default search action
Electronic Communication of the European Association of Software Science and Technology, Volume 80
Volume 80, 2022
- Mathias Fischer, Winfried Lamersdorf:
Preface and Table of Contents.
- Yevhenii Shudrenko, Daniel Plöger, Koojana Kuladinithi, Andreas Timm-Giel:
A Novel Approach to Achieving End-to-End QoS for Avionic Applications. - Kashyap Thimmaraju, Björn Scheuermann:
Count Me If You Can: Enumerating QUIC Servers Behind Load Balancers. - Birte Friesel, Olaf Spinczyk:
Data Serialization Formats for the Internet of Things. - Stefan Geissler, Stanislav Lange, Tobias Hossfeld, Phuoc Tran-Gia:
Discrete-time Analysis of Multicomponent GI/GI/1 Queueing Networks. - Julian Zobel, Niklas Stöhr, Ralf Kundel, Patrick Lieser, Ralf Steinmetz:
Dynamic Monitoring Area Allocation for Aerial Post-Disaster Situation Monitoring. - Lucas Pacheco, Denis Rosário, Eduadro Cerqueira, Torsten Braun:
Federated User Clustering for non-IID Federated Learning. - Marco Häberle, Benjamin Steinert, Michael Menth:
Firewall-as-a-Service for Campus Networks Based on P4-SFC. - Andrés Marín López, Patricia Arias Cabarcos, Thorsten Strufe, Gabriel Barceló-Soteras, Florina Almenárez Mendoza, Daniel Díaz Sánchez:
Implementing DNSSEC soft delegation for microservices. - Fabian Marquardt, Lennart Buhl:
Large Scale Monitoring of Web Application Software Distribution to Measure Threat Response Behavior. - Sanaz Afzali, Asanga Udugama, Anna Förster, Mathias Fischer:
On the Resilience of Opportunistic Networks against DoS Attacks. - Aliyu Makama, Koojana Kuladinithi, Musab Ahmed Eltayeb Ahmed, Andreas Timm-Giel:
Evaluation of Multi-hop Ad-hoc Routing Protocols in Wireless Seismic Data Acquisition. - Paul Walther, Markus Richter, Thorsten Strufe:
Ray-tracing based Inference Attacks on Physical Layer Security. - Martin Byrenheid, Stefanie Roos, Thorsten Strufe:
Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays. - Tobias Hardes, Clemens Boos, Christoph Sommer:
Towards opportunistic UAV relaying for smart cities. - Christoph Döpmann, Felix Fiedler, Sergio Lucia, Florian Tschorsch:
Towards Optimization-Based Predictive Congestion Control for the Tor Network. - Lars-Christian Schulz, David Hausheer:
Towards SCION-enabled IXPs: The SCION Peering Coordinator. - Ralf Kundel, Paul Stiegele, Dat Tran, Julian Zobel, Osama Abboud, Rhaban Hark, Ralf Steinmetz:
User Space Packet Schedulers: Towards Rapid Prototyping of Queue-Management Algorithms. - Leonard Bradatsch, Frank Kargl, Oleksandr Miroshkin:
Zero Trust Service Function Chaining. - Fatemeh Akbarian, William Tärneberg, Emma Fitzgerald, Maria Kihl:
Demonstration: A cloud-control system equipped with intrusion detection and mitigation. - William Tärneberg, Martin Gunnarsson, Maria Kihl, Christian Gehrmann:
Demonstration: A cloud-native digital twin with adaptive cloud-based control and intrusion detection. - Maik Basso, Alexey V. Vinel, Edison Pignaton de Freitas:
An Application Layer Protocol to Support Cooperative Navigation of Multiple UAVs Systems. - Daniel Stolpmann, Andreas Timm-Giel:
FlowEmu: An Open-Source Flow-Based Network Emulator. - Matthias Frank:
IDN-Laser-Tester: A Framework for Detecting and Testing ILDA Digital Network Consumers for Laser Projection. - Jens Dede, Daniel Helms, Anna Förster:
MoleNet: An Underground Sensor Network for Soil Monitoring. - Jens Dede, Asanga Udugama, Anna Förster:
