaviors
|
2019 |
| Alizadeh Noghani, Kyoomars ; Kassler, Andreas |
Reconfiguration of Service Function Chains: Trade-off between Optimality and Effort
|
2019 |
| Ahmad, Muhammad Ovais |
Software factory project for enhancement of student experiential learning
|
2019 |
| Zamli, K. Z. (et al.) |
Software module clustering based on the fuzzy adaptive teaching learning based optimization algorithm
|
2019 |
| Boodaghian Asl, Arsineh ; Gokan Khan, Michel |
Studying the effect of online medical applications on patients healing time and doctors utilization using discrete event simulation
|
2019 |
| Voronkov, Artem ; Martucci, Leonardo ; Lindskog, Stefan |
System Administrators Prefer Command Line Interfaces, Don’t They?: An Exploratory Study of Firewall Interfaces
|
2019 |
| Ahmed, Bestoun S. ; Bures, M. |
Testing of Smart TV applications: Key ingredients, challenges and proposed solutions
|
2019 |
| Murmann, Patrick ; Reinhardt, Delphine ; Fischer-Hübner, Simone |
To Be, or Not to Be Notified: Eliciting Privacy Notification Preferences for Online mHealth Services
|
2019 |
| Ahmed, Bestoun S. (et al.) |
Towards an Automated Unified Framework to Run Applications for Combinatorial Interaction Testing
|
2019 |
| Langlet, Jonatan ; Kassler, Andreas ; Bhamare, Deval |
Towards Neural Network Inference on Programmable Switches
|
2019 |
| Afzal, Zeeshan (et al.) |
Using Partial Signatures in Intrusion Detection for Multipath TCP
|
2019 |
| Oljira, Dejene Boru (et al.) |
Validating the Sharing Behavior and Latency Characteristics of the L4S Architecture
|
2019 |
| Rajiullah, Mohammad (et al.) |
Web Experience in Mobile Networks: Lessons from Two Million Page Visits
|
2019 |
| Arvidsson, Åke (et al.) |
Web metrics for the next generation performance enhancing proxies
|
2019 |
| Angulo, Julio ; Ortlieb, Martin |
“WTH..!?!” Experiences, reactions, and expectations related to online privacy panic situations
|
2019 |
| Koumaras, Harilaos (et al.) |
5GENESIS: The Genesis of a flexible 5G Facility
|
2018 |
| Garcia, Johan |
A Fragment Hashing Approach for Scalable and Cloud-Aware Network File Detection
|
2018 |
| Alizadeh Noghani, Kyoomars ; Ghazzai, Hakim ; Kassler, Andreas |
A Generic Framework for Task Offloading in mmWave MEC Backhaul Networks
|
2018 |
| Sinkala, Zipani Tom ; Blom, Martin ; Herold, Sebastian |
A mapping study of software architecture recovery for software product lines
|
2018 |
| Fischer-Hübner, Simone (et al.) |
A MOOC on Privacy by Design and the GDPR
|
2018 |
| Rabitsch, Alexander ; Hurtig, Per ; Brunström, Anna |
A Stream-Aware Multipath QUIC Scheduler for Heterogeneous Paths
|
2018 |
| Grazia, Carlo Augusto (et al.) |
Adapting TCP Small Queues for IEEE 802.11 Networks
|
2018 |
| Mayer, Peter ; Volkamer, Melanie |
Addressing misconceptions about password security effectively
|
2018 |
| Fritsch, Lothar ; Fischer-Hübner, Simone |
Applications of Privacy and Security Research in the Upcoming Battlefield of Things
|
2018 |
| Gokan Khan, Michel (et al.) |
Automated Analysis and Profiling of VirtualNetwork Functions: the NFV-Inspector Approach
|
2018 |
| Garcia, Johan ; Brunström, Anna |
Clustering-based separation of media transfers in DPI-classified cellular video and VoIP traffic
|
2018 |
| Abrahamsson, Henrik (et al.) |
Connected Vehicles in Cellular Networks: Multi-access versus Single-access Performance
|
2018 |
| Nasim, Robayet (et al.) |
Cost-Efficient Resource Scheduling under QoS Constraints for Geo-Distributed Data Centers
|
2018 |
| Garcia, Johan |
Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files
|
2018 |
| Garcia, Johan ; Korhonen, Topi |
Efficient Distribution-Derived Features for High-Speed Encrypted Flow Classification
|
2018 |
| Özgü, Alay (et al.) |
End to End 5G Measurements with MONROE: Challenges and Opportunities
|
2018 |
| Alizadeh Noghani, Kyoomars ; Kassler, Andreas ; Sankar Gopannan, Prem |
EVPN/SDN Assisted Live VM Migration between Geo-Distributed Data Centers
|
2018 |
| Mandalari, Anna Maria (et al.) |
Experience: Implications of Roaming in Europe
|
2018 |
| Vestin, Jonathan ; Kassler, Andreas ; Akerberg, Johan |
FastReact: In-Network Control And Caching For Industrial Control Networks Using Programmable Data Planes
|
2018 |
| Länger, Thomas (et al.) |
HCI patterns for cryptographically equipped cloud services
|
2018 |
| Ahlgren, Bengt (et al.) |
ICN Congestion Control for Wireless Links
|
2018 |
| Hurtig, Per (et al.) |
Impact of TCP BBR on CUBIC Traffic: A mixed workload evaluation
|
2018 |
| Pieskä, Marcus (et al.) |
Improving TCP Fairness over Latency Controlled 5G mmWave Communication Links
|
2018 |
| Hatamian, Majid (et al.) |
“It’s shocking!": Analysing the impact and reactions to the A3: Android apps behaviour analyser
|
2018 |
