Ahmad, Muhammad Ovais 5G Secure Solution Development and Security Master Role 2024
Ahmad, Muhammad Ovais Beyond Technical Debt Unravelling Organisational Debt Concept 2024
Garcia, Johan ; Sundberg, Simon ; Brunstrom, Anna Fine-Grained Starlink Throughput Variation Examined With State-Transition Modeling 2024
Garcia, Johan ; Sundberg, Simon ; Brunstrom, Anna Inferring Starlink Physical Layer Transmission Rates Through Receiver Packet Timestamps 2024
Islami, Lejla ; Kitkowska, Agnieszka ; Fischer-Hübner, Simone Inter-regional Lens on the Privacy Preferences of Drivers for ITS and Future VANETs 2024
Rahal, Manal ; Ahmed, Bestoun S. ; Samuelsson, Jörgen Machine Learning Data Suitability and Performance Testing Using Fault Injection Testing Framework 2024
Ahmad, Muhammad Ovais ; Gustavsson, Tomas Nexus Between Psychological Safety and Non-Technical Debt in Large-Scale Agile Enterprise Resource Planning Systems Development 2024
Khamdamov, Ulugbek ; Usman, Muhammad ; Kim, JongWon A Cost-effective High-throughput Testbed for Supporting AI-enabled DevSecOps Services 2023
Paiva, Thomas William Do Prado (et al.) A First Look at Adaptive Video Streaming over Multipath QUIC with Shared Bottleneck Detection 2023
Akil, Mahdi (et al.) A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs 2023
Magnusson, Jonathan (et al.) A Second Look at DNS QNAME Minimization 2023
Brisch, Fabian (et al.) Accelerating Transport Layer Multipath Packet Scheduling for 5G-ATSSS 2023
Ahmad, Muhammad Ovais ; Iftikhar, Ahmad ; Iqra, Sadaf Khan An Empirical Investigation on Electronic Government Services Continuance and Trust 2023
Caso, Giuseppe (et al.) An Initial Look into the Performance Evolution of 5G Non-Standalone Networks 2023
Palm, Jonas ; Jensen, Meiko Analysis of a Consent Management Specification and Prototype Under the GDPR 2023
Ma, Yunpeng (et al.) Automated and Systematic Digital Twins Testing for Industrial Processes 2023
Morel, Victor ; Fischer-Hübner, Simone Automating privacy decisions -where to draw the line? 2023
Rajiullah, Mohammad (et al.) CARL-W: a Testbed for Empirical Analyses of 5G and Starlink Performance 2023
Sundberg, Simon ; Garcia, Johan ; Brunstrom, Anna Characterizing Wireless Link Throughput with eBPF and Hardware Timestamps 2023
Haile, Habtegebreil Kassaye (et al.) Copa-D: Delay Consistent Copa for Dynamic Cellular Networks 2023
Ahmad, Muhammad Ovais ; Gustavsson, Tomas ; Saeeda, Hina Customised Roles in Scrum Teams for the Development of Secure Solution 2023
Usman, Muhammad (et al.) DESK: Distributed Observability Framework for Edge-Based Containerized Microservices 2023
Bayram, Firas (et al.) DQSOps: Data Quality Scoring Operations Framework for Data-Driven Applications 2023
Fernández, Fátima (et al.) Flexible Priority-based Stream Schedulers in QUIC 2023
Ramaswamy, Arunselvan Gradient Clipping in Deep Learning: A Dynamical Systems Perspective 2023
Knoche, Hendrik (et al.) Identifying Challenges and Opportunities for Intelligent Data-Driven Health Interfaces to Support Ongoing Care 2023
Hansen, Malte ; Gruschka, Nils ; Jensen, Meiko Introducing the Concept of Data Subject Rights as a Service Under the GDPR 2023
Sinkala, Zipani Tom ; Herold, Sebastian Investigating the Effect of Partial and Real-Time Feedback in INMAP Code-to-Architecture Mapping 2023
Pulls, Tobias ; Witwer, Ethan Maybenot: A Framework for Traffic Analysis Defenses 2023
Garcia, Johan (et al.) Multi-Timescale Evaluation of Starlink Throughput 2023
Saeeda, Hina ; Ahmad, Muhammad Ovais ; Gustavsson, Tomas Multivocal Literature Review on Non-Technical Debt in Software Development: An Exploratory Study 2023
Akil, Mahdi ; Martucci, Leonardo ; Hoepman, Jaap-Henk Non-Interactive Privacy-Preserving Sybil-Free Authentication Scheme in VANETs 2023
Pieskä, Marcus ; Brunstrom, Anna ; Kassler, Andreas On the Feasibility of Reliable Tunneling: Modelling Delay Imposed by Re-Transmissions 2023
Martucci, Leonardo ; Magnusson, Jonathan ; Akil, Mahdi On-Campus Hands-On Ethical Hacking Course: Design, Deployment and Lessons Learned 2023
Figueiredo, Rubens (et al.) Performance Measurements of Broadband Network Gateways 2023
Fischer-Hübner, Simone (et al.) Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning 2023
Ahmad, Muhammad Ovais Psychological Safety, Leadership and Non-Technical Debt in Large Scale Agile Software Development 2023
Aupke, Phil (et al.) PV Power Production and Consumption Estimation with Uncertainty bounds in Smart Energy Grids 2023
Nammouchi, Amal ; Kassler, Andreas ; Theocharis, Andreas Quantum Machine Learning in Climate Change and Sustainability: a Review 2023
Nammouchi, Amal (et al.) Robust Operation of Energy Communities in the Italian Incentive System 2023
Romare, Piero (et al.) Tapping into Privacy: A Study of User Preferences and Concerns on Trigger-Action Platforms 2023
Dahlberg, Rasmus ; Pulls, Tobias Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache 2023
Alaqra, Ala Sarah ; Fischer-Hübner, Simone ; Karegar, Farzaneh Transparency of Privacy Risks Using PIA Visualizations 2023
Herold, Sebastian ; Sinkala, Zipani Tom Using Automatically Recommended Seed Mappings for Machine Learning-Based Code-to-Architecture Mappers 2023
Bayram, Firas (et al.) A Drift Handling Approach for Self-Adaptive ML Software in Scalable Industrial Processes 2022
Hansen, Malte ; Jensen, Meiko A Generic Data Model for Implementing Right of Access Requests 2022
Redder, Adrian ; Ramaswamy, Arunselvan ; Karl, Hogler Age of Information Process under Strongly Mixing Communication - Moment Bound, Mixing Rate and Strong Law 2022
Mahjoubi, Ayeh ; Grinnemo, Karl-Johan ; Taheri, Javid An Efficient Simulated Annealing-based Task Scheduling Technique for Task Offloading in a Mobile Edge Architecture 2022
Usman, Muhammad (et al.) An Observability Framework for Containerized Microservices in Edge Infrastructures 2022
Kitkowska, Agnieszka ; Högberg, Johan ; Wästlund, Erik Barriers to a Well-Functioning Digital Market: Exploring Dark Patterns and How to Overcome Them 2022
Nordin, Anna ; Ängeby, Karin ; Fritsch, Lothar Body-Area Sensing in Maternity Care: Evaluation of Commercial Wristbands for Pre-birth Stress Management 2022
Ahrens, Ken ; Palm, Jonas ; Jensen, Meiko CampusTracer: A Privacy-Aware Contact Tracing Protocol for Campus Environments 2022
Kousias, Konstantinos (et al.) Coverage and performance analysis of 5G non-standalone deployments 2022
Mahjoubi, Ayeh ; Grinnemo, Karl-Johan ; Taheri, Javid EHGA: A Genetic Algorithm Based Approach for Scheduling Tasks on Distributed Edge-Cloud Infrastructures 2022
Mahjoubi, Ayeh ; Grinnemo, Karl-Johan ; Taheri, Javid EHGA: A Genetic Algorithm Based Approach for Scheduling Tasks on Distributed Edge-Cloud Infrastructures 2022
Garcia, Johan ; Hurtig, Per ; Hammar, Jonas Evaluating and Modeling 5G MPTCP Performance 2022
Karegar, Farzaneh ; Alaqra, Ala Sarah ; Fischer-Hübner, Simone Exploring User-Suitable Metaphors for Differentially Private Data Analyses 2022
Alcalá-Marín, Sergi (et al.) Global Mobile Network Aggregators: Taxonomy, Roaming Performance and Optimization 2022
Sinkala, Zipani Tom ; Herold, Sebastian Hierarchical Code-to-Architecture Mapping 2022
Aupke, Phil (et al.) Impact of Clustering Methods on Machine Learning-based Solar Power Prediction Models 2022
Kousias, Konstantinos (et al.) Implications of handover events in commercial 5G non-standalone deployments in Rome 2022
Amend, Markus (et al.) In-network Support for Packet Reordering for Multiaccess Transport Layer Tunneling 2022
Rabitsch, Alexander (et al.) Integrated Network and End-host Policy Management for Network Slicing 2022
HoseinyFarahabady, M. Reza (et al.) Low Latency Execution Guarantee Under Uncertainty in Serverless Platforms 2022
Garcia, Johan (et al.) Measuring and Modeling Aggregate LTE Connection Reliability for Train Operations 2022
Wairimu, Samuel ; Fritsch, Lothar Modelling privacy harms of compromised personal medical data - Beyond data breach 2022
Abbas, Muhammad Tahir (et al.) On the Energy-efficient Use of Discontinuous Reception and Release Assistance in NB-IoT 2022
