Thomas Engel
|
|
||||||
| Fakultät oder Zentrum | Fakultät für Naturwissenschaften, Technologie und Kommunikation | ||||||
| Forschungseinheit | CSC | ||||||
| Postadresse |
Université du Luxembourg Maison du Nombre 6, Avenue de la Fonte L-4364 Esch-sur-Alzette |
||||||
| Büroadresse | MNO, E02 0215-020 | ||||||
|
|
|||||||
| Telefon | (+352) 46 66 44 5263 | ||||||
| Fax | (+352) 46 66 44 5488 | ||||||
| Video |
Prof. Dr. Thomas Engel (SnT)
|
||||||
Prof. Dr. Thomas Engel is Professor for Computer Networks and Telecommunications at the University of Luxembourg.
From 1987 to 1995 he studied Physics and Computer Science at the University of Saarbruecken, Germany, where he graduated in 1992 and received the title Dr. rer. nat. in 1996. Between 1996 and 2003, as joint founder, he was a member of the board of directors and vice-director of the Fraunhofer-guided Institute for Telematics e.V. in Trier, Germany, co-responsible for the scientific orientation and development of the institute, definition, acquisition and realization of all research projects, which were 70% industry-financed. Since 2002, he has taught and conducted research as a professor at the IST/University of Luxembourg. His SECAN-Lab team deals with performance, privacy and identity handling in Next Generation Networks.
As a member of the European Security Research Advisory Board (ESRAB) of the European Commission in Brussels, he advised the Commission on the structure, content and implementation of the FP7 Security Research Programme. He was coordinator of three European projects, including the Integrated Project u-2010 with 16 partners, about Next Generation Networks using IPv6. Prof. Dr. Thomas Engel was member of the Information and Communication Security Panel ICS of NATO (2007-2011), and has been appointed Civil High-Level Expert for Electronic Communications (representing Europe) of NATO CEP/CCPC since 2008. He is speaker of the regional group Trier/Luxemburg of the German Society for Computer Science (GI). Since 2009 he is chairman of the National IPv6 Council Luxembourg. From 2009 to 2016 Thomas Engel was Vice- and Deputy-Director of the first Interdisciplinary Center at the University of Luxembourg, named Security, Reliability and Trust (SnT).
Further information
Last updated on: Mittwoch, den 02. März 2016
- Professor at the University of Luxembourg since February 2002
- Vice Director of the Interdisciplinary Centre for Security, Reliability and Trust (SnT) at the University of Luxembourg 2009-2016
- Member of the Information and Communication Security Panel ICS of NATO (2007-2011)
- Coordinator of three European projects, therein the Integrated Project u-2010 on Next Generation Networks for Crisis Management 2006 - 2009
- Member of the European Security Research Advisory Board (ESRAB) 04/2005 - 12/2006, European Commission, Brussels
- Member of the European Security Taskforce (SecureIST), 2004 - 2007, European Commission, Brussels
- Member the Management Committee and Scientific Committee, later director of LIASIT, 2004 - 2009
- Appointed professor at the Institut Superieur de Technologie (IST) Luxembourg 2002, from 2003 University of Luxembourg
- Co-initiator (together with Lucien Thiel, ABBL) and project coordinator of a project to establish a National Public-Key-Infrastructure LuxTrust 1998 - 2002
- Co-founder and vice director of the Institute for Telematics, Trier (Fraunhofer Management), 1996-2003 at that time co-responsible for scientific orientation, definition, acquisition and realization of the research projects applied, industry funded research at the intersection of computer science and telecommunication
- Ph.D. in Natural Sciences, University of Saarbrücken, 1995
- Diploma in Physics, University of Saarbrücken in 1992
Last updated on: 02 Mär 2016
Keywords of the research interests: Computer Networks, Network and System Security, Big Data Analysis, Vehicular Communication, Algebraic Graph Transformation
For more information, have a look at my group's project website.
Further information about my group's activities can be found for
Last updated on: 02 Feb 2015
2018
POSTER: WLAN Device Fingerprinting using Channel State Information (CSI); ; ;
in 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) (2018, June)
Performance Analysis of CoAP under Satellite Link Disruption; ; ; ;
in Performance Analysis of CoAP under Satellite Link Disruption (2018, June)
Non-intrusive Distracted Driving Detection Based on Driving Sensing Data; ;
Scientific Conference (2018, March)
Machine Learning for Reliable Network Attack Detection in SCADA Systems; ; ;
in 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18) (2018)
The State of Affairs in BGP Security: A Survey of Attacks and Defenses; ;
in Computer Communications (2018)
2017
Characterizing Driving Environments Through Bluetooth Discovery; ; ;
Scientific Conference (2017, October)
Smartphone-based Adaptive Driving Maneuver Detection: A large-scale Evaluation Study; ; ;
in IEEE Transactions on Intelligent Transportation Systems (2017)
How Mobile Phone Handovers reflect Urban Mobility: A Simulation Study; ; ;
in Proceedings of the 5th IEEE Conference on Models and Technologies for Intelligent Transportation Systems. (2017, June 26)
Estimating Urban Road Traffic States Using Mobile Network Signaling Data; ; ;
in Abstract book of the 20th International Conference on Intelligent Transportation Systems (2017, October)
A centralized approach for setting floating content parameters in VANETs; ; ; ;
in A centralized approach for setting floating content parameters in VANETs (2017, July 20)
A Multi-Pronged Approach to Adaptive and Context Aware Content Dissemination in VANETs; ; ; ; ; ; ; ; ;
in Mobile Networks and Applications (2017)
Characterizing User Mobility Using Mobile Sensing Systems; ; ;
in International Journal of Distributed Sensor Networks (2017), 13(8),
Poster: Characterizing Driving Behaviors Through a Car Simulation Platform; ; ; ;
Poster (2017, November 27)
Towards a Real-Time Driver Identification Mechanism Based on Driving Sensing Data; ;
in 20th International Conference on Intelligent Transportation Systems (ITSC) (2017)
Coordination Mechanisms for Floating Content in Realistic Vehicular Scenario; ; ; ; ;
in Coordination Mechanisms for Floating Content in Realistic Vehicular Scenario (2017)
Analysis of Fingerprinting Techniques for Tor Hidden Services; ; ; ; ;
in Proceedings of the 24th ACM Computer and Communications Security (ACM CCS) 16th Workshop on Privacy in the Electronic Society (ACM WPES 2017) (2017, October 31)
An Efficient Service Channel Allocation Scheme in SDN-enabled VANETs; ; ;
in An Efficient Service Channel Allocation Scheme in SDN-enabled VANETs (2017, June)
2016
Privacy Technologies and Policy: Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers; ; ; ;
Book published by Springer (2016)
Towards Characterizing Bluetooth Discovery in a Vehicular Context; ; ;
in Vehicular Networking Conference (VNC), 2016 IEEE (2016, December)
Luxembourg SUMO Traffic (LuST) Scenario: Traffic Demand Evaluation; ; ;
in IEEE Intelligent Transportation Systems Magazine (2016)
Poster: LuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity; ; ;
Poster (2016, December 08)
LuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity; ; ;
Presentation (2016, June 30)
Towards Privacy-Neutral Travel Time Estimation from Mobile Phone Signalling Data; ; ; ;
in Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2) (2016, September)
A Generic Framework to Support Application-Level Flow Management in Software-Defined Networks; ; ; ; ;
in Conference on Network Softwarization (Netsoft) (2016)
Understanding User Daily Mobility Using Mobile and Wearable Sensing Systems;
in Proceedings of the 2016 International Conference on Information and Communications Technology Convergence - ICTC 2016 (2016, October)
A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data; ; ;
in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2016), 7(3),
Toward a Characterization of Human Activities using Smart Devices: A Micro/Macro Approach; ; ;
in Proceedings of the 7th IEEE INFOCOM International Workshop on Mobility Management in the Networks of the Future World (2016, April)
Demo Abstract: Human Mobility Profiling Using Privacy-Friendly Wi-Fi and Activity Traces; ;
in Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems (SenSys 2016) (2016, November 14)
Heat is in the Eye of the Beholder: Towards Better Authenticating on Smartglasses; ; ; ; ; ;
in Proceedings of the 9th International Conference on Human System Interaction (HSI'16) (2016, July)
Towards the Propagation of Model Updates along different Views in Multi-View Models; ; ; ;
in Proceedings of the 5th International Workshop on Bidirectional Transformations (2016), 1571
Driving while using a smartphone-based mobility application: Evaluating the impact of three multi-choice user interfaces on visual-manual distraction; ; ; ;
in Applied Ergonomics (2016), 54
Internet of Things in the 5G Era: Enablers, Architecture and Business Models; ; ; ; ; ;
in IEEE Journal on Selected Areas In Communications (2016)
Website Fingerprinting at Internet Scale; ; ; ; ; ;
in Proceedings of the 23rd Internet Society (ISOC) Network and Distributed System Security Symposium (NDSS 2016) (2016, February)
Not a Tile Out of Place: Toward Creating Context-Dependent User Interfaces on Smartglasses; ; ; ; ; ; ;
in Proceedings of the 9th International Conference on Human System Interaction (HSI'16) (2016, July)
Understanding the Social impact of ICN: between myth and reality; ; ; ; ;
in Springer AI & Society: Journal of Knowledge, Culture and Communication (2016)
Content and Context Aware Strategies for QoS Support in VANETs; ; ;
in Proc. of Int. Conf. on Advanced Information Networking and Applications (AINA-2016) (2016, March)
SDN coordination for CCN and FC content dissemination in VANETs; ; ; ; ; ; ; ; ;
in Proceedings of the 8th International Conference on Ad Hoc Networks (ADHOCNETS), Ottawa, ON, Canada (2016, September 26)
2015
Network troubleshooting with SDN-RADAR (demo paper); ; ; ; ;
in Proc. of IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015, May)
Bluetooth Low Energy performance and robustness analysis for Inter-Vehicular Communications; ; ;
in Elsevier - Ad Hoc Networks (2015)
Validation study of risky event classification using driving pattern factors; ; ;
Scientific Conference (2015, November 24)
Driver Behavior Profiling Using Smartphones: A Low-Cost Platform for Driver Monitoring; ; ;
in Intelligent Transportation Systems Magazine, IEEE (2015), 7(1), 91-102
Luxembourg SUMO Traffic (LuST) Scenario: 24 Hours of Mobility for Vehicular Networking Research; ;
in Proceedings of the 7th IEEE Vehicular Networking Conference (2015, December)
LuST: a 24-hour Scenario of Luxembourg City for SUMO Traffic simulations; ;
Presentation (2015, May 07)
A Cell Dwell Time Model for Synthetic Population Generation from Call Detail Records; ; ; ;
Scientific Conference (2015, April 08)
Adaptive Activity and Context Recognition using Multimodal Sensors in Smart Devices; ;
in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Mobile Computing, Applications, and Services (2015, November)
SWIPE: Monitoring Human Dynamics using Smart Devices; ;
in Proceedings of the 7th International Conference on Mobile Computing, Applications and Services (MobiCASE '15) (2015, November)
SDN-RADAR: Network troubleshooting combining user experience and SDN capabilities; ; ; ;
in Proc. of IEEE Conf. on Network Softwarization (NetSoft) (2015, April)
Towards Reinventing Online Privacy;
in Berendt, Bettina; Engel, Thomas; Ikonomou, Demosthenes; Le Métayer, Daniel; Schiffner, Stefan (Eds.) LNCS - Annual Privacy Forum 2015 - Bridging the gap between research and policy (2015)
A Car Hacking Experiment: When Connectivity meets Vulnerability; ; ; ;
in Globecom Workshops (GC Wkshps), 2015 IEEE (2015, December)
A Formalization of Fingerprinting Techniques; ;
in Proceedings of the IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP 2015), held in conjunction with IEEE TrustCom 2015 (2015, August)
Hacker’s Toolbox: Detecting Software-Based 802.11 Evil Twin Access Points; ; ;
in Proceedings of the 12th Annual IEEE Consumer Communications & Networking Conference (CCNC 2015) (2015)
Text entry on smart glasses A comparison of two input techniques; ; ; ;
in 8th International Conference on Human System Interaction (HSI'2015) (2015, June)
Detection of Population Mobility Anomalies in Senegal from Base Station Profiles; ; ; ;
Scientific Conference (2015, April 08)
Enabling vehicular mobility in city-wide IEEE 802.11 networks through predictive handovers; ; ;
in Vehicular Communications (2015), 2(2), 59-69
A study on ethical aspects and legal issues in e-learning; ;
in Proceedings of the 8th International Conference on E-Learning (e-Learning'15) (2015, September)