| Lenhard, Jörg (et al.) |
Lessons Learned from Evaluating Workflow Management Systems
|
2018 |
| Oljira, Dejene Boru (et al.) |
MDTCP: Towards a Practical Multipath Transport Protocol for Telco Cloud Datacenters
|
2018 |
| Parichehreh, Ali ; Alfredsson, Stefan ; Brunström, Anna |
Measurement Analysis of TCP Congestion Control Algorithms in LTE Uplink
|
2018 |
| Iwaya, Leonardo H (et al.) |
mHealth: A Privacy Threat Analysis for Public Health Surveillance Systems
|
2018 |
| Hernandez Benet, Cristian (et al.) |
MP-HULA: Multipath transport aware load balancing using programmable data planes
|
2018 |
| Gokan Khan, Michel (et al.) |
NFV-Inspector: A Systematic Approach to Profile and Analyze Virtual Network Functions
|
2018 |
| Nguyen, Van-Giang (et al.) |
On Load Balancing for a Virtual and Distributed MME in the 5G Core
|
2018 |
| Johansson, David ; Kassler, Andreas ; Taheri, Javid |
On the Energy Cost of Robustness and Resiliency for Virtual Network Function Placement
|
2018 |
| Santos, Ricardo ; Ghazzai, Hakim ; Kassler, Andreas |
Optimal Steerable mmWave Mesh Backhaul Reconfiguration
|
2018 |
| Iwaya, Leonardo H. (et al.) |
Overview of Privacy Challenges in Mobile Health Data Collection Systems
|
2018 |
| Høiland-Jørgensen, Toke ; Täht, Dave ; Morton, Jonathan |
Piece of CAKE: A Comprehensive Queue Management Solution for Home Gateways
|
2018 |
| Kosta, E. (et al.) |
Preface
|
2018 |
| Zeljkovic, Ensar (et al.) |
Proactive Access Point Driven Handovers in IEEE 802.11 Networks
|
2018 |
| Kitkowska, Agnieszka |
Reaching Beyond Borders: Investigating Differences in Privacy Harms Concerns
|
2018 |
| Koslowski, Konstantin (et al.) |
SDN Orchestration to Optimize Meshed Millimeter-Wave Backhaul Networks for MEC-enhanced eMBB Use Cases
|
2018 |
| Chiaro, Pasquale (et al.) |
Secure and privacy-friendly storage and data processing in the cloud
|
2018 |
| Abrahamsson, Henrik (et al.) |
Selecting Operator in 3G/4G Networks for Time-Critical C-ITS Applications
|
2018 |
| Afzal, Zeeshan (et al.) |
Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications
|
2018 |
| Pulls, Tobias ; Dahlberg, Rasmus |
Steady: A Simple End-to-End Secure Logging System
|
2018 |
| Kühlewind, Mirja (et al.) |
TAPS: an abstract application interface for QUIC
|
2018 |
| Kosta, Eleni (et al.) |
The Smart World Revolution
|
2018 |
| Hoseinyfarahabady, M. Reza (et al.) |
Toward designing a dynamic CPU cap manager for timely dataflow platforms
|
2018 |
| Garcia, Johan (et al.) |
Towards Video Flow Classification at a Million Encrypted Flows Per Second
|
2018 |
| Ghazzai, Hakim (et al.) |
Trajectory Optimization for Cooperative Dual-Band UAV Swarms
|
2018 |
| Momen, Nurul |
Turning the Table Around: Monitoring App Behavior
|
2018 |
| Murmann, Patrick |
Usable Transparency for Enhancing Privacy in Mobile Health Apps
|
2018 |
| Karegar, Farzaneh (et al.) |
User Evaluations of an App Interface for Cloud-Based Identity Management
|
2018 |
| Dahlberg, Rasmus ; Pulls, Tobias |
Verifiable Light-Weight Monitoring for Certificate Transparency Logs
|
2018 |
| Gustiené, Prima |
Visualization for Open Access: A Case Study of Karlstad University and the University of Makerere in Uganda
|
2018 |
| Garcia, Johan |
A clustering-based analysis of DPI-labeled video flow characteristics in cellular networks
|
2017 |
| Hoseiny Farahabady, Mohammad Reza (et al.) |
A Dynamic Resource Controller for a Lambda Architecture
|
2017 |
| Lenhard, Jörg ; Fritsch, Lothar ; Herold, Sebastian |
A Literature Study on Privacy Patterns Research
|
2017 |
| Oljira, Dejene Boru (et al.) |
A Model for QoS-Aware VNF Placement and Provisioning
|
2017 |
| Hurtig, Per (et al.) |
A NEAT Approach to Mobile Communication
|
2017 |
| Santos, Ricardo (et al.) |
A NEAT framework for application-awareness in SDN environments
|
2017 |
| Bozakov, Zdravko (et al.) |
A NEAT framework for enhanced end-host integration in SDN environments
|
2017 |
| Weinrank, Felix (et al.) |
A NEAT Way to Browse the Web
|
2017 |
| Harrer, Simon (et al.) |
A Pattern Language for Workflow Engine Conformance and Performance Benchmarking
|
2017 |
| Nasim, Robayet ; Kassler, Andreas |
A Robust Tabu Search Heuristic for VM Consolidation under Demand Uncertainity in Virtualized Datacenters
|
2017 |
| Mayer, Peter ; Kirchner, Jan ; Volkamer, Melanie |
A second look at password composition policies in the wild: Comparing samples from 2010 and 2016
|
2017 |
| Kulyk, Oksana (et al.) |
Advancing Trust Visualisations for Wider Applicability and User Acceptance
|
2017 |
| Reuben, Jenni ; Fischer-Hübner, Simone |
An Authorization Model for Data Modeled using Semantic Web Technologies
|
2017 |
| Lenhard, Jörg (et al.) |
Are Code Smell Detection Tools Suitable For Detecting Architecture Degradation?
