Matthias Hollick
Orcid: 0000-0002-9163-5989Affiliations:
- TU Darmstadt, Department of Computer Science, Germany
According to our database1,
Matthias Hollick
authored at least 311 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Radio Resource Management Design for RSMA: Optimization of Beamforming, User Admission, and Discrete/Continuous Rates With Imperfect SIC.
IEEE Trans. Mob. Comput., December, 2024
Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection.
Proc. Priv. Enhancing Technol., 2024
Proc. ACM Hum. Comput. Interact., 2024
IEEE Access, 2024
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Catch You Cause I Can: Busting Rogue Base Stations using CellGuard and the Apple Cell Location Database.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Always On Air: Adaptive Physical Layer Switching For Uninterrupted UAV Air-to-Ground Communication.
Proceedings of the 10th Workshop on Micro Aerial Vehicle Networks, 2024
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024
Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024
Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Sensors, September, 2023
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges.
Proc. Priv. Enhancing Technol., April, 2023
Dataset, January, 2023
RadiOrchestra: Proactive Management of Millimeter-Wave Self-Backhauled Small Cells via Joint Optimization of Beamforming, User Association, Rate Selection, and Admission Control.
IEEE Trans. Wirel. Commun., 2023
Maintaining App Services in Disrupted Cities: A Crisis and Resilience Evaluation Tool.
CoRR, 2023
CoRR, 2023
Network Message Field Type Classification and Recognition for Unknown Binary Protocols.
CoRR, 2023
Proceedings of the 17th ACM Workshop on Wireless Network Testbeds, 2023
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
Energy-efficient Broadcast Trees for Decentralized Data Dissemination in Wireless Networks.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 2023 International Conference on embedded Wireless Systems and Networks, 2023
BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong Adversaries.
Proceedings of the IEEE Conference on Communications and Network Security, 2023
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation.
ACM Trans. Sens. Networks, November, 2022
ACM Trans. Internet Things, 2022
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies.
IEEE Trans. Dependable Secur. Comput., 2022
Towards Privacy Engineering for Real-Time Analytics in the Human-Centered Internet of Things.
CoRR, 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Sequential Parametric Optimization for Rate-Splitting Precoding in Non-Orthogonal Unicast and Multicast Transmissions.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 2022 Joint European Conference on Networks and Communications & 6G Summit, 2022
Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Evaluation results from "Next2You: Robust Copresence Detection Based on Channel State Information".
Dataset, October, 2021
Raw data from "Next2You: Robust Copresence Detection Based on Channel State Information".
Dataset, October, 2021
Index of Supplementary Files from "Next2You: Robust Copresence Detection Based on Channel State Information".
Dataset, July, 2021
Dataset, June, 2021
Dataset, June, 2021
Supplementary Material for "Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet".
Dataset, May, 2021
Index of supplementary files from "FastZIP: Faster and More Secure Zero-Interaction Pairing".
Dataset, May, 2021
IEEE Trans. Mob. Comput., 2021
Art Sci. Eng. Program., 2021
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System.
Proc. Priv. Enhancing Technol., 2021
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Best Practices for Notification Studies for Security and Privacy Issues on the Internet.
CoRR, 2021
OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
BEAMWAVE: Cross-Layer Beamforming and Scheduling for Superimposed Transmissions in Industrial IoT mmWave Networks.
Proceedings of the 19th International Symposium on Modeling and Optimization in Mobile, 2021
Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi.
Proceedings of the 30th USENIX Security Symposium, 2021
Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support.
Proceedings of the 30th USENIX Security Symposium, 2021
Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN.
Proceedings of the MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, Alicante, Spain, November 22, 2021
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Leveraging Cross-Technology Broadcast Communication to build Gateway-Free Smart Homes.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021
Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods.
Proceedings of the Companion Publication of the 2021 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Best Practices for Notification Studiesfor Security and Privacy Issues on the Internet.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Supplementary Material for "Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support".
Dataset, November, 2020
Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks.
IEEE/ACM Trans. Netw., 2020
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints.
Proc. ACM Meas. Anal. Comput. Syst., 2020
LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems.
IEEE Internet Things J., 2020
CoRR, 2020
DEMO: Extracting Physical-Layer BLE Advertisement Information from Broadcom and Cypress Chips.