On-the-Fly Bandwidth Reservation for 6TiSCH Wireless Industrial Networks; ; ; ; ; ; ;
in IEEE Sensors Journal (2015)
6TiSCH Centralized Scheduling: when SDN Meet IoT; ;
in Proc. of IEEE Conf. on Standards for Communications & Networking (CSCN’15) (2015)
2014
Magnetic Interaction with Devices: A Pilot Study on Mobile Gaming; ; ;
in Proceedings of NordiCHI '14, October 26 - 30 2014, Helsinki, Finland (2014, October 26)
Bluetooth Low Energy for Inter-Vehicular Communications; ; ;
in 2014 IEEE Vehicular Networking Conference (VNC) (2014, December)
Traffic Routing in Urban Environments: the Impact of Partial Information; ;
in Proceedings of 17th Internatonal IEEE Conference on Intelligent Transportation Systems (2014, October)
An Event-Driven Inter-Vehicle Communication Protocol to Attenuate Vehicular Shock Waves; ;
in International Conference on Connected Vehicles and Expo (2014, November)
A Cooperative Advanced Driver Assistance System to Mitigate Vehicular Traffic Shock Waves; ; ;
in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (2014)
Bluetooth Low Energy: An Alternative Technology for VANET Applications; ; ;
in Proceedings of the 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (2014, April)
Collaborative Traffic Sensing: A Case Study of a Mobile Phone Based Traffic Management System; ; ;
in Proceedings of the 11th IEEE Consumer Communications and Networking Conference (CCNC'14) (2014, January 10)
Triple Graph Grammars in the Large for Translating Satellite Procedures - Extended Version; ; ; ; ; ; ; ;
Report (2014)
Triple Graph Grammars in the Large for Translating Satellite Procedures; ; ; ; ; ; ; ;
in Theory and Practice of Model Transformations (2014, July)
Solving the FIXML2Code-case Study with HenshinTGG; ; ; ;
in Rose, Louis M.; Krause, Christian; Horn, Tassilo (Eds.) Proceedings of the 7th Transformation Tool Contest - part of the Software Technologies: Applications and Foundations (STAF 2014) federation of conferences (2014)
Implications and Detection of DoS Attacks in OpenFlow-based Networks; ;
in 2014 IEEE Global Communications Conference (2014)
Using opcode-sequences to detect malicious Android applications; ; ;
in IEEE International Conference on Communications, ICC 2014, Sydney Australia, June 10-14, 2014 (2014, June)
Incentives and gaming environments for changing commuter behaviour; ; ; ;
Scientific Conference (2014, September 30)
Letting the Puss in Boots Sweat: Detecting Fake Access Points using Dependency of Clock Skews on Temperature; ; ;
in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014) (2014)
Undesired Relatives: Protection Mechanisms Against The Evil Twin Attack in IEEE 802.11; ; ;
in Proceedings of the 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (2014, September)
PhishStorm: Detecting Phishing With Streaming Analytics; ; ;
in IEEE Transactions on Network and Service Management (2014), 11(December), 458-471
PhishScore: Hacking Phishers' Minds; ; ;
in Proceedings of the 10th International Conference on Network and Service Management (2014, November)
A Big Data Architecture for Large Scale Security Monitoring; ; ;
in Proceedings of the 3rd IEEE Congress on Big Data (2014, July)
Scilab Modelling and Simulation of Communication Networks: Car Traffic Analysis in Luxembourg;
in Abstract book of 30th International CAE Conference, CAE'14 (2014)
Towards a New Way of Reliable Routing: Multiple Paths over ARCs; ;
in Towards a New Way of Reliable Routing: Multiple Paths over ARCs (2014, September 24)
Towards Domain Completeness for Model Transformations Based on Triple Graph Grammars; ; ;
in Amrani, Moussa; Syriani, Eugene; Wimmer, Manuel (Eds.) Proceedings of the Third International Workshop on Verification of Model Transformations - co-located with Software Technologies: Applications and Foundations (STAF 2014) (2014)
6TiSCH Wireless Industrial Networks: Determinism meet IPv6; ; ; ; ;
in Internet of Things: Challenges and Opportunities. Lecture series of Smart Sensors, Measurements, and Instrumentation. vol 9 (2014)
Device-Free Indoor Localization Based on Ambient FM Radio Signals;
in International Journal of Ambient Computing and Intelligence (2014), 6(January-March), 35-44
Cognition: a tool for reinforcing security in Software Defined Netwks; ; ; ;