|
2017 |
| Karegar, Farzaneh (et al.) |
Assessments of a Cloud-Based Data Wallet for Personal Identity Management
|
2017 |
| Alizadeh Noghani, Kyoomars (et al.) |
Automating Ethernet VPN deployment in SDN-based Data Centers
|
2017 |
| Fida, Mah-Rukh (et al.) |
Demo: experimentation in controlled and operational LTE settings with FLEX-MONROE
|
2017 |
| Fritsch, Lothar ; Momen, Nurul |
Derived Partial Identities Generated from App Permissions
|
2017 |
| Neumann, Stephan ; Reinheimer, Benjamin Maximmilian ; Volkamer, Melanie |
Don’t Be Deceived: The Message Might Be Fake
|
2017 |
| Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie |
Election-Dependent Security Evaluation of Internet Voting Schemes
|
2017 |
| Høiland-Jørgensen, Toke (et al.) |
Ending the Anomaly: Achieving Low Latency and Airtime Fairness in WiFi
|
2017 |
| Garcia, Johan ; Alfredsson, Stefan ; Brunström, Anna |
Examining cellular access systems on trains: Measurements and change detection
|
2017 |
| Alay, Özgü (et al.) |
Experience: An open platform for experimentation with commercial mobile broadband networks
|
2017 |
| Høiland-Jørgensen, Toke (et al.) |
Flent: The FLExible Network Tester
|
2017 |
| Momen, Nurul (et al.) |
How much Privilege does an App Need? Investigating Resource Usage of Android Apps
|
2017 |
| Agapi, Mesodiakaki ; Zola, Enrica ; Kassler, Andreas |
Joint User Association and Backhaul Routing for Green 5G Mesh Millimeter Wave Backhaul Networks
|
2017 |
| Vestin, Jonathan ; Kassler, Andreas |
Low frequency assist for mmWave backhaul - the case for SDN resiliency mechanisms
|
2017 |
| Beckman, Claes (et al.) |
On the Impact of Velocity on the Train-to-Earth MIMO Propagation Channel: Statistical Observations and Qualitative Analysis
|
2017 |
| Atxutegi, Eneko (et al.) |
On the move with TCP in current and future mobile networks
|
2017 |
| Hernandez Benet, Cristian (et al.) |
OpenStackEmu - A Cloud Testbed Combining Network Emulation with OpenStack and SDN
|
2017 |
| Fritsch, Lothar |
Partial commitment – "Try before you buy" and "Buyer’s remorse" for personal data in Big Data & Machine learning
|
2017 |
| Hernandez Benet, Cristian (et al.) |
Policy-based routing and load balancing for EVPN-based data center interconnections
|
2017 |
| Fritsch, Lothar |
Privacy dark patterns in identity management
|
2017 |
| Yedugundla, Kiran ; Hurtig, Per ; Brunström, Anna |
Probe or Wait: Handling tail losses using Multipath TCP
|
2017 |
| Taheri, Javid ; Cho, Daewoong ; Zomaya, Albert Y |
Real-Time Virtual Network Function (VNF) Migration toward Low Network Latency in Cloud Environments
|
2017 |
| Pieskä, Marcus ; Kassler, Andreas |
Reducing the Latency of TCP for 5G mmWave Links
|
2017 |
| Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie |
Reliable behavioural factors in the information security context
|
2017 |
| Peón-Quirós, Miguel (et al.) |
Results from Running an Experiment as a Service Platform for Mobile Networks
|
2017 |
| Vestin, Jonathan ; Kassler, Andreas |
SDN enabled resiliency in LTE assisted small cell mmWave backhaul networks
|
2017 |
| Alizadeh Noghani, Kyoomars ; Kassler, Andreas |
SDN Enhanced Ethernet VPN for Data Center Interconnect
|
2017 |
| Bernhard, David ; Oksana, Kulyk ; Volkamer, Melanie |
Security proofs for Participation privacy, receipt-freeness and ballot privacy for the helios voting scheme
|
2017 |
| Kulyk, Oksana ; Reinheimer, Benjamin Maximillian ; Volkamer, Melanie |
Sharing Information with Web Services: A Mental Model Approach in the Context of Optional Information
|
2017 |
| Santos, Ricardo ; Kassler, Andreas |
Small Cell Wireless Backhaul Reconfiguration Using Software-Defined Networking
|
2017 |
| Khatouni, Ali Safari (et al.) |
Speedtest-like Measurements in 3G/4G Networks: the MONROE Experience
|
2017 |
| Pieskä, Marcus ; Kassler, Andreas |
TCP Performance over 5G mmWave Links - Tradeoff between Capacity and Latency
|
2017 |
| Greschbach, Benjamin (et al.) |
The Effect of DNS on Tor´s Anonymity
|
2017 |
| Knodel, Jens ; Buckley, Jim ; Herold, Sebastian |
The need for an open corpus of software architecture descriptions
|
2017 |
| Momen, Nurul ; Piekarska, Marta |
Towards Improving Privacy Awareness Regarding Apps’ Permissions
|
2017 |
| Kostopoulos, Alexandros (et al.) |
Towards the Adoption of Secure Cloud Identity Services
|
2017 |
| Garcia, Johan (et al.) |
Train Velocity and Data Throughput: A Large Scale LTE Cellular Measurements Study
|
2017 |
| Santos, Ricardo (et al.) |
Turning the knobs on OpenFlow-based resiliency in mmWave small cell meshed networks
|
2017 |
| Rajiullah, Mohammad (et al.) |
Understanding Multistreaming for Web Traffic: An Experimental Study
|
2017 |
| Mesodiakaki, Agapi ; Zola, Enrica ; Kassler, Andreas |
User Association in 5G Heterogeneous Networks with Mesh Millimeter Wave Backhaul Links
|
2017 |
| Cho, Daewoong (et al.) |
Virtual Network Function Placement: Towards Minimizing Network Latency and Lead Time
|
2017 |
| Karegar, Farzaneh ; Pulls, Tobias ; Fischer-Hübner, Simone |
Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This?
|
2017 |
| Ferme, Vincenzo (et al.) |
Workflow Management Systems Benchmarking: Unfulfilled Expectations and Lessons Learned
|
2017 |
| Ahmed, Bestoun S. ; Gambardella, L. M. ; Zamli, K. Z. |
A new approach to speed up combinatorial search strategies using stack and hash table
|
2016 |
| Marotta, Antonio ; Kassler, Andreas |
A Power Efficient and Robust Virtual Network Functions Placement Problem
|
2016 |
| Santos, Ricardo ; Kassler, Andreas |
A SDN Controller Architecture for Small Cell Wireless Backhaul using a LTE Control Channel
|
2016 |
| Afzal, Zeeshan (et al.) |
A Wireless Intrusion Detection System for 802.11 networks
|
2016 |
| Gilje Jaatun, Martin (et al.) |
Accountability Through Transparency for Cloud Customers
|
2016 |
| Oljira, Dejene Boru (et al.) |
Analysis of Network Latency in Virtualized Environments
|
2016 |
| Reuben, Jenni ; Martucci, Leonardo A ; Fischer-Hübner, Simone |
Automated Log Audits for Privacy Compliance Validation: A Literature Survey
|
2016 |
| Robert, Rémi (et al.) |
Behaviour of common TCP variants over LTE
|
2016 |
| Kulyk, Oksana (et al.) |
Coercion-resistant Proxy Voting
|
2016 |
| Kulyk, Oksana ; Volkamer, Melanie |
Efficiency Comparison of Various Approaches in E-Voting Protocols
|
2016 |
| Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna |
Efficient Scheduling to Reduce Latency for Signaling Traffic using CMT-SCTP
|
2016 |
| Dahlberg, Rasmus ; Pulls, Tobias ; Peeters, Roel |
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs
|
2016 |
| Kulyk, Oksana (et al.) |
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do
|
2016 |
| Mesodiakaki, Agapi (et al.) |
Energy Efficient Line-of-Sight Millimeter Wave Small Cell Backhaul: 60, 70, 80 or 140 GHz?