Kitkowska, Agnieszka ; Högberg, Johan ; Wästlund, Erik Online Terms and Conditions: Improving User Engagement, Awareness, and Satisfaction through UI Design 2022
Rechtberger, Vaclav ; Bures, Miroslav ; Ahmed, Bestoun S. Overview of Test Coverage Criteria for Test Case Generation from Finite State Machines Modelled as Directed Graphs 2022
Sundberg, Simon (et al.) Passive Monitoring of Network Latency at High Line Rates 2022
Haile, Habtegebreil Kassaye (et al.) Performance of QUIC congestion control algorithms in 5G networks 2022
Rechtberger, Vaclav (et al.) Prioritized Variable-length Test Cases Generation for Finite State Machines 2022
Dahlberg, Rasmus (et al.) Sauteed Onions: Transparent Associations from Domain Names to Onion Addresses 2022
Beckerle, Matthias ; Magnusson, Jonathan ; Pulls, Tobias Splitting Hairs and Network Traces: Improved Attacks Against Traffic Splitting as a Website Fingerprinting Defense 2022
Chatterjee, Ayan (et al.) Testing of machine learning models with limited samples: an industrial vacuum pumping application 2022
Ma, Yunpeng (et al.) Using Deep Reinforcement Learning for Zero Defect Smart Forging 2022
Ahlgren, Bengt ; Grinnemo, Karl-Johan ZQTRTT: A Multipath Scheduler for Heterogeneous Traffic in ICNs Based on Zero Queueing Time Ratio 2022
Florean, Alexander (et al.) A Comparison of Machine Learning-Based Text Classifiers for Mapping Source Code to Architectural Modules 2021
Nguyen, Van-Giang (et al.) Adaptive and Latency-aware Load Balancing for Control Plane Traffic in the 4G/5G Core 2021
Pieskä, Marcus (et al.) Adaptive cheapest path first scheduling in a transport-layer multi-path tunnel context 2021
Pettersson, K. (et al.) AI-based enhancement of access and mobility procedures in cellular networks: An experimental study 2021
Figueiredo, Rubens ; Kassler, Andreas BNG-HAL: A Unified API for Disaggregated BNGs 2021
Hillblom, J. ; Garcia, Johan ; Waldenborg, A. Building Efficient Regular Expression Matchers Through GA Optimization with ML Surrogates 2021
Ahmad, Muhammad Ovais Business Analytics Continuance in Software Development Projects: A Preliminary Analysis 2021
Moreno, N. R. (et al.) CCID5: An implementation of the BBR congestion control algorithm for DCCP and its impact over multi-path scenarios 2021
Maqbool, Bilal ; Herold, Sebastian Challenges in Developing Software for the Swedish Healthcare Sector 2021
Sykora, Krystof ; Ahmed, Bestoun S. ; Bures, Miroslav Code Coverage Aware Test Generation Using Constraint Solver 2021
Myklebust, Thor (et al.) Data Safety, Sources, and Data Flow in the Offshore Industry 2021
Hoseiny Farahabady, M. Reza (et al.) Data-Intensive Workload Consolidation in Serverless (Lambda/FaaS) Platforms 2021
Tavallaie, Omid ; Taheri, Javid ; Zomaya, Albert Y. Design and Optimization of Traffic-Aware TSCH Scheduling for Mobile 6TiSCH Networks 2021
Wairimu, Samuel e-Health as a Target in Cyberwar: Expecting the Worst 2021
Xylouris, Georgios (et al.) Experimentation and 5G KPI measurements in the 5GENESIS platforms 2021
Rabitsch, Alexander (et al.) Extending Network Slice Management to the End-host 2021
Tavallaie, Omid ; Taheri, Javid ; Zomaya, Albert Y. Game-Theoretic Optimization of the TSCH Scheduling Function for Low-Power IoT Networks 2021
Alaqra, Ala Sarah ; Kitkowska, Agnieszka Impact of Intrinsic Factors and COVID-19 Pandemic on the Use of Technology 2021
Sinkala, Zipani Tom ; Herold, Sebastian InMap: Automated Interactive Code-to-Architecture Mapping 2021
Sinkala, Zipani Tom ; Herold, Sebastian InMap: Automated Interactive Code-to-Architecture Mapping Recommendations 2021
Nammouchi, Amal (et al.) Integration of AI, IoT and Edge-Computing for Smart Microgrid Energy Management 2021
Al-Dulaimy, A. (et al.) LOOPS: A Holistic Control Approach for Resource Management in Cloud Computing 2021
Nika, Grigor ; Vernescu, Bogdan Micro-geometry Effects on the Nonlinear Effective Yield Strength Response of Magnetorheological Fluids 2021
Nguyen, Van-Giang (et al.) On Auto-scaling and Load Balancing for User-plane Functions in a Softwarized 5G Core 2021
Nguyen, Van-Giang (et al.) On Auto-scaling and Load Balancing for User-plane Gateways in a Softwarized 5G Network 2021
Mahjoubi, Ayeh (et al.) Optimal Placement of Recurrent Service Chains on Distributed Edge-Cloud Infrastructures 2021
Galletta, Antonino (et al.) Overcoming security limitations of Secret Share techniques: The Nested Secret Share 2021
Bures, Miroslav (et al.) PatrIoT: IoT Automated Interoperability and Integration Testing Framework 2021
Fischer-Hübner, Simone ; Lambrinoudakis, C. Preface 2021
Herold, Sebastian ; Buckley, Jim ; van der Werf, Jan Martijn Preface of the 8th Workshop on Software Architecture Erosion and Architectural Consistency (SAEroCon) 2021
Wairimu, Samuel ; Momen, Nurul Privacy Analysis of COVID-19 Contact Tracing Apps in the EU 2021
Dahlberg, Rasmus (et al.) Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor 2021
Hernandez Benet, Cristian (et al.) Providing In-network Support to Coflow Scheduling 2021
HoseinyFarahabady, M. Reza (et al.) QSpark: Distributed Execution of Batch & Streaming Analytics in Spark Platform 2021
Bures, Miroslav (et al.) Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting Their Security and Reliability 2021
Chahed, Hamza ; Kassler, Andreas Software-Defined Time Sensitive Networks Configuration and Management 2021
Tavallaie, O. ; Taheri, Javid ; Zomaya, A. Y. Throughput Maximization in Low-Power IoT Networks via Tuning the Size of the TSCH Slotframe 2021
Matthias, Beckerle ; Chatzopoulou, Argyro ; Fischer-Hübner, Simone Towards cybersecurity MOOC certification 2021
Sinkala, Zipani Tom ; Herold, Sebastian Towards Hierarchical Code-to-Architecture Mapping Using Information Retrieval 2021
Sundberg, Simon ; Brunstrom, Anna Using BPF to Measure Latency at High LinkSpeeds 2021
Afzal, Zeeshan ; Brunström, Anna ; Lindskog, Stefan Using Features of Encrypted Network Traffic to Detect Malware 2021
Karegar, Farzaneh ; Fischer-Hübner, Simone Vision: A Noisy Picture or a Picker Wheel to Spin? Exploring Suitable Metaphors for Differentially Private Data Analyses 2021
Haile, Habtegebreil Kassaye (et al.) WIP: Leveraging QUIC for a Receiver-driven BBR for Cellular Networks 2021
Nguyen, Van-Giang (et al.) A Deployable Containerized 5G Core Solution for Time Critical Communication in Smart Grid 2020
Kramer, Z. (et al.) A Lightweight Performance Enhancing Proxy for Evolved Protocols and Networks 2020
Richardson, Omar ; Garcia, Johan A Novel Flow-level Session Descriptor with Application to OS and Browser Identification 2020
Gokan Khan, Michel (et al.) A Performance Modelling Approach for SLA-Aware Resource Recommendation in Cloud Native Network Functions 2020
Momen, Nurul ; Bock, Sven ; Fritsch, Lothar Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android 2020
Ahmed, Bestoun S. ; Gargantin, Angelo ; Bures, Miroslav An Automated Testing Framework For Smart TVapps Based on Model Separation 2020
Herold, Sebastian An initial study on the association between architectural smells and degradation 2020
Khatouni, A. S. (et al.) An open dataset of operational mobile networks 2020
Momen, Nurul ; Fritsch, Lothar App-generated digital identities extracted through Androidpermission-based data access - a survey of app privacy 2020
Richter, Jan (et al.) Avocado: Open-Source Flexible ConstrainedInteraction Testing for Practical Application 2020
Garcia, Johan ; Vehkajärvi, Tobias Boot Log Anomaly Detection with K-Seen-Before 2020
Haque, Mubin U. ; Iwaya, Leonardo H ; Ali Babar, M. Challenges in Docker Development: A Large-scale Study Using Stack Overflow 2020
Bisztray, Tamas (et al.) Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics 2020
Garcia, Johan ; Korhonen, Topi DIOPT: Extremely Fast Classification Using Lookups and Optimal Feature Discretization 2020
Bock, Sven ; Momen, Nurul Einfluss einer Datenschutzskala auf das Auswahlverhalten in einem App-Markt. 2020
Kitkowska, Agnieszka (et al.) Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affe 2020
Warner, Mark (et al.) Evaluating 'Prefer not to say' Around Sensitive Disclosures 2020
