Magnusson, Jonathan |
Cybersecurity Mechanisms in DNS Resolvers: An Internet Measurement Perspective
|
2025 |
Sundberg, Simon |
Towards Ubiquitous and Continuous Network Latency Monitoring
|
2024 |
Rabitsch, Alexander |
Improving the Adaptability of the End-host: Service-aware Network Stack Tuning
|
2023 |
Abbas, Muhammad Tahir |
Improving the Energy Efficiency of Cellular IoT Device
|
2023 |
Mahjoubi, Ayeh |
Offline Task Scheduling in a Three-layer Edge-Cloud Architecture
|
2023 |
Bayram, Firas |
Towards Robust and Adaptive Machine Learning: A Fresh Perspective on Evaluation and Adaptation Methodologies in Non-Stationary Environments
|
2023 |
Wairimu, Samuel |
Privacy and Security Analysis: Assessing Risks and Harm to Patients
|
2022 |
Islami, Lejla |
Towards Usable Privacy and Identity Management for Smart Environments
|
2022 |
Gokan Khan, Michel |
Performance Modelling and Simulation of Service Chains for Telecom Clouds
|
2021 |
Yedugundla, Kiran |
Evaluating and Reducing Multipath Transport Latency
|
2019 |
Murmann, Patrick |
Towards Usable Transparency via Individualisation
|
2019 |
Santos, Ricardo |
5G Backhauling with Software-defined Wireless Mesh Networks
|
2018 |
Kitkowska, Agnieszka |
Advancing Models of Privacy Decision Making: Exploring the What & How of Privacy Behaviours
|
2018 |
Vestin, Jonathan |
SDN-Enabled Resiliency in Computer Networks
|
2018 |
Oljira, Dejene Boru |
Telecom Networks Virtualization: Overcoming the Latency Challenge
|
2018 |
Alaqra, Ala Sarah |
The Wicked Problem of Privacy: Design Challenge for Crypto-based Solutions
|
2018 |
Karegar, Farzaneh |
Towards Improving Transparency, Intervenability, and Consent in HCI
|
2018 |
Momen, Nurul |
Towards Measuring Apps' Privacy-Friendliness
|
2018 |
Nguyen, Van-Giang |
Towards SDN/NFV-based Mobile Packet Core: Benefits, Challenges, and Potential Solutions
|
2018 |
Alizadeh Noghani, Kyoomars |
Towards Seamless Live Migration in SDN-Based Data Centers
|
2018 |
Reuben, Jenni |
Privacy-aware Use of Accountability Evidence
|
2017 |
Afzal, Zeeshan |
Towards Secure Multipath TCP Communication
|
2017 |
Voronkov, Artem |
Usable Firewall Rule Sets
|
2017 |
Høiland-Jørgensen, Toke |
On the Bleeding Edge: Debloating Internet Access Networks
|
2016 |
Iwaya, Leonardo H |
Secure and Privacy-aware Data Collection and Processing in Mobile Health Systems
|
2016 |
Nasim, Robayet |
Architectural Evolution of Intelligent Transport Systems (ITS) using Cloud Computing
|
2015 |
Winter, Philipp |
Enhancing Censorship Resistance in the Tor Anonymity Network
|
2014 |
Lavén, Andreas |
Anypath Routing for Reducing Latency in Multi-Channel Wireless Mesh Networks
|
2013 |
Rajiullah, Mohammad |
Performance Analysis and Improvement of PR-SCTP in an Event Logging Context
|
2012 |
Pulls, Tobias |
Privacy-Preserving Transparency-Enhancing Tools
|
2012 |
Karlsson, Jonas |
Improving TCP Performance in Wireless Multi-hop Networks: Design of Efficient Forwarding and Packet Processing Techniques
|
2011 |
Berthold, Stefan |
Towards Inter-temporal Privacy Metrics
|
2011 |
Dely, Peter |
Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks
|
2010 |
Eklund, Johan |
On Switchover Performance in Multihomed SCTP
|
2010 |
Cavalcanti de Castro, Marcel |
Enabling Multimedia Services over Wireless Multi-Hop Networks
|
2009 |
Zhang, Ge |
Towards Secure SIP Signalling Service for VoIP applications: Performance-related Attacks and Preventions
|
2009 |
Lundin, Reine |
Towards Measurable and Tunable Security
|
2007 |
Lundin, Reine |
Towards Measurable and Tunable Security
|
2007 |
Andersson, Christer |
Enhancing Privacy for Mobile Networks: Examples of Anonymity Solutions and Their Analysis
|
2005 |
Alfredsson, Stefan |
TCP in Wireless Networks: Challenges, Optimizations and Evaluations
|
2005 |
Wennström (Klockar), Annika |
A Measurement Based Performance Study of TCP over GSM/GPRS
|
2004 |
Asplund, Katarina |
Implementation and Experimental Evaluation of a Partially Reliable Transport Protocol
|
2004 |
Asplund, Katarina |
Implementation and Experimental Evaluation of aPartially Reliable Transport Protocol
|
2004 |
Grinnemo, Karl-Johan |
A Study of Partially Reliable Transport Protocols for Soft Real-Time Applications
|
2002 |
Blom, Martin |
Semantic Aspects in Software Development
|
2002 |
Lindskog, Stefan |
Observations on Operating System Security Vulnerabilities
|
2000 |