|
2016 |
| Garcia, Johan ; Alfredsson, Stefan ; Brunström, Anna |
Estimating data transfer capacity for intermittent connectivity: A transport aware model
|
2016 |
| Herold, Sebastian ; Blom, Martin ; Buckley, Jim |
Evidence in Architecture Degradation and Consistency Checking Research: Preliminary Results from a Literature Review
|
2016 |
| Garcia, Johan ; Hurtig, Per |
Getting What You Want When You Want It: Deterministic Network Emulation
|
2016 |
| Marotta, Antonio ; Kassler, Andreas |
Green Virtual Network Functions Placement Under Uncertainty Constraints
|
2016 |
| Winter, Philipp (et al.) |
Identifying and characterizing Sybils in the Tor network
|
2016 |
| Peeters, Roel ; Pulls, Tobias |
Insynd: Improved Privacy-Preserving Transparency Logging
|
2016 |
| Kulyk, Oksana (et al.) |
Introducing Proxy Voting to Helios
|
2016 |
| Oljira, Dejene Boru (et al.) |
Measurement and Analysis of Network Performance in Virtualized Environments
|
2016 |
| Alay, Özgü (et al.) |
Measuring and Assessing Mobile Broadband Networks with MONROE
|
2016 |
| Høiland-Jørgensen, Toke (et al.) |
Measuring Latency Variation in the Internet
|
2016 |
| Hernandez Benet, Cristian ; Alizadeh Noghani, Kyoomars ; Kassler, Andreas |
Minimizing Live VM Migration Downtime Using OpenFlow based Resiliency Mechanisms
|
2016 |
| Alay, Özgü (et al.) |
MONROE, a distributed platform to measure and assess mobile broadband networks: demo
|
2016 |
| Papastergiou, Georgios (et al.) |
On the Cost of Using Happy Eyeballs for Transport Protocol Selection
|
2016 |
| Geiger, Matthias (et al.) |
On the Evolution of BPMN 2.0 Support and Implementation
|
2016 |
| Iwaya, L H (et al.) |
Ontology-based Obfuscation and Anonymisation for Privacy: A Case Study on Healthcare
|
2016 |
| Karegar, Farzaneh (et al.) |
Opportunities and challenges of CREDENTIAL: Towards a metadata-privacy respecting identity provider
|
2016 |
| Nasim, Robayet ; Taheri, Javid ; Kassler, Andreas |
Optimizing Virtual Machine Consolidation in Virtualized Datacenters Using Resource Sensitivity
|
2016 |
| Luz, Saturnino ; Kane, Bridget |
Perspectives on intelligent systems support for multidisciplinary medical teams
|
2016 |
| Reuben, Jenni (et al.) |
Privacy Impact Assessment Template for Provenance
|
2016 |
| Samani, Hamid R. Dehghani ; Taheri, Javid ; Zomaya, Albert Y. |
RBT-MF: a Distributed Rubber Band Technique for Maximum Flow Problem in Azure
|
2016 |
| Vestin, Jonathan ; Kassler, Andreas |
Resilient SDN based Small Cell Backhaul Networks using mm Wave Bands
|
2016 |
| Ruebsamen, Thomas ; Pulls, Tobias ; Reich, Christoph |
Security and Privacy Preservation of Evidence in Cloud Accountability Audits
|
2016 |
| Alaqra, Ala (et al.) |
Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario
|
2016 |
| Eklund, Johan ; Grinnemo, Karl-Johan ; Brunström, Anna |
Stream-aware Scheduling to Improve Latency for Signaling Traffic using CMT-SCTP
|
2016 |
| Atxutegi, Eneko (et al.) |
TCP behaviour in LTE: impact of flow start-up and mobility
|
2016 |
| Hassan, Mahdi Mohammad (et al.) |
Testability and software performance: A systematic mapping study
|
2016 |
| Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin |
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
|
2016 |
| Grinnemo, Karl-Johan (et al.) |
Towards a Flexible Internet Transport Layer Architecture
|
2016 |
| Fischer-Hübner, Simone (et al.) |
Transparency, Privacy and Trust: Technology for Tracking and Controlling my Data Disclosures – Does this work?
|
2016 |
| Taheri, Javid ; Zomaya, Albert ; Kassler, Andreas |
vmBBThrPred: A Black-Box Throughput Predictor for Virtual Machines in Cloud Environments
|
2016 |
| Gutmann, Andreas (et al.) |
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology
|
2016 |
| Grinnemo, Karl-Johan ; Brunström, Anna |
A First Study on Using MPTCP to Reduce Latency for Cloud Based Mobile Applications
|
2015 |
| Sepasian, Neda ; Kumar, Kundan ; Breeuwer, Marcel |
A geometrical approach to find corresponding patches in 3D medical surfaces
|
2015 |
| Volkamer, Melanie (et al.) |
A Socio-Technical Investigation into Smartphone Security
|
2015 |
| Kolb, Stefan ; Lenhard, Jörg ; Wirtz, Guido |
Application Migration Effort in the Cloud: The Case of Cloud Platforms
|
2015 |
| Blom, Martin ; Hassan, Mohammad Mahdi |
Applying clustering to analyze opinion diversity
|
2015 |
| Afzal, Zeeshan ; Lindskog, Stefan |
Automated Testing of IDS Rules
|
2015 |
| Pulls, Tobias ; Peeters, Roel |
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
|
2015 |
| Voronkov, Artem ; Lindskog, Stefan ; Martucci, Leonardo |
Challenges in Managing Firewalls
|
2015 |
| Garcia, Johan ; Alfredsson, Stefan ; Brunstrom, Anna |
Delay metrics and delay characteristics: A study of four Swedish HSDPA+ and LTE networks
|
2015 |
| Volkamer, Melanie (et al.) |
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
|
2015 |
| Kulyk, Oksana (et al.) |
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
|
2015 |
| Zola, Enrica ; Kassler, Andreas |
Energy Efficient Control of Virtual Machine Consolidation under Uncertain Input Parameters for the Cloud
|
2015 |
| Zola, Enrica ; Kassler, Andreas |
Energy Efficient Virtual Machine Consolidation under Uncertain Input Parameters for Green Data Centers
|
2015 |
| Garcia, Johan ; Alfredsson, Stefan ; Brunström, Anna |
Examining TCP Short Flow Performance in Cellular Networks Through Active and Passive Measurements
|
2015 |
| Garcia, Johan |
Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints
|
2015 |
| Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie |
Extending Helios Towards Private Eligibility Verifiability
|
2015 |
| Söderman, Pehr (et al.) |
Mind the SmartGap: A Buffer Management Algorithm for Delay Tolerant Wireless Sensor Networks
|
2015 |
| Zola, Erica ; Kassler, Andreas |
Minimizing the Impact of Handover in WLAN: A Study on Performance Optimization
|
2015 |
| Oljira, Dejene Boru (et al.) |
Models for Efficient Data Replication in Cloud Computing Datacenters
|
2015 |
| Yedugundla, Kiran ; Hurtig, Per ; Brunström, Anna |
Multipath TCP: Can it Reduce Transport Latency for Web Traffic?
