default search action
Rens W. van der Heijden
Person information
- affiliation: University of Ulm, Institute of Distributed Systems, Germany
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j3]Pascal Oser, Rens W. van der Heijden, Stefan Lüders, Frank Kargl:
Risk Prediction of IoT Devices Based on Vulnerability Analysis. ACM Trans. Priv. Secur. 25(2): 14:1-14:36 (2022) - 2020
- [c20]Joseph Kamel, Michael Wolf, Rens W. van der Heijden, Arnaud Kaiser, Pascal Urien, Frank Kargl:
VeReMi Extension: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. ICC 2020: 1-6 - [c19]Stephan Kleber, Rens W. van der Heijden, Frank Kargl:
Message Type Identification of Binary Network Protocols using Continuous Segment Similarity. INFOCOM 2020: 2243-2252 - [c18]Michael Wolf, Alexander Willecke, Johannes-Christian Müller, Keno Garlichs, Thomas Griebel, Lars C. Wolf, Michael Buchholz, Klaus Dietmayer, Rens W. van der Heijden, Frank Kargl:
Securing CACC: Strategies for Mitigating Data Injection Attacks. VNC 2020: 1-7 - [i7]Stephan Kleber, Rens W. van der Heijden, Frank Kargl:
Message Type Identification of Binary Network Protocols using Continuous Segment Similarity. CoRR abs/2002.03391 (2020)
2010 – 2019
- 2019
- [j2]Rens Wouter van der Heijden, Stefan Dietzel, Tim Leinmüller, Frank Kargl:
Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems. IEEE Commun. Surv. Tutorials 21(1): 779-811 (2019) - 2018
- [b1]Rens Wouter van der Heijden:
Misbehavior detection in cooperative intelligent transport systems. University of Ulm, Germany, 2018 - [c17]Rens W. van der Heijden, Henning Kopp, Frank Kargl:
Multi-Source Fusion Operations in Subjective Logic. FUSION 2018: 1990-1997 - [c16]Rens W. van der Heijden, Thomas Lukaseder, Frank Kargl:
VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. SecureComm (1) 2018: 318-337 - [c15]Matthias Matousek, Mahmoud Yassin, Ala'a Al-Momani, Rens W. van der Heijden, Frank Kargl:
Robust Detection of Anomalous Driving Behavior. VTC Spring 2018: 1-5 - [p1]Rens W. van der Heijden:
Misbehavior Detection in Cooperative Intelligent Transport Systems. Ausgezeichnete Informatikdissertationen 2018: 271-280 - [d1]Rens Wouter van der Heijden, Thomas Lukaseder, Frank Kargl:
Evaluation of misbehavior detection mechanisms in Maat using VeReMi. Zenodo, 2018 - [i6]Rens W. van der Heijden, Thomas Lukaseder, Frank Kargl:
VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. CoRR abs/1804.06701 (2018) - [i5]Rens W. van der Heijden, Henning Kopp, Frank Kargl:
Multi-Source Fusion Operations in Subjective Logic. CoRR abs/1805.01388 (2018) - 2017
- [c14]Thomas Lukaseder, Alexander Hunt, Christian Stehle, Denis Wagner, Rens W. van der Heijden, Frank Kargl:
An Extensible Host-Agnostic Framework for SDN-Assisted DDoS-Mitigation. LCN 2017: 619-622 - [c13]Rens W. van der Heijden, Felix Engelmann, David Mödinger, Franziska Schönig, Frank Kargl:
Blackchain: scalability for resource-constrained accountable vehicle-to-x communication. SERIAL@Middleware 2017: 4:1-4:5 - [c12]Rens W. van der Heijden, Thomas Lukaseder, Frank Kargl:
Analyzing attacks on cooperative adaptive cruise control (CACC). VNC 2017: 45-52 - [i4]Rens W. van der Heijden, Ala'a Al-Momani, Frank Kargl, Osama M. F. Abu-Sharkh:
Enhanced Position Verification for VANETs using Subjective Logic. CoRR abs/1703.10399 (2017) - [i3]Rens W. van der Heijden, Thomas Lukaseder, Frank Kargl:
Analyzing Attacks on Cooperative Adaptive Cruise Control (CACC). CoRR abs/1710.05789 (2017) - [i2]Rens W. van der Heijden, Felix Engelmann, David Mödinger, Franziska Schönig, Frank Kargl:
Blackchain: Scalability for Resource-Constrained Accountable Vehicle-to-X Communication. CoRR abs/1710.08891 (2017) - 2016
- [c11]Thomas Lukaseder, Leonard Bradatsch, Benjamin Erb, Rens W. van der Heijden, Frank Kargl:
A Comparison of TCP Congestion Control Algorithms in 10G Networks. LCN 2016: 706-714 - [c10]Dominik Meißner, Benjamin Erb, Rens W. van der Heijden, Kristin Lange, Frank Kargl:
Mobile triage management in disaster area networks using decentralized replication. CHANTS@MOBICOM 2016: 7-12 - [c9]Ala'a Al-Momani, Rens W. van der Heijden, Frank Kargl, Christian Waldschmidt:
Exploiting propagation effects for authentication and misbehavior detection in VANETs. VNC 2016: 1-4 - [c8]Rens W. van der Heijden, Ala'a Al-Momani, Frank Kargl, Osama M. F. Abu-Sharkh:
Enhanced Position Verification for VANETs Using Subjective Logic. VTC Fall 2016: 1-7 - [i1]Rens W. van der Heijden, Stefan Dietzel, Tim Leinmüller, Frank Kargl:
Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems. CoRR abs/1610.06810 (2016) - 2015
- [c7]Marouane Fazouane, Henning Kopp, Rens W. van der Heijden, Daniel Le Métayer, Frank Kargl:
Formal Verification of Privacy Properties in Electric Vehicle Charging. ESSoS 2015: 17-33 - [c6]Stephan Kleber, Rens W. van der Heijden, Henning Kopp, Frank Kargl:
Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions. NetSys 2015: 1-8 - [c5]Stefan Dietzel, Rens W. van der Heijden, Jonathan Petit, Frank Kargl:
Context-adaptive detection of insider attacks in VANET information dissemination schemes. VNC 2015: 287-294 - 2014
- [j1]Frank Kargl, Rens W. van der Heijden, Hartmut König, Alfonso Valdes, Marc Dacier:
Insights on the Security and Dependability of Industrial Control Systems. IEEE Secur. Priv. 12(6): 75-78 (2014) - [c4]Felix Engelmann, Thomas Lukaseder, Benjamin Erb, Rens W. van der Heijden, Frank Kargl:
Dynamic packet-filtering in high-speed networks using NetFPGAs. FGCT 2014: 55-59 - [c3]Stefan Dietzel, Julian Gürtler, Rens W. van der Heijden, Frank Kargl:
Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes. VNC 2014: 135-142 - [c2]Stefan Dietzel, Rens W. van der Heijden, Hendrik Decke, Frank Kargl:
A flexible, subjective logic-based framework for misbehavior detection in V2V networks. WoWMoM 2014: 1-6 - 2013
- [c1]Rens W. van der Heijden, Stefan Dietzel, Frank Kargl:
SeDyA: secure dynamic aggregation in VANETs. WISEC 2013: 131-142
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint