All Stories

  1. Negotiating strict latency limits for dynamic real-time services in vehicular time-sensitive networks
  2. Waiting for QUIC: Passive Measurements to Understand QUIC Deployments
  3. Scanning the IPv6 Internet Using Subnet-Router Anycast Probing
  4. Forward to Hell? On the Potentials of Misusing Transparent DNS Forwarders in Reflective Amplification Attacks
  5. Securing Future In-Vehicle Networks: Monitoring and Control for Ethernet Backbones
  6. The C++ Actor Framework: A Scalable Fundament for Research and Applications
  7. Two-Phase Scanning in IPv6 - First Observations from a Reactive IPv6 Network Telescope
  8. Towards a Complete View of Encrypted Client Hello Deployments
  9. Hilby - Hilbert Interactive Prefix Plots
  10. DNSSEC in the Car - Towards an Agile Management of Automotive Service Security
  11. Latency Limits for Asynchronous Traffic Shaping in Redundant TSN Networks
  12. A Detailed Measurement View on IPv6 Scanners and Their Adaption to BGP Signals
  13. Lessons Learned from Operating a Large Network Telescope
  14. A Call to Reconsider Certification Authority Authorization
  15. Toward a Better Understanding of IoT Domain Names: A Study of IoT Backend
  16. Network anomaly detection in cars: A case for time-sensitive stream filtering and policing
  17. The Log4j Incident: A Comprehensive Measurement Study of a Critical Vulnerability
  18. ReACKed QUICer: Measuring the Performance of Instant Acknowledgments in QUIC Handshakes
  19. The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments
  20. A Security Model for Web-Based Communication
  21. A Review of Techniques for Ageing Detection and Monitoring on Embedded Systems
  22. PUF for the Commons: Enhancing Embedded Security on the OS Level
  23. A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks
  24. Do CAA, CT, and DANE Interlink in Certificate Deployments? A Web PKI Measurement Study
  25. The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects
  26. Securing Name Resolution in the IoT: DNS over CoAP
  27. Ageing Analysis of Embedded SRAM on a Large-Scale Testbed Using Machine Learning
  28. SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots
  29. Dynamic Service-Orientation for Software-Defined In-Vehicle Networks
  30. Authenticated and Secure Automotive Service Discovery with DNSSEC and DANE
  31. Secure Time-Sensitive Software-Defined Networking in Vehicles
  32. From the Beginning: Key Transitions in the First 15 Years of DNSSEC
  33. On the interplay between TLS certificates and QUIC performance
  34. DSME-LoRa: Seamless Long-range Communication between Arbitrary Nodes in the Constrained IoT
  35. Delay-Tolerant ICN and Its Application to LoRa
  36. SoK: Public key and namespace management in NDN
  37. Long-Range ICN for the IoT: Exploring a LoRa System Design
  38. Secure and Authorized Client-to-Client Communication for LwM2M
  39. Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging Solutions
  40. A mobility-compliant publish–subscribe system for an information-centric Internet of Things
  41. Securing name resolution in the IoT
  42. Transparent forwarders
  43. Mind the gap
  44. The Impact of Networking Protocols on Massive M2M Communication in the Industrial IoT
  45. The far side of DNS amplification
  46. QUICsand
  47. Poster: DSME-LoRa – A Flexible MAC for LoRa
  48. PHiLIP on the HiL: Automated Multi-Platform OS Testing With External Reference Devices
  49. Large-scale timer hardware analysis for a flexible low-level timer-API design
  50. Reliable firmware updates for the information-centric internet of things
  51. On the Deployment of Default Routes in Inter-domain Routing
  52. A Guideline on Pseudorandom Number Generation (PRNG) in the IoT
  53. Sense Your Power
  54. Third Party Authorization of LwM2M Clients
  55. Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI
  56. Industrial control protocols in the Internet core: Dismantling operational practices
  57. Fragment Forwarding in Lossy Networks
  58. Integration realer Angriffe in simulierte Echtzeit-Ethernet-Netzwerke
  59. Demo: A Security Infrastructure for Vehicular Information Using SDN, Intrusion Detection, and a Defense Center in the Cloud
  60. Requirements Analysis and Performance Evaluation of SDN Controllers for Automotive Use Cases
  61. Strategies for Integrating Control Flows in Software-Defined In-Vehicle Networks and Their Impact on Network Security
  62. Designing a LoWPAN convergence layer for the Information Centric Internet of Things
  63. Revisiting the network stack in CAF
  64. Network Anomaly Detection in Cars based on Time-Sensitive Ingress Control
  65. On Measuring RPKI Relying Parties
  66. BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap Damping
  67. Toward a RESTful Information-Centric Web of Things
  68. Connecting the Dots
  69. Long-Range IoT
  70. On economic, societal, and political aspects in ICN
  71. On the impact of QoS management in an Information-centric Internet of Things
  72. A QoS Aware Approach to Service-Oriented Communication in Future Automotive Networks
  73. Eco
  74. Down the Black Hole
  75. SANE: Smart Networks for Urban Citizen Participation
  76. Software-Defined Networks Supporting Time-Sensitive In-Vehicular Communication
  77. Simulation of Mixed Critical In-Vehicular Networks
  78. RIOT: An Open Source Operating System for Low-End Embedded Devices in the IoT
  79. A configurable transport layer for CAF
  80. The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem
  81. HoPP: Robust and Resilient Publish-Subscribe for an Information-Centric Internet of Things
  82. HoPP
  83. NDN, CoAP, and MQTT
  84. ICN-LoWPAN
  85. On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources
  86. Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering
  87. Seamless Producer Mobility for the Industrial Information-Centric Internet
  88. A PUF Seed Generator for RIOT
  89. Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering
  90. OpenCL Actors – Adding Data Parallelism to Actor-Based Programming with CAF
  91. Locality-guided scheduling in CAF
  92. Information-centric networking for the industrial IoT