|
2015 |
| Afzal, Zeeshan ; Lindskog, Stefan |
Multipath TCP IDS Evasion and Mitigation
|
2015 |
| Santos, Ricardo ; Curadoo, Marilia ; Kassler, Andreas |
Multipathing In Software Defined Networking: Interaction between SDN and MPTCP
|
2015 |
| Nasim, Robayet ; Kassler, Andreas |
Network-centric Performance Improvement for Live VM Migration
|
2015 |
| Vestin, Jonathan ; Kassler, Andreas |
QoS Enabled WiFi MAC Layer Processing as an Example of a NFV Service
|
2015 |
| Vestin, Jonathan ; Kassler, Andreas |
QoS Management for WiFi MAC layer processing in the Cloud: Demo Description
|
2015 |
| Hurtig, Per (et al.) |
Reducing Transport Latency using Multipath Protocols
|
2015 |
| Vestin, Jonathan ; Kassler, Andreas ; Akerberg, Johan |
Resilient Software Defined Networking for Industrial Control Networks
|
2015 |
| Mayer, Peter ; Volkamer, Melanie |
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
|
2015 |
| Rübsamen, Thomas ; Pulls, Tobias ; Reich, Christoph |
Secure Evidence Collection and Storage for Cloud Accountability Audits
|
2015 |
| Alaqra, Ala(a) (et al.) |
Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements
|
2015 |
| Kargar Bideh, Minoo (et al.) |
TADA: An Active Measurement Tool for Automatic Detection of AQM
|
2015 |
| Hassan, Mahdi Mohammad (et al.) |
Testability and Software Robustness: A Systematic Literature Review
|
2015 |
| Pettersson, John Sören ; Wik, Malin |
The longevity of general purpose Wizard-of-Oz tools
|
2015 |
| Angulo, Julio |
Usable Transparency through network representations and analyses
|
2015 |
| Angulo, Julio (et al.) |
Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures
|
2015 |
| Pons, Xavier (et al.) |
An energy efficient vertical handover decision algorithm
|
2014 |
| Garcia, Johan |
An Evaluation of Side-Information Assisted Forensic Hash Matching
|
2014 |
| Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela |
Authentication Schemes - Comparison and Effective Password Spaces
|
2014 |
| Bakar, Sakhinah Abu ; Taheri, Javid ; Zomaya, Albert |
Characterization of essential proteins based on network topology in proteins interaction networks
|
2014 |
| Garcia, Johan |
Computer Assisted Reasoning as a Support for Knowledge Management
|
2014 |
| Nasim, Robayet ; Kassler, Andreas |
Deploying OpenStack: Virtual Infrastructure or Dedicated Hardware
|
2014 |
| Kulyk, Oksana (et al.) |
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design
|
2014 |
| Mesodiakaki, Agapi (et al.) |
Energy Impact of Outdoor Small Cell Backhaul in Green Heterogeneous Networks
|
2014 |
| Budurushi, Jurlind (et al.) |
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail
|
2014 |
| Matloobi, Roozbeh ; Taheri, Javid ; Zomaya, Albert |
Fuzzy modeling to predict performance of collocated virtual machines in private clouds
|
2014 |
| Anderson, Collin ; Winter, Philipp ; -, Roya |
Global Network Interference Detection over the RIPE Atlas Network
|
2014 |
| Fischer-Hübner, Simone ; Angulo, Julio ; Pulls, Tobias |
How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used?
|
2014 |
| Borges, Fabio ; Martucci, Leonardo |
iKUP keeps users' privacy in the Smart Grid
|
2014 |
| Budurushi, Jurlind (et al.) |
Implementation and Evaluation of the EasyVote Tallying Component and Ballot
|
2014 |
| Bartsch, Steffen (et al.) |
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten
|
2014 |
| Mesodiakaki, Agapi (et al.) |
Joint uplink and downlink cell selection in cognitive small cell heterogeneous networks
|
2014 |
| Riggio, Roberto ; Oljira, Dejene Boru ; Rasheed, Tinku |
Joule: Software-Defined Energy Metering
|
2014 |
| Lavén, Andreas ; Kassler, Andreas ; Brunstrom, Anna |
Latency Aware Anypath Routing and Channel Scheduling for Multi-Radio Wireless Mesh Networks
|
2014 |
| Ribeck, Judy ; Borin, Lars |
Lexical Bundles in Swedish Secondary School Textbooks
|
2014 |
| Hurtig, Per ; Brunström, Anna ; Kassler, Andreas |
MPTCP PathFinder: Datacenter Bandwidth Aggregation
|
2014 |
| Canova, Gamze (et al.) |
NoPhish: An Anti-Phishing Education App
|
2014 |
| Sharif, S. (et al.) |
Online Multiple Workflow Scheduling under Privacy and Deadline in Hybrid Cloud Environment
|
2014 |
| Budurushi, Jurlind (et al.) |
Paper Audit Trails and Voters’ Privacy Concerns
|
2014 |
| Dobrijevic, Ognjen (et al.) |
QoE-Driven Path Optimization Model for Multimedia Services
|
2014 |
| Herold, Sebastian ; Mair, Matthias |
Recommending Refactorings to Re-establish Architectural Consistency
|
2014 |
| Doganay, Kivanc (et al.) |
Search-Based Testing for Embedded Telecom Software with Complex Input Structures
|
2014 |
| Borges, Fábio (et al.) |
Secure and Privacy-Friendly Public Key Generation and Certification
|
2014 |
| Winter, Philipp (et al.) |
Spoiled Onions: Exposing Malicious Tor Exit Relays
|
2014 |
| Ahmad, Muhammad Ovais ; Liukkunen, Kari ; Markkula, Jouni |
Student perceptions and attitudes towards the software factory as a learning environment
|
2014 |
| Garcia, Johan |
The GATM Computer Assisted Reasoning Framework in a Security Policy Reasoning Context
|
2014 |
| Harrer, Simon (et al.) |
Towards Uniform BPEL Engine Management in the Cloud
|
2014 |
| Klockar, Annika (et al.) |
User-centric pre-selection and scheduling for coordinated multipoint systems
|
2014 |
| Grinnemo, Karl-Johan ; Brunstrom, Anna ; Cheng, Jun |
Using Concurrent Multipath Transfer to Improve the SCTP Startup Behavior for PSTN Signaling Traffic
|
2014 |
| Angulo, Julio ; Wästlund, Erik ; Johan, Högberg |
What Would It Take for You to Tell Your Secrets to a Cloud?: Studying decision factors when disclosing information to cloud services
|
2014 |
| Renaud, Karen ; Volkamer, Melanie ; Renkema-Padmos, Arne |
Why doesn’t Jane protect her privacy?