CoRR, 2020
Empirical Insights for Designing Information and Communication Technology for International Disaster Response.
CoRR, 2020
HydraWave: Multi-Group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave Communication.
CoRR, 2020
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020
HydraWave: Multi-group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave Communications.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the WiNTECH@MobiCom 2020: Proceedings of the 14th International Workshop on Wireless Network Testbeds, 2020
Towards Secure Urban Infrastructures: Cyber Security Challenges for Information and Communication Technology in Smart Cities.
Proceedings of the Mensch und Computer 2020 - Workshopband, 2020
NEAT-TCP: Generation of TCP Congestion Control through Neuroevolution of Augmenting Topologies.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020
Demo: Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices.
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020
Concurrent Wireless Cut-Through Forwarding: Ultra-Low Latency Multi-Hop Communication for the Internet of Things.
Proceedings of the 16th International Conference on Distributed Computing in Sensor Systems, 2020
2019
Index of supplementary files from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
Raw data from Mobile scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
Raw data from Office scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
Raw data from Car scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
Processed data from Office scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
Processed data from Car scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
Processed data from Mobile scenario from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
Results for scheme by Karapanos et al. from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
Results for scheme by Schürmann and Sigg from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
Results for scheme by Miettinen et al. from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
Results for scheme by Truong et al. from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
Results for scheme by Shrestha et al. from "Perils of Zero-Interaction Security in the Internet of Things".
Dataset, January, 2019
A systematic approach to constructing families of incremental topology control algorithms using graph transformation.
Softw. Syst. Model., 2019
GetMobile Mob. Comput. Commun., 2019
GetMobile Mob. Comput. Commun., 2019
SCAROS: A Scalable and Robust Self-Backhauling Solution for Highly Dynamic Millimeter-Wave Networks.
IEEE J. Sel. Areas Commun., 2019
CBMoS: Combinatorial Bandit Learning for Mode Selection and Resource Allocation in D2D Systems.
IEEE J. Sel. Areas Commun., 2019
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market.
Proceedings of the Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), 2019
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
Proceedings of the Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), 2019
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019
Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets.
Proceedings of the 13th International Workshop on Wireless Network Testbeds, 2019
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019
Riding the Waves: Decoding Asynchronous Multi-User MISO via Time-Variant Zero-Forcing.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2019
JamLab-NG: Benchmarking Low-Power Wireless Protocols under Controllable and Repeatable Wi-Fi Interference.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019
2018
An Online Context-Aware Machine Learning Algorithm for 5G mmWave Vehicular Communications.
IEEE/ACM Trans. Netw., 2018
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
CoRR, 2018
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
CoRR, 2018
IEEE Commun. Surv. Tutorials, 2018
The Nexmon firmware analysis and modification framework: Empowering researchers to enhance Wi-Fi devices.
Comput. Commun., 2018
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Fast and Infuriating: Performance and Pitfalls of 60 GHz WLANs Based on Consumer-Grade Hardware.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018
Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018
Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018
One Billion Apples' Secret Sauce: Recipe for the <i>Apple Wireless Direct Link</i> Ad hoc Protocol.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018
Proceedings of the 12th International Workshop on Wireless Network Testbeds, 2018
Authenticating the Sector Sweep to Protect Against Beam-Stealing Attacks in IEEE 802.11ad Networks.
Proceedings of the 2nd ACM Workshop on Millimeter Wave Networks and Sensing Systems, 2018
Demo: Channel Estimation and Custom Beamforming on the 60 GHz TP-Link Talon AD7200 Router.
Proceedings of the 12th International Workshop on Wireless Network Testbeds, 2018
Adaptive Codebook Optimization for Beam Training on Off-the-Shelf IEEE 802.11ad Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018
Conducting a Large-scale Field Test of a Smartphone-based Communication Network for Emergency Response.
Proceedings of the 13th Workshop on Challenged Networks, 2018
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Making Wi-Fi Fit for the Tactile Internet: Low-Latency Wi-Fi Flooding Using Concurrent Transmissions.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
A systematic approach to constructing incremental topology control algorithms using graph transformation.