Nguyen, Van-Giang (et al.) Experimental Evaluation of a Virtualized 5G Core for Smart Grid Applications 2020
Kitkowska, Agnieszka (et al.) Facilitating Privacy Attitudes & Behaviors with Affective Visual Design 2020
Abbas, Muhammad Tahir (et al.) Guidelines for an Energy Efficient Tuning of the NB-IoT Stack 2020
Fritsch, Lothar Identification collapse - contingency in Identity Management 2020
Fritsch, Lothar Identity Management as a target in cyberwar 2020
Kitkowska, Agnieszka ; Wästlund, Erik ; Martucci, Leonardo (In)escapable Affect? Exploring Factors Influencing Privacy-RelatedBehavioral Intentions 2020
Rajiullah, Mohammad (et al.) Mobile Network Performance during the COVID-19 Outbreak from a Testbed Perspective 2020
Voronkov, Artem ; Martucci, Leonardo Natural vs. Technical Language Preference and its Impact on Firewall Configuration 2020
Momen, Nurul ; Bock, S. Neither Do I Want to Accept, nor Decline; Is There an Alternative? 2020
Bock, Sven ; Momen, Nurul Nudging the User with Privacy Indicator: A Study on the App Selection Behavior of the User 2020
Nguyen, Van-Giang (et al.) On the Use of a Virtualized 5G Core for Time Critical Communication in Smart Grid 2020
Ahmed, Bestoun S. Open-source Defect Injection Benchmark Testbed for the Evaluation of Testing 2020
Schlehahn, Eva (et al.) Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics 2020
Sharma, Yogesh (et al.) Performance benchmarking of virtualized network functions to correlate key performance metrics with system activity 2020
Toresson, Ludwig (et al.) PISA: A Privacy Impact Self-assessment App Using Personas to Relate App Behavior to Risks to Smartphone Users 2020
Klima, Matej (et al.) Quality and Reliability Metrics for IoT Systems: A Consolidated View 2020
Fischer-Hübner, Simone (et al.) Quality Criteria for Cyber Security MOOCs 2020
Pettersson, John Sören The Utility of Digitally Supported Manual Interactive Mockups 2020
Herold, Sebastian (et al.) Towards Improving Software Architecture Degradation Mitigation by Machine Learning 2020
Alaqra, Ala Sarah (et al.) Using PAPAYA for eHealth – Use Case Analysis and Requirements 2020
Bagnato, A. (et al.) Workshop on privacy challenges in public and private organizations 2020
Amend, Markus (et al.) A Framework for Multiaccess Support for Unreliable Internet Traffic Using Multipath DCCP 2019
Bauschert, Thomas (et al.) A matheuristic for green and robust 5G virtual network function placement 2019
Hatamian, Majid (et al.) A Multilateral Privacy Impact Analysis Method for Android Apps 2019
Theocharis, Andreas ; Popov, Marjan A piece-wise linearized transformer winding model for the analysis of internal voltage propagation 2019
Dahlberg, Rasmus (et al.) Aggregation-Based Certificate Transparency Gossip 2019
Ahmad, Muhammad Ovais Agile methods and cyber-physical systems development: A review with preliminary analysis 2019
Boodaghian Asl, Arsineh ; Gokan Khan, Michel An Empirical Study On GUI-ii Interview Methods In Participatory Design 2019
Ahmad, Muhammad Ovais Antecedents To Achieve Kanban Optimum Benefits In Software Companies 2019
HoseinyFarahabady, MohammadReza (et al.) Dynamic Control of CPU Cap Allocations in Stream Processing and Data-Flow Platforms 2019
Iwaya, Leonardo H (et al.) E-Consent for Data Privacy: Consent Management for Mobile Health Technologies in Public Health Surveys and Disease Surveillance 2019
Veseli, Fatbardh (et al.) Engineering privacy by design: Lessons from the design and implementation of an identity wallet platform 2019
Santos, Ricardo (et al.) Fast Steerable Wireless Backhaul Reconfiguration 2019
Hernandez Benet, Cristian ; Kassler, Andreas FlowDyn: Towards a Dynamic Flowlet Gap Detection using Programmable Data Planes 2019
Yedugundla, Kiran ; Hurtig, Per ; Brunström, Anna Handling Packet Losses in Cloud-Based Application Traffic 2019
Colesky, Michael (et al.) Helping Software Architects Familiarize with the General Data Protection Regulation 2019
Liu, Zihao ; Halonen, Raija ; Ahmad, Muhammad Ovais ICT support supporting healting healthcare for chinese elderl thcare for chinese elderly at home: perspectives of informal caregivers and professionalsICT suppor t supporting heal ting healthcare for chinese elderl thcare for chinese elderly at home: perspectives of informal caregivers and professionals 2019
Abbas, Muhammad Tahir (et al.) Impact of Tunable Parameters in NB-IoT Stack onthe Energy Consumption 2019
Garcia, Johan (et al.) Interactions Between Train Velocity andCellular Link Throughput - An Extensive Study 2019
Bhamare, Deval (et al.) IntOpt: In-Band Network Telemetry Optimization for NFV Service Chain Monitoring 2019
Ahlgren, Bengt (et al.) Latency-aware Multipath Scheduling inInformation-centric Networks 2019
Sundberg, Simon ; Garcia, Johan Localization Performance for eNodeBs using Solitary and Fused RSS-Modeling Approaches 2019
Parichehreh, Ali (et al.) LTE as a Road Toward 5G: QoS Analysis in Mobility Scenario Using The Monroe Platform 2019
Garcia, Johan ; Sundberg, Simon ; Brunstrom, Anna LTE for Trains - Performance Interactions Examined with DL, ML and Resampling 2019
Tavallaie, O. ; Taheri, Javid ; Zomaya, A. Y. MARA: Mobility-Aware Rate Adaptation for Low Power IoT Networks Using Game Theory 2019
Shamseddine, Maha (et al.) Mitigating Rogue Node Attacks in Edge Computing 2019
Galletta, A. ; Taheri, Javid ; Villari, M. On the applicability of secret share algorithms for saving data on iot, edge and cloud devices 2019
Fischer, Andreas ; Bhamare, Deval ; Kassler, Andreas On the Construction of Optimal Embedding Problems for Delay-Sensitive Service Function Chains 2019
Alizadeh Noghani, Kyoomars ; Kassler, Andreas ; Taheri, Javid On the Cost-Optimality Trade-off for Service Function Chain Reconfiguration 2019
Nguyen, Van-Giang (et al.) On the Use of 5G for Inter-substation GOOSE Transmission in Smart Grid 2019
Khoshkholghi, Mohammad Ali (et al.) Optimized Service Chain Placement Using Genetic Algorithm 2019
Nakamura, M. (et al.) Performance evaluation of prefetching algorithm for real-time edge content delivery in 5G system 2019
Høiland-Jørgensen, Toke ; Hurtig, Per ; Brunström, Anna PoliFi: Airtime Policy Enforcement for WiFi 2019
Al-Dulaimy, Auday (et al.) Privacy-Aware Job Submission in the Cloud 2019
Vestin, Jonathan (et al.) Programmable Event Detection for In-Band Network Telemetry 2019
Tavallaie, O. ; Taheri, Javid ; Zomaya, A. Y. QCF: QoS-Aware Communication Framework for Real-Time IoT Services 2019
Haile, Habtegebreil Kassaye (et al.) Rate Change Detection in Stationary Cellular Nodes 2019
Haile, Habtegebreil Kassaye ; Hurtig, Per ; Grinnemo, Karl-Johan Rate Measurement Over Short Time Scales inStationary Cellular Receivers 2019
Alaqra, Ala Sarah ; Wästlund, Erik Reciprocities or Incentives?: Understanding Privacy Intrusion Perspectives and Sharing Behaviors 2019
Alizadeh Noghani, Kyoomars ; Kassler, Andreas Reconfiguration of Service Function Chains: Trade-off between Optimality and Effort 2019
Ahmad, Muhammad Ovais Software factory project for enhancement of student experiential learning 2019
Zamli, K. Z. (et al.) Software module clustering based on the fuzzy adaptive teaching learning based optimization algorithm 2019
Boodaghian Asl, Arsineh ; Gokan Khan, Michel Studying the effect of online medical applications on patients healing time and doctors utilization using discrete event simulation 2019
Voronkov, Artem ; Martucci, Leonardo ; Lindskog, Stefan System Administrators Prefer Command Line Interfaces, Don’t They?: An Exploratory Study of Firewall Interfaces 2019
Ahmed, Bestoun S. ; Bures, M. Testing of Smart TV applications: Key ingredients, challenges and proposed solutions 2019
Murmann, Patrick ; Reinhardt, Delphine ; Fischer-Hübner, Simone To Be, or Not to Be Notified: Eliciting Privacy Notification Preferences for Online mHealth Services 2019
Ahmed, Bestoun S. (et al.) Towards an Automated Unified Framework to Run Applications for Combinatorial Interaction Testing 2019
Langlet, Jonatan ; Kassler, Andreas ; Bhamare, Deval Towards Neural Network Inference on Programmable Switches 2019
Afzal, Zeeshan (et al.) Using Partial Signatures in Intrusion Detection for Multipath TCP 2019