|
2014 |
| Nasim, Robayet ; Buchegger, Sonja |
XACML-Based Access Control for Decentralized Online Social Networks
|
2014 |
| Alfredsson, Stefan |
A Case Study of Recent Mifare Classic Field Deployments From an (In-)Security Perspective
|
2013 |
| Iwaya, Leonardo ; Rosso, R S U ; Hounsell, M S |
A Design for Assembly Application with Dynamic Information Retrieval from Case Database
|
2013 |
| Volkamer, Melanie (et al.) |
Adopting the CMU/APWG anti-phishing landing page idea for Germany
|
2013 |
| Renaud, Karen (et al.) |
Are Graphical Authentication Mechanisms As Strong As Passwords?
|
2013 |
| Wu, Hao ; Taheri, Javid ; Zomaya, Albert |
B-Alarm: An Entropy Based Burst Traffic Prediction Approach for Ethernet Switches in Data Centers
|
2013 |
| Chow, Lawrence (et al.) |
Channel Aware Rebuffering for Wireless Media Streaming with Handoff Control
|
2013 |
| Herold, Sebastian ; Rausch, Andreas |
Complementing model-driven development for the detection of software architecture erosion
|
2013 |
| Berthold, Stefan (et al.) |
Crime and Punishment in the Cloud: Accountability, Transparency, and Privacy
|
2013 |
| Lenhard, Jörg ; Wirtz, Guido |
Detecting Portability Issues in Model-Driven BPEL Mappings
|
2013 |
| Pulls, Tobias ; Peeters, Roel ; Wouters, Karel |
Distributed privacy-preserving transparency logging
|
2013 |
| Mesodiakaki, Agapi (et al.) |
Energy Efficiency Analysis of Secondary Networks in Cognitive Radio Systems
|
2013 |
| Oljira, Dejene Boru (et al.) |
Energy-Efficient Data Replication in Cloud Computing Datacenters
|
2013 |
| Peeters, Roel ; Pulls, Tobias ; Wouters, Karel |
Enhancing Transparency with Distributed Privacy-Preserving Logging
|
2013 |
| Zola, Enria (et al.) |
Expected Bit Rate for Terminals Moving According to the Random Waypoint Model in a WLAN Cell
|
2013 |
| Beckerle, Matthias ; Martucci, Leonardo |
Formal Definitions for Usable Access Control Rule Sets: From Goals to Metrics
|
2013 |
| Söderman, Pehr (et al.) |
Handover in the Wild: The Feasibility of Vertical Handover in Commodity Smartphones
|
2013 |
| Angulo, Julio ; Wästlund, Erik |
Identity Management through “Profiles”: Prototyping an Online Information Segregation Service
|
2013 |
| Alfredsson, Stefan (et al.) |
Impact of TCP Congestion Control on Bufferbloat in Cellular Networks
|
2013 |
| Blom, Martin ; Eldh, Sigrid |
Is Common Test Data the Solution to Poor Quality?: Solving the Right Problem – An Analysis of a Public Health Information System
|
2013 |
| Neumann, Stephan (et al.) |
Modeling the German Legal Latitude Principles
|
2013 |
| Alfredsson, Stefan (et al.) |
Observations of Bufferbloat in Swedish Cellular Networks
|
2013 |
| Harrer, Simon ; Lenhard, Jörg ; Wirtz, Guido |
Open Source versus Proprietary Software in Service-Orientation: The Case of BPEL Engines
|
2013 |
| Angulo, Julio ; Wästlund, Erik |
Profiles: prototyping an online information segregation service
|
2013 |
| Zola, Enrica (et al.) |
Robust Association for Multi-radio Devices under Coverage of Multiple Networks
|
2013 |
| Winter, Philipp ; Pulls, Tobias ; Fuss, Juergen |
ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship
|
2013 |
| Unander-Scharin, Åsa ; Unander-Scharin, Carl |
Sensory Digital Intonation
|
2013 |
| Eldh, Sigrid |
Some researcher considerations when conducting empirical studies in industry
|
2013 |
| Winter, Philipp |
Towards a Censorship Analyser for Tor
|
2013 |
| Klockar, Annika (et al.) |
Utility as a User Selection Criterion for Coordinated Multi-Point Systems
|
2013 |
| Gustas, Remigijus ; Gustiene, Prima |
A Graphical Method for Conceptual Modelling of Business and Software Scenarios
|
2012 |
| Pearson, Siani (et al.) |
Accountability for cloud and other future Internet services
|
2012 |
| Lundin, Reine ; Lindskog, Stefan |
An Investigation of Entropy of Selectively Encrypted Bitmap Images
|
2012 |
| Söderman, Pehr (et al.) |
An SCTP-based Mobility Management Framework for Smartphones and Tablets
|
2012 |
| Borges, Fábio ; Martucci, Leonardo ; Mühlhäuser, Max |
Analysis of privacy-enhancing protocols based on anonymity networks
|
2012 |
| Cavalcanti de Castro, Marcel ; Kassler, Andreas ; Avallone, Stefano |
BestPeer: A Load-aware Multi-path Peer Selection for Wireless Mesh Networks
|
2012 |
| Harrer, Simon ; Lenhard, Jörg ; Wirtz, Guido |
BPEL Conformance in Open Source Engines
|
2012 |
| Kolb, Stefan ; Lenhard, Jörg ; Wirtz, Guido |
Bridging the Heterogeneity of Orchestrations - A Petri Net-based Integration of BPEL and Windows Workflow
|
2012 |
| Paul, Thomas (et al.) |
C4PS-Helping Facebookers Manage Their Privacy Settings
|
2012 |
| Neumann, Stephan ; Volkamer, Melanie |
Civitas and the Real World: Problems and Solutions from a Practical Point of View
|
2012 |
| Dely, Peter (et al.) |
CloudMAC: An OpenFlow based Architecture for 802.11 MAC Layer Processing in the Cloud
|
2012 |
| Moraveji, Reza (et al.) |
Data-Intensive Workload Consolidation on Hadoop Distributed File System
|
2012 |
| Nasim, Robayet ; Kassler, Andreas |
Distributed Architectures for Intelligent Transport Systems: A Survey
|
2012 |
| Mesodiakaki, Agapi (et al.) |
Energy-efficient contention-aware channel selection in Cognitive Radio Ad-Hoc Networks
|
2012 |
| Hurtig, Per ; Brunstrom, Anna |
Enhanced Metric Caching for Short TCP Flows
|
2012 |
| Rajiullah, Mohammad ; Brunström, Anna |
Evaluation and Analysis of NR-SACKs based PR-SCTP
|
2012 |
| Wästlund, Erik ; Angulo, Julio ; Fischer-Hübner, Simone |
Evoking Comprehensive Mental Models of Anonymous Credentials
|
2012 |
| Vliegen, Jo (et al.) |
Hardware strengthening a Distributed Logging Scheme
|
2012 |