J. Vis. Lang. Comput., 2017
Pervasive Mob. Comput., 2017
Comput. Commun. Rev., 2017
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
SEMUD: Secure multi-hop device-to-device communication for 5G public safety networks.
Proceedings of the 2017 IFIP Networking Conference, 2017
Proceedings of the 20th ACM International Conference on Modelling, 2017
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
Proceedings of the 1st ACM Workshop on Millimeter-Wave Networks and Sensing Systems, 2017
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017
Demo: Nexmon in Action: Advanced Applications Powered by the Nexmon Firmware Patching Framework.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Proceedings of the IEEE Global Humanitarian Technology Conference, 2017
Proceedings of the IEEE Global Humanitarian Technology Conference, 2017
Emergency communication in challenged environments via unmanned ground and aerial vehicles.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2017
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.1 lad Devices.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017
Opp-relay: Managing directionality and mobility issues of millimeter-wave via D2D communication.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
CoRR, 2016
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 2016 IFIP Networking Conference, 2016
Opportunities and pitfalls in securing visible light communication on the physical layer.
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 2016
Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2016
Competition: Sparkle: Energy Efficient, Reliable, Ultra-low Latency Communication in Wireless Control Networks.
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
2015
Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security.
IEEE Wirel. Commun. Lett., 2015
Pervasive Mob. Comput., 2015
Lightweight energy consumption-based intrusion detection system for wireless sensor networks.
Int. J. Inf. Sec., 2015
Dagstuhl Reports, 2015
Ripple: High-throughput, reliable and energy-efficient network flooding in wireless sensor networks.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015
APP and PHY in harmony: Demonstrating scalable video streaming supported by flexible physical layer control.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Show me your phone, I will tell you who your friends are: analyzing smartphone data to identify social relationships.
Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, Linz, Austria, November 30, 2015
Can I Help You Setting Your Privacy? A Survey-based Exploration of Users' Attitudes towards Privacy Suggestions.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015
Proceedings of the 2nd International Workshop on Visible Light Communications Systems, 2015
Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
APP and PHY in Harmony: A framework enabling flexible physical layer processing to address application requirements.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015
Corridor-based routing: Constructing and maintaining stable support-structures for wireless multihop transmissions.
Proceedings of the 2015 International Symposium on Wireless Communication Systems (ISWCS), 2015
Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Curve-based planar graph routing with guaranteed delivery in multihop wireless networks.
Pervasive Mob. Comput., 2014
Practical Interference alignment in the frequency domain for OFDM-based wireless access networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014
Corridor-based routing: Opening doors to PHY-layer advances for Wireless Multihop Networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014
Analyzing active probing for practical intrusion detection in Wireless Multihop Networks.
Proceedings of the 11th Annual Conference on Wireless On-demand Network Systems and Services, 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Short paper: gathering tamper evidence in wi-fi networks based on channel state information.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Demo: WARP drive - accelerating wireless multi-hop cross-layer experimentation on SDRs.
Proceedings of the 2014 ACM workshop on Software radio implementation forum, 2014
Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the Q2SWinet'14, 2014
Efficient solutions for the authenticated fragmentation problem in delay- and disruption-tolerant networks.
Proceedings of the 17th ACM International Conference on Modeling, 2014
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014
Making 'Glossy' Networks Sparkle: Exploiting Concurrent Transmissions for Energy Efficient, Reliable, Ultra-Low Latency Communication in Wireless Control Networks.
Proceedings of the Wireless Sensor Networks - 11th European Conference, 2014
2013
IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications.
Pervasive Mob. Comput., 2013
uSafe: A privacy-aware and participative mobile application for citizen safety in urban environments.
Pervasive Mob. Comput., 2013
Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications.
Inf. Secur. Tech. Rep., 2013
Proceedings of the 17th International ITG Workshop on Smart Antennas, 2013
A blueprint for switching between secure routing protocols in wireless multihop networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013
Proceedings of the second workshop on Software radio implementation forum, 2013
A rapid prototyping framework for practical OFDMA systems using Software Defined Radios.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Lightweight energy consumption based intrusion detection system for wireless sensor networks.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Raising User Awareness about Privacy Threats in Participatory Sensing Applications through Graphical Warnings.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013
Let's talk together: Understanding concurrent transmission in wireless sensor networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the 2013 Conference on Networked Systems, 2013
Proceedings of the European Data Protection: Coming of Age, 2013
2012
Pervasive Mob. Comput., 2012
Proceedings of the International ITG Workshop on Smart Antennas, 2012
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the 23rd IEEE International Symposium on Personal, 2012
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, 2012
Signs of a bad neighborhood: a lightweight metric for anomaly detection in mobile ad hoc networks.