Demo: Simulation-as-a-Service to Benchmark Opportunistic Networks. - Heiko Bornholdt, David Jost, Philipp Kisters, Michel Rottleuthner, Sehrish Shafeeq, Winfried Lamersdorf, Thomas C. Schmidt, Mathias Fischer:
Smart Urban Data Space for Citizen Science. - Sebastian Reuter, Jens Hiller, Jan Pennekamp, Andriy Panchenko, Klaus Wehrle:
Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks. - Yamani Dalpathadu, Thumma Showry, Asanga Udugama, Anna Förster:
Demo: Using LoRa Communications and Epidemic Routing in Disaster Rescue Operations. - Thorben Krüger, David Hausheer:
Early Work: Path Selection in a Path-aware Network Architecture. - Yasin Alhamwy:
Information Management for Multi-Agent Systems. - Christoph Funda, Kai-Steffen Hielscher, Reinhard German:
Discrete event simulation for the purpose of real-time performance evaluation of distributed hardware-in-the-loop simulators for autonomous driving vehicle validation. - August See:
Polymorphic Protocols for Fighting Bots. - David Monschein, Oliver P. Waldhorst:
Privacy-Preserving and Scalable Authentication based on Network Connection Traces. - Jens Wettlaufer:
Property Inference-based Federated Learning Groups for Collaborative Network Anomaly Detection. - Zikai George Zhou, Wolfgang Kellerer:
Towards Deterministic Reconfigurable Networks. - Daniel Spiekermann, Jörg Keller:
Wiretapping Pods and Nodes - Lawful Interception in Kubernetes. - Victor Mayoral Vilches, Alfonso Glera-Picón, Unai Ayucar Carbajo, Stefan Rass, Martin Pinzger, Federico Maggi, Endika Gil-Uriarte:
Hacking planned obsolescense in robotics, towards security-oriented robot teardown. - Ahmed M. Elmisery, Mirela Sertovic:
Modular Platform for Detecting and Classifying Phishing Websites Using Cyber Threat Intelligence. - Aditya Tyagi, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Early Warning Identity Threat and Mitigation System. - Salil Sharma, Ehab Al-Khannaq, Raphael Riebl, Wouter J. Schakel, Peter Knoppers, Alexander Verbraeck, Hans van Lint:
Impact of radio channel characteristics on the longitudinal behaviour of truck platoons in critical car-following situations. - Quentin Delooz, Andreas Festag, Alexey V. Vinel:
Congestion Aware Objects Filtering for Collective Perception. - Martin Cooney, Eric Järpe, Alexey V. Vinel:
"Vehicular Steganography"?: Opportunities and Challenges. - Patrick Krämer, Andreas Blenk:
Navigating Communication Networks with Deep Reinforcement Learning. - Hassan Fawaz, Djamal Zeghlache, Pham Tran Anh Quang, Jérémie Leguay, Paolo Medagliani:
Deep Reinforcement Learning for Smart Queue Management. - Sebastian Lindner, Daniel Stolpmann, Andreas Timm-Giel:
Time- and Frequency-Domain Dynamic Spectrum Access: Learning Cyclic Medium Access Patterns in Partially Observable Environments. - Yassin Alkhalili, Jannis Weil, Anam Tahir, Tobias Meuser, Boris Koldehofe, Andreas Mauthe, Heinz Koeppl, Ralf Steinmetz:
Towards QoE-Driven Optimization of Multi-Dimensional Content Streaming. - Katharina Dietz, Michael Mühlhauser, Michael Seufert, Nicholas Gray, Tobias Hoßfeld, Dominik Herrmann:
Browser Fingerprinting: How to Protect Machine Learning Models and Data with Differential Privacy? - Daniil Romanchenko, Matis Tartie, Ba Que Le, Jorge Torres Gómez, Falko Dressler:
Molecular Communication Channel Modelling in FPGA Technology.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.