Oljira, Dejene Boru (et al.) Validating the Sharing Behavior and Latency Characteristics of the L4S Architecture 2019
Rajiullah, Mohammad (et al.) Web Experience in Mobile Networks: Lessons from Two Million Page Visits 2019
Arvidsson, Åke (et al.) Web metrics for the next generation performance enhancing proxies 2019
Angulo, Julio ; Ortlieb, Martin “WTH..!?!” Experiences, reactions, and expectations related to online privacy panic situations 2019
Koumaras, Harilaos (et al.) 5GENESIS: The Genesis of a flexible 5G Facility 2018
Garcia, Johan A Fragment Hashing Approach for Scalable and Cloud-Aware Network File Detection 2018
Alizadeh Noghani, Kyoomars ; Ghazzai, Hakim ; Kassler, Andreas A Generic Framework for Task Offloading in mmWave MEC Backhaul Networks 2018
Sinkala, Zipani Tom ; Blom, Martin ; Herold, Sebastian A mapping study of software architecture recovery for software product lines 2018
Fischer-Hübner, Simone (et al.) A MOOC on Privacy by Design and the GDPR 2018
Rabitsch, Alexander ; Hurtig, Per ; Brunström, Anna A Stream-Aware Multipath QUIC Scheduler for Heterogeneous Paths 2018
Grazia, Carlo Augusto (et al.) Adapting TCP Small Queues for IEEE 802.11 Networks 2018
Mayer, Peter ; Volkamer, Melanie Addressing misconceptions about password security effectively 2018
Fritsch, Lothar ; Fischer-Hübner, Simone Applications of Privacy and Security Research in the Upcoming Battlefield of Things 2018
Gokan Khan, Michel (et al.) Automated Analysis and Profiling of VirtualNetwork Functions: the NFV-Inspector Approach 2018
Garcia, Johan ; Brunström, Anna Clustering-based separation of media transfers in DPI-classified cellular video and VoIP traffic 2018
Abrahamsson, Henrik (et al.) Connected Vehicles in Cellular Networks: Multi-access versus Single-access Performance 2018
Nasim, Robayet (et al.) Cost-Efficient Resource Scheduling under QoS Constraints for Geo-Distributed Data Centers 2018
Garcia, Johan Duplications and Misattributions of File Fragment Hashes in Image and Compressed Files 2018
Garcia, Johan ; Korhonen, Topi Efficient Distribution-Derived Features for High-Speed Encrypted Flow Classification 2018
Özgü, Alay (et al.) End to End 5G Measurements with MONROE: Challenges and Opportunities 2018
Alizadeh Noghani, Kyoomars ; Kassler, Andreas ; Sankar Gopannan, Prem EVPN/SDN Assisted Live VM Migration between Geo-Distributed Data Centers 2018
Mandalari, Anna Maria (et al.) Experience: Implications of Roaming in Europe 2018
Vestin, Jonathan ; Kassler, Andreas ; Akerberg, Johan FastReact: In-Network Control And Caching For Industrial Control Networks Using Programmable Data Planes 2018
Länger, Thomas (et al.) HCI patterns for cryptographically equipped cloud services 2018
Ahlgren, Bengt (et al.) ICN Congestion Control for Wireless Links 2018
Hurtig, Per (et al.) Impact of TCP BBR on CUBIC Traffic: A mixed workload evaluation 2018
Pieskä, Marcus (et al.) Improving TCP Fairness over Latency Controlled 5G mmWave Communication Links 2018
Hatamian, Majid (et al.) “It’s shocking!": Analysing the impact and reactions to the A3: Android apps behaviour analyser 2018
Lenhard, Jörg (et al.) Lessons Learned from Evaluating Workflow Management Systems 2018
Oljira, Dejene Boru (et al.) MDTCP: Towards a Practical Multipath Transport Protocol for Telco Cloud Datacenters 2018
Parichehreh, Ali ; Alfredsson, Stefan ; Brunström, Anna Measurement Analysis of TCP Congestion Control Algorithms in LTE Uplink 2018
Iwaya, Leonardo H (et al.) mHealth: A Privacy Threat Analysis for Public Health Surveillance Systems 2018
Hernandez Benet, Cristian (et al.) MP-HULA: Multipath transport aware load balancing using programmable data planes 2018
Gokan Khan, Michel (et al.) NFV-Inspector: A Systematic Approach to Profile and Analyze Virtual Network Functions 2018
Nguyen, Van-Giang (et al.) On Load Balancing for a Virtual and Distributed MME in the 5G Core 2018
Johansson, David ; Kassler, Andreas ; Taheri, Javid On the Energy Cost of Robustness and Resiliency for Virtual Network Function Placement 2018
Santos, Ricardo ; Ghazzai, Hakim ; Kassler, Andreas Optimal Steerable mmWave Mesh Backhaul Reconfiguration 2018
Iwaya, Leonardo H. (et al.) Overview of Privacy Challenges in Mobile Health Data Collection Systems 2018
Høiland-Jørgensen, Toke ; Täht, Dave ; Morton, Jonathan Piece of CAKE: A Comprehensive Queue Management Solution for Home Gateways 2018
Kosta, E. (et al.) Preface 2018
Zeljkovic, Ensar (et al.) Proactive Access Point Driven Handovers in IEEE 802.11 Networks 2018
Kitkowska, Agnieszka Reaching Beyond Borders: Investigating Differences in Privacy Harms Concerns 2018
Koslowski, Konstantin (et al.) SDN Orchestration to Optimize Meshed Millimeter-Wave Backhaul Networks for MEC-enhanced eMBB Use Cases 2018
Chiaro, Pasquale (et al.) Secure and privacy-friendly storage and data processing in the cloud 2018
Abrahamsson, Henrik (et al.) Selecting Operator in 3G/4G Networks for Time-Critical C-ITS Applications 2018
Afzal, Zeeshan (et al.) Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications 2018
Pulls, Tobias ; Dahlberg, Rasmus Steady: A Simple End-to-End Secure Logging System 2018
Kühlewind, Mirja (et al.) TAPS: an abstract application interface for QUIC 2018
Kosta, Eleni (et al.) The Smart World Revolution 2018
Hoseinyfarahabady, M. Reza (et al.) Toward designing a dynamic CPU cap manager for timely dataflow platforms 2018
Garcia, Johan (et al.) Towards Video Flow Classification at a Million Encrypted Flows Per Second 2018
Ghazzai, Hakim (et al.) Trajectory Optimization for Cooperative Dual-Band UAV Swarms 2018
Momen, Nurul Turning the Table Around: Monitoring App Behavior 2018
Murmann, Patrick Usable Transparency for Enhancing Privacy in Mobile Health Apps 2018
Karegar, Farzaneh (et al.) User Evaluations of an App Interface for Cloud-Based Identity Management 2018
Dahlberg, Rasmus ; Pulls, Tobias Verifiable Light-Weight Monitoring for Certificate Transparency Logs 2018
Gustiené, Prima Visualization for Open Access: A Case Study of Karlstad University and the University of Makerere in Uganda 2018
Garcia, Johan A clustering-based analysis of DPI-labeled video flow characteristics in cellular networks 2017
Hoseiny Farahabady, Mohammad Reza (et al.) A Dynamic Resource Controller for a Lambda Architecture 2017
Lenhard, Jörg ; Fritsch, Lothar ; Herold, Sebastian A Literature Study on Privacy Patterns Research 2017
Oljira, Dejene Boru (et al.) A Model for QoS-Aware VNF Placement and Provisioning 2017
Hurtig, Per (et al.) A NEAT Approach to Mobile Communication 2017
Santos, Ricardo (et al.) A NEAT framework for application-awareness in SDN environments 2017
Bozakov, Zdravko (et al.) A NEAT framework for enhanced end-host integration in SDN environments 2017
Weinrank, Felix (et al.) A NEAT Way to Browse the Web 2017
Harrer, Simon (et al.) A Pattern Language for Workflow Engine Conformance and Performance Benchmarking 2017
Nasim, Robayet ; Kassler, Andreas A Robust Tabu Search Heuristic for VM Consolidation under Demand Uncertainity in Virtualized Datacenters 2017
Mayer, Peter ; Kirchner, Jan ; Volkamer, Melanie A second look at password composition policies in the wild: Comparing samples from 2010 and 2016 2017
Kulyk, Oksana (et al.) Advancing Trust Visualisations for Wider Applicability and User Acceptance 2017
Reuben, Jenni ; Fischer-Hübner, Simone An Authorization Model for Data Modeled using Semantic Web Technologies 2017
Lenhard, Jörg (et al.) Are Code Smell Detection Tools Suitable For Detecting Architecture Degradation? 2017
Karegar, Farzaneh (et al.) Assessments of a Cloud-Based Data Wallet for Personal Identity Management 2017
Alizadeh Noghani, Kyoomars (et al.) Automating Ethernet VPN deployment in SDN-based Data Centers 2017
Fida, Mah-Rukh (et al.) Demo: experimentation in controlled and operational LTE settings with FLEX-MONROE 2017
Fritsch, Lothar ; Momen, Nurul Derived Partial Identities Generated from App Permissions 2017
Neumann, Stephan ; Reinheimer, Benjamin Maximmilian ; Volkamer, Melanie Don’t Be Deceived: The Message Might Be Fake 2017
Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie Election-Dependent Security Evaluation of Internet Voting Schemes 2017
Høiland-Jørgensen, Toke (et al.) Ending the Anomaly: Achieving Low Latency and Airtime Fairness in WiFi 2017
Garcia, Johan ; Alfredsson, Stefan ; Brunström, Anna Examining cellular access systems on trains: Measurements and change detection 2017
Alay, Özgü (et al.) Experience: An open platform for experimentation with commercial mobile broadband networks 2017
Høiland-Jørgensen, Toke (et al.) Flent: The FLExible Network Tester 2017
Momen, Nurul (et al.) How much Privilege does an App Need? Investigating Resource Usage of Android Apps 2017
Agapi, Mesodiakaki ; Zola, Enrica ; Kassler, Andreas Joint User Association and Backhaul Routing for Green 5G Mesh Millimeter Wave Backhaul Networks 2017
Vestin, Jonathan ; Kassler, Andreas Low frequency assist for mmWave backhaul - the case for SDN resiliency mechanisms 2017
Beckman, Claes (et al.) On the Impact of Velocity on the Train-to-Earth MIMO Propagation Channel: Statistical Observations and Qualitative Analysis 2017
Atxutegi, Eneko (et al.) On the move with TCP in current and future mobile networks 2017
Hernandez Benet, Cristian (et al.) OpenStackEmu - A Cloud Testbed Combining Network Emulation with OpenStack and SDN 2017
Fritsch, Lothar Partial commitment – "Try before you buy" and "Buyer’s remorse" for personal data in Big Data & Machine learning 2017
Hernandez Benet, Cristian (et al.) Policy-based routing and load balancing for EVPN-based data center interconnections 2017
Fritsch, Lothar Privacy dark patterns in identity management 2017
Yedugundla, Kiran ; Hurtig, Per ; Brunström, Anna Probe or Wait: Handling tail losses using Multipath TCP 2017
Taheri, Javid ; Cho, Daewoong ; Zomaya, Albert Y Real-Time Virtual Network Function (VNF) Migration toward Low Network Latency in Cloud Environments 2017
Pieskä, Marcus ; Kassler, Andreas Reducing the Latency of TCP for 5G mmWave Links 2017
Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie Reliable behavioural factors in the information security context 2017
Peón-Quirós, Miguel (et al.) Results from Running an Experiment as a Service Platform for Mobile Networks 2017
Vestin, Jonathan ; Kassler, Andreas SDN enabled resiliency in LTE assisted small cell mmWave backhaul networks 2017
Alizadeh Noghani, Kyoomars ; Kassler, Andreas SDN Enhanced Ethernet VPN for Data Center Interconnect 2017
Bernhard, David ; Oksana, Kulyk ; Volkamer, Melanie Security proofs for Participation privacy, receipt-freeness and ballot privacy for the helios voting scheme 2017
Kulyk, Oksana ; Reinheimer, Benjamin Maximillian ; Volkamer, Melanie Sharing Information with Web Services: A Mental Model Approach in the Context of Optional Information 2017
Santos, Ricardo ; Kassler, Andreas Small Cell Wireless Backhaul Reconfiguration Using Software-Defined Networking 2017
Khatouni, Ali Safari (et al.) Speedtest-like Measurements in 3G/4G Networks: the MONROE Experience 2017
Pieskä, Marcus ; Kassler, Andreas TCP Performance over 5G mmWave Links - Tradeoff between Capacity and Latency 2017
Greschbach, Benjamin (et al.) The Effect of DNS on Tor´s Anonymity 2017
Knodel, Jens ; Buckley, Jim ; Herold, Sebastian The need for an open corpus of software architecture descriptions 2017
Momen, Nurul ; Piekarska, Marta Towards Improving Privacy Awareness Regarding Apps’ Permissions 2017
Kostopoulos, Alexandros (et al.) Towards the Adoption of Secure Cloud Identity Services 2017
Garcia, Johan (et al.) Train Velocity and Data Throughput: A Large Scale LTE Cellular Measurements Study 2017
Santos, Ricardo (et al.) Turning the knobs on OpenFlow-based resiliency in mmWave small cell meshed networks 2017
Rajiullah, Mohammad (et al.) Understanding Multistreaming for Web Traffic: An Experimental Study 2017
Mesodiakaki, Agapi ; Zola, Enrica ; Kassler, Andreas User Association in 5G Heterogeneous Networks with Mesh Millimeter Wave Backhaul Links 2017
Cho, Daewoong (et al.) Virtual Network Function Placement: Towards Minimizing Network Latency and Lead Time 2017
Karegar, Farzaneh ; Pulls, Tobias ; Fischer-Hübner, Simone Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This? 2017
Ferme, Vincenzo (et al.) Workflow Management Systems Benchmarking: Unfulfilled Expectations and Lessons Learned 2017
Ahmed, Bestoun S. ; Gambardella, L. M. ; Zamli, K. Z. A new approach to speed up combinatorial search strategies using stack and hash table 2016
Marotta, Antonio ; Kassler, Andreas A Power Efficient and Robust Virtual Network Functions Placement Problem 2016
Santos, Ricardo ; Kassler, Andreas A SDN Controller Architecture for Small Cell Wireless Backhaul using a LTE Control Channel 2016
Afzal, Zeeshan (et al.) A Wireless Intrusion Detection System for 802.11 networks 2016
Gilje Jaatun, Martin (et al.) Accountability Through Transparency for Cloud Customers 2016
Oljira, Dejene Boru (et al.) Analysis of Network Latency in Virtualized Environments 2016
Reuben, Jenni ; Martucci, Leonardo A ; Fischer-Hübner, Simone Automated Log Audits for Privacy Compliance Validation: A Literature Survey 2016
Robert, Rémi (et al.) Behaviour of common TCP variants over LTE 2016
Kulyk, Oksana (et al.) Coercion-resistant Proxy Voting 2016
Kulyk, Oksana ; Volkamer, Melanie Efficiency Comparison of Various Approaches in E-Voting Protocols 2016
Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna Efficient Scheduling to Reduce Latency for Signaling Traffic using CMT-SCTP 2016
Dahlberg, Rasmus ; Pulls, Tobias ; Peeters, Roel Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs 2016
Kulyk, Oksana (et al.) Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do 2016
Mesodiakaki, Agapi (et al.) Energy Efficient Line-of-Sight Millimeter Wave Small Cell Backhaul: 60, 70, 80 or 140 GHz? 2016
Garcia, Johan ; Alfredsson, Stefan ; Brunström, Anna Estimating data transfer capacity for intermittent connectivity: A transport aware model 2016
Herold, Sebastian ; Blom, Martin ; Buckley, Jim Evidence in Architecture Degradation and Consistency Checking Research: Preliminary Results from a Literature Review 2016
Garcia, Johan ; Hurtig, Per Getting What You Want When You Want It: Deterministic Network Emulation 2016
Marotta, Antonio ; Kassler, Andreas Green Virtual Network Functions Placement Under Uncertainty Constraints 2016
Winter, Philipp (et al.) Identifying and characterizing Sybils in the Tor network 2016
Peeters, Roel ; Pulls, Tobias Insynd: Improved Privacy-Preserving Transparency Logging 2016
Kulyk, Oksana (et al.) Introducing Proxy Voting to Helios 2016
Oljira, Dejene Boru (et al.) Measurement and Analysis of Network Performance in Virtualized Environments 2016
Alay, Özgü (et al.) Measuring and Assessing Mobile Broadband Networks with MONROE 2016
Høiland-Jørgensen, Toke (et al.) Measuring Latency Variation in the Internet 2016
Hernandez Benet, Cristian ; Alizadeh Noghani, Kyoomars ; Kassler, Andreas Minimizing Live VM Migration Downtime Using OpenFlow based Resiliency Mechanisms 2016
Alay, Özgü (et al.) MONROE, a distributed platform to measure and assess mobile broadband networks: demo 2016
Papastergiou, Georgios (et al.) On the Cost of Using Happy Eyeballs for Transport Protocol Selection 2016
Geiger, Matthias (et al.) On the Evolution of BPMN 2.0 Support and Implementation 2016
Iwaya, L H (et al.) Ontology-based Obfuscation and Anonymisation for Privacy: A Case Study on Healthcare 2016
Karegar, Farzaneh (et al.) Opportunities and challenges of CREDENTIAL: Towards a metadata-privacy respecting identity provider 2016
Nasim, Robayet ; Taheri, Javid ; Kassler, Andreas Optimizing Virtual Machine Consolidation in Virtualized Datacenters Using Resource Sensitivity 2016
Luz, Saturnino ; Kane, Bridget Perspectives on intelligent systems support for multidisciplinary medical teams 2016
Reuben, Jenni (et al.) Privacy Impact Assessment Template for Provenance 2016
Samani, Hamid R. Dehghani ; Taheri, Javid ; Zomaya, Albert Y. RBT-MF: a Distributed Rubber Band Technique for Maximum Flow Problem in Azure 2016
Vestin, Jonathan ; Kassler, Andreas Resilient SDN based Small Cell Backhaul Networks using mm Wave Bands 2016
Ruebsamen, Thomas ; Pulls, Tobias ; Reich, Christoph Security and Privacy Preservation of Evidence in Cloud Accountability Audits 2016
Alaqra, Ala (et al.) Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario 2016
Eklund, Johan ; Grinnemo, Karl-Johan ; Brunström, Anna Stream-aware Scheduling to Improve Latency for Signaling Traffic using CMT-SCTP 2016
Atxutegi, Eneko (et al.) TCP behaviour in LTE: impact of flow start-up and mobility 2016
Hassan, Mahdi Mohammad (et al.) Testability and software performance: A systematic mapping study 2016
Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin TORPEDO: TOoltip-poweRed Phishing Email DetectiOn 2016
Grinnemo, Karl-Johan (et al.) Towards a Flexible Internet Transport Layer Architecture 2016
Fischer-Hübner, Simone (et al.) Transparency, Privacy and Trust: Technology for Tracking and Controlling my Data Disclosures – Does this work? 2016
Taheri, Javid ; Zomaya, Albert ; Kassler, Andreas vmBBThrPred: A Black-Box Throughput Predictor for Virtual Machines in Cloud Environments 2016
Gutmann, Andreas (et al.) ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology 2016
Grinnemo, Karl-Johan ; Brunström, Anna A First Study on Using MPTCP to Reduce Latency for Cloud Based Mobile Applications 2015
Sepasian, Neda ; Kumar, Kundan ; Breeuwer, Marcel A geometrical approach to find corresponding patches in 3D medical surfaces 2015
Volkamer, Melanie (et al.) A Socio-Technical Investigation into Smartphone Security 2015
Kolb, Stefan ; Lenhard, Jörg ; Wirtz, Guido Application Migration Effort in the Cloud: The Case of Cloud Platforms 2015
Blom, Martin ; Hassan, Mohammad Mahdi Applying clustering to analyze opinion diversity 2015
Afzal, Zeeshan ; Lindskog, Stefan Automated Testing of IDS Rules 2015
Pulls, Tobias ; Peeters, Roel Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure 2015
Voronkov, Artem ; Lindskog, Stefan ; Martucci, Leonardo Challenges in Managing Firewalls 2015
Garcia, Johan ; Alfredsson, Stefan ; Brunstrom, Anna Delay metrics and delay characteristics: A study of four Swedish HSDPA+ and LTE networks 2015
Volkamer, Melanie (et al.) Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness 2015
Kulyk, Oksana (et al.) Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting 2015
Zola, Enrica ; Kassler, Andreas Energy Efficient Control of Virtual Machine Consolidation under Uncertain Input Parameters for the Cloud 2015
Zola, Enrica ; Kassler, Andreas Energy Efficient Virtual Machine Consolidation under Uncertain Input Parameters for Green Data Centers 2015
Garcia, Johan ; Alfredsson, Stefan ; Brunström, Anna Examining TCP Short Flow Performance in Cellular Networks Through Active and Passive Measurements 2015
Garcia, Johan Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints 2015
Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie Extending Helios Towards Private Eligibility Verifiability 2015
Söderman, Pehr (et al.) Mind the SmartGap: A Buffer Management Algorithm for Delay Tolerant Wireless Sensor Networks 2015
Zola, Erica ; Kassler, Andreas Minimizing the Impact of Handover in WLAN: A Study on Performance Optimization 2015
Oljira, Dejene Boru (et al.) Models for Efficient Data Replication in Cloud Computing Datacenters 2015
Yedugundla, Kiran ; Hurtig, Per ; Brunström, Anna Multipath TCP: Can it Reduce Transport Latency for Web Traffic? 2015
Afzal, Zeeshan ; Lindskog, Stefan Multipath TCP IDS Evasion and Mitigation 2015
Santos, Ricardo ; Curadoo, Marilia ; Kassler, Andreas Multipathing In Software Defined Networking: Interaction between SDN and MPTCP 2015
Nasim, Robayet ; Kassler, Andreas Network-centric Performance Improvement for Live VM Migration 2015
Vestin, Jonathan ; Kassler, Andreas QoS Enabled WiFi MAC Layer Processing as an Example of a NFV Service 2015
Vestin, Jonathan ; Kassler, Andreas QoS Management for WiFi MAC layer processing in the Cloud: Demo Description 2015
Hurtig, Per (et al.) Reducing Transport Latency using Multipath Protocols 2015
Vestin, Jonathan ; Kassler, Andreas ; Akerberg, Johan Resilient Software Defined Networking for Industrial Control Networks 2015
Mayer, Peter ; Volkamer, Melanie Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing 2015
Rübsamen, Thomas ; Pulls, Tobias ; Reich, Christoph Secure Evidence Collection and Storage for Cloud Accountability Audits 2015
Alaqra, Ala(a) (et al.) Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements 2015
Kargar Bideh, Minoo (et al.) TADA: An Active Measurement Tool for Automatic Detection of AQM 2015
Hassan, Mahdi Mohammad (et al.) Testability and Software Robustness: A Systematic Literature Review 2015
Pettersson, John Sören ; Wik, Malin The longevity of general purpose Wizard-of-Oz tools 2015
Angulo, Julio Usable Transparency through network representations and analyses 2015
Angulo, Julio (et al.) Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures 2015
Pons, Xavier (et al.) An energy efficient vertical handover decision algorithm 2014
Garcia, Johan An Evaluation of Side-Information Assisted Forensic Hash Matching 2014
Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela Authentication Schemes - Comparison and Effective Password Spaces 2014
Bakar, Sakhinah Abu ; Taheri, Javid ; Zomaya, Albert Characterization of essential proteins based on network topology in proteins interaction networks 2014
Garcia, Johan Computer Assisted Reasoning as a Support for Knowledge Management 2014
Nasim, Robayet ; Kassler, Andreas Deploying OpenStack: Virtual Infrastructure or Dedicated Hardware 2014
Kulyk, Oksana (et al.) Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design 2014
Mesodiakaki, Agapi (et al.) Energy Impact of Outdoor Small Cell Backhaul in Green Heterogeneous Networks 2014
Budurushi, Jurlind (et al.) Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail 2014
Matloobi, Roozbeh ; Taheri, Javid ; Zomaya, Albert Fuzzy modeling to predict performance of collocated virtual machines in private clouds 2014
Anderson, Collin ; Winter, Philipp ; -, Roya Global Network Interference Detection over the RIPE Atlas Network 2014
Fischer-Hübner, Simone ; Angulo, Julio ; Pulls, Tobias How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used? 2014
Borges, Fabio ; Martucci, Leonardo iKUP keeps users' privacy in the Smart Grid 2014
Budurushi, Jurlind (et al.) Implementation and Evaluation of the EasyVote Tallying Component and Ballot 2014
Bartsch, Steffen (et al.) Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten 2014
Mesodiakaki, Agapi (et al.) Joint uplink and downlink cell selection in cognitive small cell heterogeneous networks 2014
Riggio, Roberto ; Oljira, Dejene Boru ; Rasheed, Tinku Joule: Software-Defined Energy Metering 2014
Lavén, Andreas ; Kassler, Andreas ; Brunstrom, Anna Latency Aware Anypath Routing and Channel Scheduling for Multi-Radio Wireless Mesh Networks 2014
Ribeck, Judy ; Borin, Lars Lexical Bundles in Swedish Secondary School Textbooks 2014
Hurtig, Per ; Brunström, Anna ; Kassler, Andreas MPTCP PathFinder: Datacenter Bandwidth Aggregation 2014
Canova, Gamze (et al.) NoPhish: An Anti-Phishing Education App 2014
Sharif, S. (et al.) Online Multiple Workflow Scheduling under Privacy and Deadline in Hybrid Cloud Environment 2014
Budurushi, Jurlind (et al.) Paper Audit Trails and Voters’ Privacy Concerns 2014
Dobrijevic, Ognjen (et al.) QoE-Driven Path Optimization Model for Multimedia Services 2014
Herold, Sebastian ; Mair, Matthias Recommending Refactorings to Re-establish Architectural Consistency 2014
Doganay, Kivanc (et al.) Search-Based Testing for Embedded Telecom Software with Complex Input Structures 2014
Borges, Fábio (et al.) Secure and Privacy-Friendly Public Key Generation and Certification 2014
Winter, Philipp (et al.) Spoiled Onions: Exposing Malicious Tor Exit Relays 2014
Ahmad, Muhammad Ovais ; Liukkunen, Kari ; Markkula, Jouni Student perceptions and attitudes towards the software factory as a learning environment 2014
Garcia, Johan The GATM Computer Assisted Reasoning Framework in a Security Policy Reasoning Context 2014
Harrer, Simon (et al.) Towards Uniform BPEL Engine Management in the Cloud 2014