in Tantar, Alexandru-Adrian; Tantar, Emilia; Jian-Qiao, Sun; Zhang, Wei; Ding, Qian; Schütze, Oliver; Emmerich, Michael; Legrand, Pierrick; Del Moral, Pierre; Coello Coello, Carlos (Eds.) EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation V (2014)
2013
An Evaluation Study of Driver Profiling Fuzzy Algorithms using Smartphones; ;
in An Evaluation Study of Driver Profiling Fuzzy Algorithms using Smartphones (2013, October)
Driver Behavior Profiling using Smartphones; ;
in Driver Behavior Profiling using Smartphones (2013, October)
A Study of Urban IEEE 802.11 Hotspot Networks: Towards a Community Access Network; ; ; ; ;
in A Study of Urban IEEE 802.11 Hotspot Networks: Towards a Community Access Network (2013, November 13)
Improving Traffic in Urban Environments applying the Wardrop Equilibrium; ;
in Improving Traffic in Urban Environments applying the Wardrop Equilibrium (2013, October 07)
Multi-dimensional Aggregation for DNS Monitoring'; ;
in Presented as part of the 26th Large Installation System Administration Conference (LISA 12) (2013)
A Study on Highway Traffic Flow Optimization using Partial Velocity Synchronization; ;
in Proceedings of the 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2013) Technical Report CCS-2013-01 (2013)
A semantic firewall for Content Centric Networking; ; ;
in IFIP/IEEE International Symposium on Integrated Network Management (2013, May)
Security monitoring for Content Centric Networking; ; ;
in Data Privacy Management and Autonomous Spontaneous Security (2013)
Identifying abnormal pattern in cellular communication flows; ; ;
in Proceedings of IPTComm 2013 (2013, October)
Towards Bidirectional Engineering of Satellite Control Procedures Using Triple Graph Grammars; ; ; ;
in Jacquet, Christophe; Balasubramanian, Daniel; Jones, Edward; Mészáros (Eds.) Proc. Int. Workshop on Multi-Paradigm Modeling 2013 (MPM'13) (2013)
Correctness and Completeness of Generalised Concurrent Model Synchronisation Based on Triple Graph Grammars; ; ; ; ; ;
in Baudry, Benoit; Dingel, Juergen; Lucio, Levi; Vangheluwe, Hans (Eds.) Proc. Int. Workshop on Analysis of Model Transformations 2013 (AMT'13) (2013)
Model synchronization based on triple graph grammars: correctness, completeness and invertibility; ; ; ; ; ; ;
in Software & Systems Modeling (2013)
On an Automated Translation of Satellite Procedures Using Triple Graph Grammars; ; ; ; ; ;
in Duddy, Keith; Kappel, Gerti (Eds.) Theory and Practice of Model Transformations (2013)
Automated Source Code Extension for Debugging of OpenFlow based Networks; ; ;
in Proc. 9th International Conference on Network and Service Management (CNSM) (2013, October)
Classification of Log Files with Limited Labeled Data; ;
in Proceedings of IPTComm 2013 (2013, October)
Advanced Detection Tool for PDF Threats; ; ;
in Proceedings of the sixth International Workshop on Autonomous and Spontaneous Security, RHUL, Egham, U.K., 12th-13th September 2013 (2013, September 13)
LuxTraffic: A Collaborative Traffic Sensing System; ;
in Proceedings of the 19th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN'13) (2013)
Driver diaries: a multimodal mobility behaviour logging methodology; ; ;
in Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2013, October)
Assessing In-Vehicle Information Systems application in the car: a versatile tool and unified testing platform.; ; ; ;
in Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2013)
Path Extension Analysis of Peer-to-Peer Communications in 6LoWPAN/RPL Sensor Networks;
in Abstract book of 21st International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS’13 (2013)
On the Evaluation of Make-Before-Break Handovers in Urban WiFi Networks for Moving Vehicles; ; ; ;
Scientific Conference (2013, February)
MROAD: Scanning-free Model-Based Roaming for 802.11 Networks Under Vehicular Mobility; ; ;
Scientific Conference (2013, November)
Symbolic Execution of Satellite Control Procedures in Graph-Transformation-Based EMF Ecosystems; ;
in Boulanger, Frédéric; Famelis, Michalis; Ratiu, Daniel (Eds.) MoDeVVa@MoDELS (2013)
On Optimal Scheduling in Duty-Cycled IoT Industrial Applications using IEEE 802.15.4e TSCH; ; ; ; ;
in IEEE Sensors Journal (2013), 13(10), 3655-3666
ASMATRA: Ranking ASs Providing Transit Service to Malware Hosters; ; ; ; ;
in IFIP/IEEE International Symposium on Integrated Network Management IM2013 (2013)
2012
Improving Highway Traffic through Partial Velocity Synchronization; ; ;
in Proceedings of the IEEE Global Communications Conference 2012 (2012)