| Winter, Philipp ; Lindskog, Stefan |
How the Great Firewall of China is Blocking Tor
|
2012 |
| Karlsson, Jonas (et al.) |
Impact of Multi-path Routing on TCP Performance
|
2012 |
| Karlsson, Jonas (et al.) |
Impact of Multi-path Routing on TCP Performance in Wireless Mesh Networks
|
2012 |
| Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna |
Implications of using a Large Initial Congestion Window to Improve mSCTP Handover Delay
|
2012 |
| Christin, Delphine (et al.) |
IncogniSense: An anonymity-preserving reputation frameworkfor participatory sensing applications
|
2012 |
| Pulls, Tobias |
(More) Side Channels in Cloud Storage: Linking Data to Users
|
2012 |
| Rizvandi, Nikzad Babaii (et al.) |
Network Load Analysis and Provisioning of MapReduce Applications
|
2012 |
| Andersson, Kerstin |
Numerical Evaluation of the Average Number of Successive Guesses
|
2012 |
| Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna |
On the Use of an Increased Initial Congestion Window to Improve mSCTP Handover Performance
|
2012 |
| Karlsson, Jonas (et al.) |
Performance Evaluation for TCP in Tactical Mobile Ad hoc Networks
|
2012 |
| Chow, Lawrence (et al.) |
Playout-Buffer Aware Hand-Off Control for Wireless Video Streaming
|
2012 |
| Martucci, Leonardo (et al.) |
Privacy, security and trust in cloud computing: The perspective of the telecommunication industry
|
2012 |
| Pulls, Tobias |
Privacy-Friendly Cloud Storage for the Data Track: An Educational Transparency Tool
|
2012 |
| Kassler, Andreas (et al.) |
Quality of Experience-based Routing in Multi-Service Wireless Mesh Networks
|
2012 |
| Garcia, Johan |
Quantifying the Benefits of File Size Information for Forensic Hash Matching
|
2012 |
| Eldh, Sigrid ; Sundmark, Daniel |
Robustness Testing of Mobile Telecommunication Systems: A Case Study on Industrial Practice and Challenges
|
2012 |
| Söderman, Pehr (et al.) |
Sub-Second Transport Layer Vertical Handover Using mSCTP in Android Mobile Devices
|
2012 |
| Eldh, Sigrid ; Punnekkat, Sasikumar |
Synergizing industrial needs and academic research for better software education
|
2012 |
| Karlsson, Jonas (et al.) |
The Interaction Between TCP Reordering Mechanisms and Multi-path Forwarding in Wireless Mesh Networks
|
2012 |
| Kassler, Andreas (et al.) |
Towards QoE-driven Multimedia Service Negotiation and Path Optimization with Software Defined Networking
|
2012 |
| Angulo, Julio (et al.) |
Understanding the user experience of secure mobile online transactions in realistic contexts of use
|
2012 |
| Ahammed, Farhan ; Taheri, Javid ; Zomaya, Albert |
Using simulated annealing to find lower bounds of localization with noisy measurements
|
2012 |
| Ahammed, Farhan (et al.) |
VLOCI: Using Distance Measurements to Improve the Accuracy of Location Coordinates in GPS-Equipped VANETs
|
2012 |
| Calvo, J.C. (et al.) |
A Method to Improve the Accuracy of Protein Torsion Angles
|
2011 |
| Karlsson, Jonas (et al.) |
An Aggregation Aware Multi-path Forwarding Paradigm for Wireless Mesh Networks
|
2011 |
| Karlsson, Jonas (et al.) |
An Aggregation Aware Multi-path Forwarding Paradigm for Wireless Mesh Networks : AA-L2R Aggregation Aware Multi-path Routing
|
2011 |
| Wang, Tai-Chun ; Taheri, Javid ; Zomaya, Albert |
Averaging Measurement Strategies for Identifying Single Nucleotide Polymorphisms from Redundant Data Sets
|
2011 |
| Hein, Patrick (et al.) |
Conflict Detection and Lifecycle Management for Access Control in Publish/Subscribe Systems
|
2011 |
| Rajiullah, Mohammad (et al.) |
Data Modeling and Transport of Syslog Messages
|
2011 |
| Eklund, Johan (et al.) |
Delay Penalty during SCTP Handover
|
2011 |
| Lundin, Reine ; Lindskog, Stefan |
Entropy of Selectively Encrypted Strings
|
2011 |
| Angulo, Julio ; Wästlund, Erik |
Exploring Touch-Screen Biometrics for User Identification on Smart Phones
|
2011 |
| Ahammed, Farhan ; Taheri, Javid ; Zomaya, Albert |
Finding lower bounds of localization with noisy measurements using genetic algorithms
|
2011 |
| Bakar, Sakhinah Abu ; Taheri, Javid ; Zomaya, Albert |
FIS-PNN: A Hybrid Computational Method for Protein-Protein Interactions Prediction Using the Secondary Structure Information
|
2011 |
| Lundin, Reine ; Lindskog, Stefan |
Guesswork Changes in Multi-processor Attacks
|
2011 |
| Bakar, Sakhinah Abu ; Taheri, Javid ; Zomaya, Albert |
Identifying Hub Proteins and Their Essentiality from Protein-protein Interaction Network
|
2011 |
| Eklund, Johan (et al.) |
Impact of Slow Start on SCTP Handover Performance
|
2011 |
| Eklund, Johan ; Brunstrom, Anna ; Grinnemo, Karl-Johan |
Improving mSCTP-based Vertical Handovers by Increasing the Initial Congestion Window
|
2011 |
| Ries, Sebastian (et al.) |
Learning whom to trust in a privacy-friendly way
|
2011 |
| Rajiullah, Mohammad ; Brunström, Anna |
On the Effectiveness of PR-SCTP in Networks with Competing Traffic
|
2011 |
| Kassler, Andreas ; Dely, Peter ; Beyer, Nico |
OpenFlow for Wireless Mesh Networks
|
2011 |
| Hurtig, Per ; Brunstrom, Anna |
Packet Reordering in TCP
|
2011 |
| Castro C, Marcel (et al.) |
Peer-to-Peer Selection and Channel Assignment for Wireless Mesh Networks
|
2011 |
| Rajiullah, Mohammad ; Brunström, Anna ; Lindskog, Stefan |
Priority Based Delivery of PR-SCTP Messages in a Syslog Context
|
2011 |
| Brajdic, Agata ; Kassler, Andreas ; Matijasevic, Maja |
Quality of Experience based optimization of heterogeneous multimedia sessions in IMS
|
2011 |
| Hurtig, Per ; John, Wolfgang ; Brunstrom, Anna |
Recent Trends in TCP Packet-Level Characteristics
|
2011 |
| Kastrinogiannis, Timotheos ; Mesodiakaki, Agapi ; Papavassiliou, Symeon |