Klockar, Annika (et al.) User-centric pre-selection and scheduling for coordinated multipoint systems 2014
Grinnemo, Karl-Johan ; Brunstrom, Anna ; Cheng, Jun Using Concurrent Multipath Transfer to Improve the SCTP Startup Behavior for PSTN Signaling Traffic 2014
Angulo, Julio ; Wästlund, Erik ; Johan, Högberg What Would It Take for You to Tell Your Secrets to a Cloud?: Studying decision factors when disclosing information to cloud services 2014
Renaud, Karen ; Volkamer, Melanie ; Renkema-Padmos, Arne Why doesn’t Jane protect her privacy? 2014
Nasim, Robayet ; Buchegger, Sonja XACML-Based Access Control for Decentralized Online Social Networks 2014
Alfredsson, Stefan A Case Study of Recent Mifare Classic Field Deployments From an (In-)Security Perspective 2013
Iwaya, Leonardo ; Rosso, R S U ; Hounsell, M S A Design for Assembly Application with Dynamic Information Retrieval from Case Database 2013
Volkamer, Melanie (et al.) Adopting the CMU/APWG anti-phishing landing page idea for Germany 2013
Renaud, Karen (et al.) Are Graphical Authentication Mechanisms As Strong As Passwords? 2013
Wu, Hao ; Taheri, Javid ; Zomaya, Albert B-Alarm: An Entropy Based Burst Traffic Prediction Approach for Ethernet Switches in Data Centers 2013
Chow, Lawrence (et al.) Channel Aware Rebuffering for Wireless Media Streaming with Handoff Control 2013
Herold, Sebastian ; Rausch, Andreas Complementing model-driven development for the detection of software architecture erosion 2013
Berthold, Stefan (et al.) Crime and Punishment in the Cloud: Accountability, Transparency, and Privacy 2013
Lenhard, Jörg ; Wirtz, Guido Detecting Portability Issues in Model-Driven BPEL Mappings 2013
Pulls, Tobias ; Peeters, Roel ; Wouters, Karel Distributed privacy-preserving transparency logging 2013
Mesodiakaki, Agapi (et al.) Energy Efficiency Analysis of Secondary Networks in Cognitive Radio Systems 2013
Oljira, Dejene Boru (et al.) Energy-Efficient Data Replication in Cloud Computing Datacenters 2013
Peeters, Roel ; Pulls, Tobias ; Wouters, Karel Enhancing Transparency with Distributed Privacy-Preserving Logging 2013
Zola, Enria (et al.) Expected Bit Rate for Terminals Moving According to the Random Waypoint Model in a WLAN Cell 2013
Beckerle, Matthias ; Martucci, Leonardo Formal Definitions for Usable Access Control Rule Sets: From Goals to Metrics 2013
Söderman, Pehr (et al.) Handover in the Wild: The Feasibility of Vertical Handover in Commodity Smartphones 2013
Angulo, Julio ; Wästlund, Erik Identity Management through “Profiles”: Prototyping an Online Information Segregation Service 2013
Alfredsson, Stefan (et al.) Impact of TCP Congestion Control on Bufferbloat in Cellular Networks 2013
Blom, Martin ; Eldh, Sigrid Is Common Test Data the Solution to Poor Quality?: Solving the Right Problem – An Analysis of a Public Health Information System 2013
Neumann, Stephan (et al.) Modeling the German Legal Latitude Principles 2013
Alfredsson, Stefan (et al.) Observations of Bufferbloat in Swedish Cellular Networks 2013
Harrer, Simon ; Lenhard, Jörg ; Wirtz, Guido Open Source versus Proprietary Software in Service-Orientation: The Case of BPEL Engines 2013
Angulo, Julio ; Wästlund, Erik Profiles: prototyping an online information segregation service 2013
Zola, Enrica (et al.) Robust Association for Multi-radio Devices under Coverage of Multiple Networks 2013
Winter, Philipp ; Pulls, Tobias ; Fuss, Juergen ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship 2013
Unander-Scharin, Åsa ; Unander-Scharin, Carl Sensory Digital Intonation 2013
Eldh, Sigrid Some researcher considerations when conducting empirical studies in industry 2013
Winter, Philipp Towards a Censorship Analyser for Tor 2013
Klockar, Annika (et al.) Utility as a User Selection Criterion for Coordinated Multi-Point Systems 2013
Gustas, Remigijus ; Gustiene, Prima A Graphical Method for Conceptual Modelling of Business and Software Scenarios 2012
Pearson, Siani (et al.) Accountability for cloud and other future Internet services 2012
Lundin, Reine ; Lindskog, Stefan An Investigation of Entropy of Selectively Encrypted Bitmap Images 2012
Söderman, Pehr (et al.) An SCTP-based Mobility Management Framework for Smartphones and Tablets 2012
Borges, Fábio ; Martucci, Leonardo ; Mühlhäuser, Max Analysis of privacy-enhancing protocols based on anonymity networks 2012
Cavalcanti de Castro, Marcel ; Kassler, Andreas ; Avallone, Stefano BestPeer: A Load-aware Multi-path Peer Selection for Wireless Mesh Networks 2012
Harrer, Simon ; Lenhard, Jörg ; Wirtz, Guido BPEL Conformance in Open Source Engines 2012
Kolb, Stefan ; Lenhard, Jörg ; Wirtz, Guido Bridging the Heterogeneity of Orchestrations - A Petri Net-based Integration of BPEL and Windows Workflow 2012
Paul, Thomas (et al.) C4PS-Helping Facebookers Manage Their Privacy Settings 2012
Neumann, Stephan ; Volkamer, Melanie Civitas and the Real World: Problems and Solutions from a Practical Point of View 2012
Dely, Peter (et al.) CloudMAC: An OpenFlow based Architecture for 802.11 MAC Layer Processing in the Cloud 2012
Moraveji, Reza (et al.) Data-Intensive Workload Consolidation on Hadoop Distributed File System 2012
Nasim, Robayet ; Kassler, Andreas Distributed Architectures for Intelligent Transport Systems: A Survey 2012
Mesodiakaki, Agapi (et al.) Energy-efficient contention-aware channel selection in Cognitive Radio Ad-Hoc Networks 2012
Hurtig, Per ; Brunstrom, Anna Enhanced Metric Caching for Short TCP Flows 2012
Rajiullah, Mohammad ; Brunström, Anna Evaluation and Analysis of NR-SACKs based PR-SCTP 2012
Wästlund, Erik ; Angulo, Julio ; Fischer-Hübner, Simone Evoking Comprehensive Mental Models of Anonymous Credentials 2012
Vliegen, Jo (et al.) Hardware strengthening a Distributed Logging Scheme 2012
Winter, Philipp ; Lindskog, Stefan How the Great Firewall of China is Blocking Tor 2012
Karlsson, Jonas (et al.) Impact of Multi-path Routing on TCP Performance 2012
Karlsson, Jonas (et al.) Impact of Multi-path Routing on TCP Performance in Wireless Mesh Networks 2012
Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna Implications of using a Large Initial Congestion Window to Improve mSCTP Handover Delay 2012
Christin, Delphine (et al.) IncogniSense: An anonymity-preserving reputation frameworkfor participatory sensing applications 2012
Pulls, Tobias (More) Side Channels in Cloud Storage: Linking Data to Users 2012
Rizvandi, Nikzad Babaii (et al.) Network Load Analysis and Provisioning of MapReduce Applications 2012
Andersson, Kerstin Numerical Evaluation of the Average Number of Successive Guesses 2012
Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna On the Use of an Increased Initial Congestion Window to Improve mSCTP Handover Performance 2012
Karlsson, Jonas (et al.) Performance Evaluation for TCP in Tactical Mobile Ad hoc Networks 2012
Chow, Lawrence (et al.) Playout-Buffer Aware Hand-Off Control for Wireless Video Streaming 2012
Martucci, Leonardo (et al.) Privacy, security and trust in cloud computing: The perspective of the telecommunication industry 2012
Pulls, Tobias Privacy-Friendly Cloud Storage for the Data Track: An Educational Transparency Tool 2012
Kassler, Andreas (et al.) Quality of Experience-based Routing in Multi-Service Wireless Mesh Networks 2012
Garcia, Johan Quantifying the Benefits of File Size Information for Forensic Hash Matching 2012
Eldh, Sigrid ; Sundmark, Daniel Robustness Testing of Mobile Telecommunication Systems: A Case Study on Industrial Practice and Challenges 2012
Söderman, Pehr (et al.) Sub-Second Transport Layer Vertical Handover Using mSCTP in Android Mobile Devices 2012
Eldh, Sigrid ; Punnekkat, Sasikumar Synergizing industrial needs and academic research for better software education 2012
Karlsson, Jonas (et al.) The Interaction Between TCP Reordering Mechanisms and Multi-path Forwarding in Wireless Mesh Networks 2012
Kassler, Andreas (et al.) Towards QoE-driven Multimedia Service Negotiation and Path Optimization with Software Defined Networking 2012
Angulo, Julio (et al.) Understanding the user experience of secure mobile online transactions in realistic contexts of use 2012