Towards Collaborative Traffic Sensing using Mobile Phones; ;
in Proceedings of the IEEE Vehicular Networking Conference 2012 (2012)
A Distance-Based Method to Detect Anomalous Attributes in Log Files; ;
in Proceedings of IEEE/IFIP NOMS 2012 (2012, April)
Large Scale DNS Analysis;
in 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, Luxembourg, June 4-8 2012 (2012, June)
Semantic based DNS Forensics; ; ;
in Proceedings of the IEEE International Workshop on Information Forensics and Security (2012, December)
Proactive Discovery of Phishing Related Domain Names; ; ;
in Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, Amsterdam 12-14 September 2012 (2012, September)
Semantic Exploration of DNS; ; ;
in Proceedings of the 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25 2012 (2012, May)
DNSSM: A large-scale Passive DNS Security Monitoring Framework; ; ; ; ; ;
in IEEE/IFIP Network Operations and Management Symposium (2012, April)
NARVAL SCILAB TOOLBOX: Network Analysis and Routing eVALuation;
in Abstract book of 2012 International Workshop on Scilab & OW2 (IWSO) (2012)
Improving Performance and Anonymity in the Tor Network; ;
in Abstract book of 31st IEEE International Performance Computing and Communications Conference (IEEE IPCCC 2012) (2012)
Instant Degradation of Anonymity in Low-Latency Anonymisation Systems; ;
in Sadre, Ramin; Novotny, Jiri; Celeda, Pavel; Waldburger, Martin; Stiller, Burkhard (Eds.) Dependable Networks and Services, LNCS 7279 (2012)
2011
Performance Bound for Routing in Urban Scenarios; ; ;
in Proceedings of the 7th Asian Internet Engineering Conference (AINTEC 2011) (2011)
Detection of Abnormal Behaviour in a Surveillance Environment Using Control Charts; ; ;
in 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2011 (2011)
Website Fingerprinting in Onion Routing Based Anonymization Networks; ; ;
in 18th ACM Computer and Communications Security (ACM CCS) Workshop on Privacy in the Electronic Society (WPES) (2011)
Lightweight Hidden Services; ; ;
in 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2011) (2011)
Verification of Data Location in Cloud Networking; ; ;
in IEEE/ACM International Conference on Utility and Cloud Computing (2011)
Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance; ; ;
in Ninth Australasian Information Security Conference (2011)
Measuring anonymity using network coordinate systems; ;
in International Symposium on Communications and Information Technologies (ISCIT), 2011 (2011)
2010
An Autonomic Testing Framework for IPv6 Configuration Protocols; ; ;
in Lecture Notes in Computer Science 6155 (2010)
2009
Defensive configuration with game theory; ;
in The 11th IFIP/IEEE International Symposium on Integrated Network Management (2009)
Security and Consistency of IT and Business Models at Credit Suisse realized by Graph Constraints, Transformation and Integration using Algebraic Graph Theory; ;
in Proc. Int. Conf. on Exploring Modeling Methods in Systems Analysis and Design 2009 (EMMSAD'09) (2009)
Modeling and Reconfiguration of critical Business Processes for the purpose of a Business Continuity Management respecting Security Risk and Compliance requirements at Credit Suisse using Algebraic Graph Transformation; ;
in Enterprise Distributed Object Computing Conference Workshops, 2009. EDOCW 2009. 13th, Proc. International Workshop on Dynamic and Declarative Business Processes (DDBP 2009) (2009)
Interoperable Networking Applications for Emergency Services; ; ;
in International Journal of Multimedia and Ubiquitous Engineering (2009), 4(1), 1122
Slotted Packet Counting Attacks on Anonymity Protocols; ; ;
in The proceedings of the Australasian Information Security Conference (2009)
2008
Emergency Group Calls over Interoperable Networks; ;
in Proceedings of the 11th IEEE International Conference on Computational Science and Engineering (2008)
Tree Based Flooding Protocol for Multi-Hop Wireless Networks; ;
in Proceedings of the 3rd International Conference on Broadband Communications, Information Technology & Biomedical Applications (2008)
Unlinkable Communication; ; ;
in Privacy, Security and Trust, 2008. PST '08. Sixth Annual Conference on (2008)
2007
A Governmental Vision on Public Safety Group Calls and Object Tracing; ; ;
in Proceedings of the 14th Annual Conference on Disaster Recovery And Relief, Current & Future Approaches (2007)