Service-oriented utility-based uplink power control in two-tier femtocell networks
|
2011 |
| Hurtig, Per ; Brunström, Anna |
Short Flows and TCP Metric Caching in Linux
|
2011 |
| Lenhard, Jörg ; Schönberger, Andreas ; Wirtz, Guido |
Streamlining Pattern Support Assessment for Service Composition Languages
|
2011 |
| Rajiullah, Mohammad (et al.) |
Syslog Performance: Data Modeling and Transport
|
2011 |
| Zhang, Ge ; Fischer-Huebner, Simone |
Timing Attacks on PIN Input in VoIP Networks: Short paper
|
2011 |
| Berthold, Stefan |
Towards a Formal Language for Privacy Options
|
2011 |
| Kassler, Andreas (et al.) |
TP-UrbanX - A New Transport Protocol for Cognitive Multi-Radio Mesh Networks
|
2011 |
| Kim, Wooseong (et al.) |
Urban-X: A Self-Organizing Cognitive Wireless Mesh Network for Dense City Environments
|
2011 |
| Jing, Su ; Kane, Bridget ; Luz, Saturnino |
Utilising Semantic Structures in the Interactions among Speakers at meetings
|
2011 |
| Jungert, Erland (et al.) |
A generic architecture for surveillance systems
|
2010 |
| Hedbom, Hans (et al.) |
Adding Secure Transparency Logging to the PRIME Core
|
2010 |
| Dely, Peter (et al.) |
An Experimental Comparison of Burst Packet Transmission Schemes in IEEE 802.11-based Wireless Mesh Networks
|
2010 |
| Jing, Su ; Kane, Bridget ; Luz, Saturnino |
Automatic meeting participant role detection by dialogue patterns
|
2010 |
| Kassler, Andreas (et al.) |
Cognitive Multi-Radio Mesh Networks for the Future Wireless Internet
|
2010 |
| Kim, Wooseong (et al.) |
Cognitive Multi-Radio Mesh Networks on ISM Bands: A Cross-Layer Architecture
|
2010 |
| Reis, Andre B (et al.) |
Distortion Optimized Multi-Service Scheduling for Next-Generation Wireless Mesh Networks
|
2010 |
| Trung Luong, Tuan (et al.) |
Efficient Channel Assignment and Routing Protocol for Multiple Channels Multiple Interfaces Wireless Mesh Network
|
2010 |
| Hurtig, Per ; Brunström, Anna |
Emulation Support for Advanced Packet Reordering Models
|
2010 |
| Lundin, Reine ; Lindskog, Stefan |
Extending the Definition of Guesswork
|
2010 |
| Holleboom, Thijs Jan ; Garcia, Johan |
Fragment Retention Characteristics in Slack Space: Analysis and Measurements
|
2010 |
| Dely, Peter (et al.) |
FUZPAG: A Fuzzy-Controlled Packet Aggregation Scheme for Wireless Mesh Networks
|
2010 |
| Zhang, Ge ; Berthold, Stefan |
Hidden VoIP Calling Records from Networking Intermediaries
|
2010 |
| Martucci, Leonardo ; Ries, Sebastian ; Mühlhäuser, Max |
Identifiers, Privacy and Trust in the Internet of Services
|
2010 |
| Abdollahi, Kamran ; Shams Shafigh, Alireza ; Kassler, Andreas |
Improving Performance of On Demand Multicast Routing by deleting lost join query packet
|
2010 |
| Shams Shafigh, Alireza ; Abdollahi, Kamran ; Kassler, Andreas |
Improving Performance of On Demand Multicast Routing by using Fuzzy Logic
|
2010 |
| Beckerle, Matthias ; Martucci, Leonardo ; Ries, Sebastian |
Interactive access rule learning: Generating adapted access rule sets
|
2010 |
| Blom, Martin |
Is Scrum and XP suitable for CSE Development?
|
2010 |
| Cavalcanti de Castro, Marcel ; Kassler, Andreas ; Avallone, Stefano |
Measuring the Impact of ACI in Cognitive Multi-Radio Mesh Networks
|
2010 |
| Lavén, Andreas ; Kassler, Andreas |
Multi-Channel Anypath Routing in Wireless Mesh Networks
|
2010 |
| Cavalcanti de Castro, Marcel (et al.) |
On the comparison between performance of DHT-based protocols for opportunistic networks
|
2010 |
| Zhang, Ge ; Fischer Hübner, Simone |
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
|
2010 |
| Dely, Peter (et al.) |
Practical Considerations for Channel Assignment in Wireless Mesh Networks
|
2010 |
| Zhang, Ge (et al.) |
Privacy and Identity Management for Life: 5th IFIP primelife international summer school revised selected papers
|
2010 |
| Reis, Andre B. (et al.) |
Quality of Experience Optimized Scheduling in Multi-Service Wireless Mesh Networks
|
2010 |
| Brunström, Anna |
Reliable and Secure Communication in SCTP
|
2010 |
| Lundin, Reine ; Lindskog, Stefan |
Security Implications of Selective Encryption
|
2010 |
| Lindskog, Stefan ; Faig, Zoltán ; Brunstrom, Anna |
Security Solution Suitability Analysis using Modified Multiplicative Analytic Hierarchy Process
|
2010 |
| Zhang, Ge (et al.) |
SIP Proxies: New Reflectors? Attacks and Defenses
|
2010 |
| Zhang, Ge (et al.) |
SIP Proxies: New Reflectors in the Internet
|
2010 |
| Fischer Hübner, Simone ; Georgiadou, Yola |
Surveillance and Privacy
|
2010 |
| Fischer Hübner, Simone |
The Conflict between Privacy and Digital Forensics
|
2010 |
| Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna |
Theoretical Analysis of an Ideal Startup Scheme in Multihomed SCTP
|
2010 |
| Dely, Peter ; Kassler, Andreas ; Sivchenko, Dmitry |
Theoretical and Experimental Analysis of the Channel Busy Fraction in IEEE 802.11
|
2010 |
| Weber, Stefan G. (et al.) |
Towards trustworthy identity and access management for the future internet
|
2010 |
| Hedbom, Hans ; Pulls, Tobias |
Unlinking Database Entries: Implementation Issues in Privacy Preserving Secure Logging
|
2010 |
| Kim, Wooseong (et al.) |
Urban-X: Towards Distributed Channel Assignment in Cognitive Multi-Radio Mesh Networks
|
2010 |
| Lindskog, Stefan (et al.) |
Using System Call Information to Reveal Hidden Attack Manifestations
|
2010 |
| Hurtig, Per (et al.) |
Using Triggers for Emulation of Opportunistic Networking
|
2010 |
| Klockar, Annika (et al.) |
Utility of Joint Processing Schemes
|
2010 |
| Berthold, Stefan ; Böhme, Rainer |
Valuating Privacy with Option Pricing Theory
|
2010 |