Ahammed, Farhan ; Taheri, Javid ; Zomaya, Albert Using simulated annealing to find lower bounds of localization with noisy measurements 2012
Ahammed, Farhan (et al.) VLOCI: Using Distance Measurements to Improve the Accuracy of Location Coordinates in GPS-Equipped VANETs 2012
Calvo, J.C. (et al.) A Method to Improve the Accuracy of Protein Torsion Angles 2011
Karlsson, Jonas (et al.) An Aggregation Aware Multi-path Forwarding Paradigm for Wireless Mesh Networks 2011
Karlsson, Jonas (et al.) An Aggregation Aware Multi-path Forwarding Paradigm for Wireless Mesh Networks : AA-L2R Aggregation Aware Multi-path Routing 2011
Wang, Tai-Chun ; Taheri, Javid ; Zomaya, Albert Averaging Measurement Strategies for Identifying Single Nucleotide Polymorphisms from Redundant Data Sets 2011
Hein, Patrick (et al.) Conflict Detection and Lifecycle Management for Access Control in Publish/Subscribe Systems 2011
Rajiullah, Mohammad (et al.) Data Modeling and Transport of Syslog Messages 2011
Eklund, Johan (et al.) Delay Penalty during SCTP Handover 2011
Lundin, Reine ; Lindskog, Stefan Entropy of Selectively Encrypted Strings 2011
Angulo, Julio ; Wästlund, Erik Exploring Touch-Screen Biometrics for User Identification on Smart Phones 2011
Ahammed, Farhan ; Taheri, Javid ; Zomaya, Albert Finding lower bounds of localization with noisy measurements using genetic algorithms 2011
Bakar, Sakhinah Abu ; Taheri, Javid ; Zomaya, Albert FIS-PNN: A Hybrid Computational Method for Protein-Protein Interactions Prediction Using the Secondary Structure Information 2011
Lundin, Reine ; Lindskog, Stefan Guesswork Changes in Multi-processor Attacks 2011
Bakar, Sakhinah Abu ; Taheri, Javid ; Zomaya, Albert Identifying Hub Proteins and Their Essentiality from Protein-protein Interaction Network 2011
Eklund, Johan (et al.) Impact of Slow Start on SCTP Handover Performance 2011
Eklund, Johan ; Brunstrom, Anna ; Grinnemo, Karl-Johan Improving mSCTP-based Vertical Handovers by Increasing the Initial Congestion Window 2011
Ries, Sebastian (et al.) Learning whom to trust in a privacy-friendly way 2011
Rajiullah, Mohammad ; Brunström, Anna On the Effectiveness of PR-SCTP in Networks with Competing Traffic 2011
Kassler, Andreas ; Dely, Peter ; Beyer, Nico OpenFlow for Wireless Mesh Networks 2011
Hurtig, Per ; Brunstrom, Anna Packet Reordering in TCP 2011
Castro C, Marcel (et al.) Peer-to-Peer Selection and Channel Assignment for Wireless Mesh Networks 2011
Rajiullah, Mohammad ; Brunström, Anna ; Lindskog, Stefan Priority Based Delivery of PR-SCTP Messages in a Syslog Context 2011
Brajdic, Agata ; Kassler, Andreas ; Matijasevic, Maja Quality of Experience based optimization of heterogeneous multimedia sessions in IMS 2011
Hurtig, Per ; John, Wolfgang ; Brunstrom, Anna Recent Trends in TCP Packet-Level Characteristics 2011
Kastrinogiannis, Timotheos ; Mesodiakaki, Agapi ; Papavassiliou, Symeon Service-oriented utility-based uplink power control in two-tier femtocell networks 2011
Hurtig, Per ; Brunström, Anna Short Flows and TCP Metric Caching in Linux 2011
Lenhard, Jörg ; Schönberger, Andreas ; Wirtz, Guido Streamlining Pattern Support Assessment for Service Composition Languages 2011
Rajiullah, Mohammad (et al.) Syslog Performance: Data Modeling and Transport 2011
Zhang, Ge ; Fischer-Huebner, Simone Timing Attacks on PIN Input in VoIP Networks: Short paper 2011
Berthold, Stefan Towards a Formal Language for Privacy Options 2011
Kassler, Andreas (et al.) TP-UrbanX - A New Transport Protocol for Cognitive Multi-Radio Mesh Networks 2011
Kim, Wooseong (et al.) Urban-X: A Self-Organizing Cognitive Wireless Mesh Network for Dense City Environments 2011
Jing, Su ; Kane, Bridget ; Luz, Saturnino Utilising Semantic Structures in the Interactions among Speakers at meetings 2011
Jungert, Erland (et al.) A generic architecture for surveillance systems 2010
Hedbom, Hans (et al.) Adding Secure Transparency Logging to the PRIME Core 2010
Dely, Peter (et al.) An Experimental Comparison of Burst Packet Transmission Schemes in IEEE 802.11-based Wireless Mesh Networks 2010
Jing, Su ; Kane, Bridget ; Luz, Saturnino Automatic meeting participant role detection by dialogue patterns 2010
Kassler, Andreas (et al.) Cognitive Multi-Radio Mesh Networks for the Future Wireless Internet 2010
Kim, Wooseong (et al.) Cognitive Multi-Radio Mesh Networks on ISM Bands: A Cross-Layer Architecture 2010
Reis, Andre B (et al.) Distortion Optimized Multi-Service Scheduling for Next-Generation Wireless Mesh Networks 2010
Trung Luong, Tuan (et al.) Efficient Channel Assignment and Routing Protocol for Multiple Channels Multiple Interfaces Wireless Mesh Network 2010
Hurtig, Per ; Brunström, Anna Emulation Support for Advanced Packet Reordering Models 2010
Lundin, Reine ; Lindskog, Stefan Extending the Definition of Guesswork 2010
Holleboom, Thijs Jan ; Garcia, Johan Fragment Retention Characteristics in Slack Space: Analysis and Measurements 2010
Dely, Peter (et al.) FUZPAG: A Fuzzy-Controlled Packet Aggregation Scheme for Wireless Mesh Networks 2010
Zhang, Ge ; Berthold, Stefan Hidden VoIP Calling Records from Networking Intermediaries 2010
Martucci, Leonardo ; Ries, Sebastian ; Mühlhäuser, Max Identifiers, Privacy and Trust in the Internet of Services 2010
Abdollahi, Kamran ; Shams Shafigh, Alireza ; Kassler, Andreas Improving Performance of On Demand Multicast Routing by deleting lost join query packet 2010
Shams Shafigh, Alireza ; Abdollahi, Kamran ; Kassler, Andreas Improving Performance of On Demand Multicast Routing by using Fuzzy Logic 2010
Beckerle, Matthias ; Martucci, Leonardo ; Ries, Sebastian Interactive access rule learning: Generating adapted access rule sets 2010
Blom, Martin Is Scrum and XP suitable for CSE Development? 2010
Cavalcanti de Castro, Marcel ; Kassler, Andreas ; Avallone, Stefano Measuring the Impact of ACI in Cognitive Multi-Radio Mesh Networks 2010
Lavén, Andreas ; Kassler, Andreas Multi-Channel Anypath Routing in Wireless Mesh Networks 2010
Cavalcanti de Castro, Marcel (et al.) On the comparison between performance of DHT-based protocols for opportunistic networks 2010
Zhang, Ge ; Fischer Hübner, Simone Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks 2010
Dely, Peter (et al.) Practical Considerations for Channel Assignment in Wireless Mesh Networks 2010
Zhang, Ge (et al.) Privacy and Identity Management for Life: 5th IFIP primelife international summer school revised selected papers 2010
Reis, Andre B. (et al.) Quality of Experience Optimized Scheduling in Multi-Service Wireless Mesh Networks 2010
Brunström, Anna Reliable and Secure Communication in SCTP 2010
Lundin, Reine ; Lindskog, Stefan Security Implications of Selective Encryption 2010
Lindskog, Stefan ; Faig, Zoltán ; Brunstrom, Anna Security Solution Suitability Analysis using Modified Multiplicative Analytic Hierarchy Process 2010
Zhang, Ge (et al.) SIP Proxies: New Reflectors? Attacks and Defenses 2010
Zhang, Ge (et al.) SIP Proxies: New Reflectors in the Internet 2010
Fischer Hübner, Simone ; Georgiadou, Yola Surveillance and Privacy 2010
Fischer Hübner, Simone The Conflict between Privacy and Digital Forensics 2010
Eklund, Johan ; Grinnemo, Karl-Johan ; Brunstrom, Anna Theoretical Analysis of an Ideal Startup Scheme in Multihomed SCTP 2010
Dely, Peter ; Kassler, Andreas ; Sivchenko, Dmitry Theoretical and Experimental Analysis of the Channel Busy Fraction in IEEE 802.11 2010
Weber, Stefan G. (et al.) Towards trustworthy identity and access management for the future internet 2010
Hedbom, Hans ; Pulls, Tobias Unlinking Database Entries: Implementation Issues in Privacy Preserving Secure Logging 2010
Kim, Wooseong (et al.) Urban-X: Towards Distributed Channel Assignment in Cognitive Multi-Radio Mesh Networks 2010
Lindskog, Stefan (et al.) Using System Call Information to Reveal Hidden Attack Manifestations 2010
Hurtig, Per (et al.) Using Triggers for Emulation of Opportunistic Networking 2010
Klockar, Annika (et al.) Utility of Joint Processing Schemes 2010
Berthold, Stefan ; Böhme, Rainer Valuating Privacy with Option Pricing Theory 2010