Proceedings of the Q2SWinet'12, 2012
HOPSCOTCH: An adaptive and distributed channel hopping technique for interference avoidance in Wireless Sensor Networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the Sustainable Internet and ICT for Sustainability, 2012
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach.
Proceedings of the Seventh International Conference on Availability, 2012
2011
CORE: centrally optimized routing extensions for efficient bandwidth management and network coding in the IEEE 802.16 MeSH mode.
Wirel. Commun. Mob. Comput., 2011
Bedrohungsanalyse des IEEE 802.11s Standards für drahtlose Mesh-Netze und ausgewählte Sicherheitsmechanismen zur Bedrohungsabwehr.
Prax. Inf.verarb. Kommun., 2011
J. Syst. Softw., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Routing performance of Wireless Mesh Networks: A practical evaluation of BATMAN advanced.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
2010
Vorstellung "neuer" KUVS-naher Fachgebiete. Fachgebiet Sichere Mobile Netze, Fachbereich Informatik, Technische Universität Darmstadt.
Prax. Inf.verarb. Kommun., 2010
On the trade-off between throughput maximization and energy consumption minimization in IEEE 802.11 WLANs.
J. Commun. Networks, 2010
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
Future Internet, 2010
The rise and fall of the AODV protocol: A testbed study on practical routing attacks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010
Proceedings of the Wireless Sensor Networks, 7th European Conference, 2010
2009
Proceedings of the 2nd IFIP Wireless Days, 2009
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009
Proceedings of the Quality of Service in Heterogeneous Networks, 2009
A Proportionally Fair Centralized Scheduler Supporting Spatial Minislot Reuse for IEEE 802.16 Mesh Networks.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Distributed bandwidth reservation strategies to support efficient bandwidth utilization and QoS on a per-link basis in IEEE 802.16 Mesh Networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Incorporating spatial reuse into algorithms for bandwidth management and scheduling in IEEE 802.16j relay networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009
Proceedings of IEEE International Conference on Communications, 2009
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Adapting the User Context in Realtime: Tailoring Online Machine Learning Algorithms to Ambient Computing.
Mob. Networks Appl., 2008
Exploiting Schelling behavior for improving data accessibility in mobile peer-to-peer networks.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008
Harnessing delay tolerance to increase delivery ratios in mobile ad hoc networks with misbehaving nodes.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
Proceedings of the LCN 2008, 2008
Proceedings of the LCN 2008, 2008
2007
Der Assistent im Hintergrund: Adaptives Kommunikationsmanagement durch Lernen vom Nutzer.
Prax. Inf.verarb. Kommun., 2007
Prax. Inf.verarb. Kommun., 2007
JiST/MobNet: combined simulation, emulation, and real-world testbed for ad hoc networks.
Proceedings of the Second ACM Workshop on Wireless Network Testbeds, 2007
A Case for Joint Routing, Scheduling, and Network Coding in TDMA-based Wireless Mesh Networks: A Cross-layer Approach.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
AntSec, WatchAnt, and AntRep: Innovative Security Mechanisms for Wireless Mesh Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007
Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007
Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007
2006
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2006
Performance Analysis of the Real-time Capabilities of Coordinated Centralized Scheduling in 802.16 Mesh Mode.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006
2005
M^2 DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005
2004
Comput. Commun., 2004
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004
Proceedings of IEEE International Conference on Communications, 2004
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004
2003
Comparative Analysis of Quality of Service Routing in Wireless Metropolitan Area Networks.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003
Proceedings of the Global Telecommunications Conference, 2003
2001
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001
Proceedings of the Innovative Anwendungen in Kommunikationsnetzen, 2001
Secure Service Centered Networking for Nomadic Usage.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001