  93. Low-power internet of things with NDN & cooperative caching
  94. The need for a name to MAC address mapping in NDN
  95. Towards Distributed Threat Intelligence in Real-Time
  96. Towards an Ecosystem for Reproducible Research in Computer Networking
  97. A Named Data Network Approach to Energy Efficiency in IoT
  98. Designing Time Slotted Channel Hopping and Information - Centric Networking for IoT
  99. Reconsidering reliability in distributed actor systems
  100. ICN over TSCH
  101. Let's collect names: How PANINI limits FIB tables in name based routing
  102. Revisiting actor programming in C++
  103. RiPKI
  104. On performance and robustness of internet-based smart grid communication: A case study for Germany
  105. Manyfold actors: extending the C++ actor framework to heterogeneous many-core machines using OpenCL
  106. Beware of the hidden! How cross-traffic affects quality assurances of competing real-time Ethernet standards for in-car communication
  107. Partial Adaptive Name Information in ICN
  108. Revisiting Countermeasures Against NDN Interest Flooding
  109. Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
  110. See How ISPs Care
  111. Dynamic cross-domain group communication in hybrid multicast networks
  112. Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
  113. See How ISPs Care
  114. RPKI MIRO
  115. The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire
  116. The Role of the Internet of Things in Network Resilience
  117. A hardware/software co-design approach for Ethernet controllers to support time-triggered traffic in the upcoming IEEE TSN standards
  118. Embedded Actors - Towards distributed programming in the IoT
  119. Software stacks for mixed-critical applications: Consolidating IEEE 802.1 AVB and time-triggered ethernet in next-generation automotive electronics
  120. Design of TDMA-based in-car networks: Applying multiprocessor scheduling strategies on time-triggered switched ethernet communication
  121. How dia-shows turn into video flows: Adapting scalable video communication to heterogeneous network conditions in real-time
  122. Native actors
  123. Are Circles Communities? A Comparative Analysis of Selective Sharing in Google+
  124. Let Our Browsers Socialize: Building User-Centric Content Communities on WebRTC
  125. Peer my Proxy - A performance study of peering extensions for multicast in Proxy Mobile IP domains
  126. Demonstration abstract: Simply RIOT — Teaching and experimental research in the Internet of Things
  127. CAF - the C++ Actor Framework for Scalable and Resource-Efficient Applications
  128. Information centric networking in the IoT
  129. Real-time Ethernet Residual Bus Simulation
  130. Extending IEEE 802.1 AVB with time-triggered scheduling: A simulation study of the coexistence of synchronous and asynchronous traffic
  131. Backscatter from the data plane – Threats to stability and security in information-centric network infrastructure
  132. Content-centric user networks: WebRTC as a path to name-based publishing
  133. Leveraging WebRTC for P2P content distribution in web browsers
  134. Consumer-oriented integration of smart homes and smart grids: A case for multicast-enabled Home Gateways?
  135. Multicast Source Mobility Support Schemes in PMIPv6 Networks
  136. On name-based group communication: Challenges, concepts, and transparent deployment
  137. Personal learning networks with open learning groups - A formal approach
  138. Mobile multicast source support in PMIPv6 networks
  139. A scalable communication infrastructure for smart grid applications using multicast over public networks
  140. Native actors
  141. Large-scale measurement and analysis of one-way delay in hybrid multicast networks
  142. Bulk of interest
  143. First insights from a mobile honeypot
  144. Towards detecting BGP route hijacking using the RPKI
  145. Vitamin C for your smartphone
  146. A monitoring framework for hybrid multicast networks
  147. Group formation in elearning-enabled online social networks
  148. Predictive video scaling - adapting source coding to early network congestion indicators
  149. Tomorrow's In-Car Interconnect? A Competitive Evaluation of IEEE 802.1 AVB and Time-Triggered Ethernet (AS6802)
  150. Socialize online learning: Why we should integrate learning content management with Online Social Networks
  151. Actors and publish/subscribe
  152. Bulk of interest
  153. Exploring reachability via settlement-free peering
  154. Exposing a Nation-Centric View on the German Internet – A Change in Perspective on AS-Level
  155. First insights from a mobile honeypot
  156. Towards detecting BGP route hijacking using the RPKI
  157. Vitamin C for your smartphone
  158. On predictable large-scale data delivery in prefix-based virtualized content networks
  159. A real-time Ethernet prototype platform for automotive applications
  160. Real-time Ethernet for automotive applications: A solution for future in-car networks
  161. Welcome Message
  162. A temporally scalable video codec and its applications to a video conferencing system with dynamic network adaption for mobiles
  163. Performance Analysis of Time-Triggered Ether-Networks Using Off-the-Shelf-Components
  164. A middleware for transparent group communication of globally distributed actors
  165. System-Level Service Assurance — The H∀Mcast Approach to Global Multicast
  166. Adaptive Temporal Scalability of H.264-Compliant Video Conferencing in Heterogeneous Mobile Environments
  167. System-assisted service evolution for a future Internet — The H∀Mcast approach to pervasive multicast
  168. Optimized temporal scalability for H.264 based codecs and its applications to video conferencing
  169. Comparing time-triggered Ethernet with FlexRay: An evaluation of competing approaches to real-time for in-vehicle networks
  170. Distributed SIP conference management with autonomously authenticated sources and its application to an H.264 videoconferencing software for mobiles
  171. A framework for nation-centric classification and observation of the internet
  172. A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP
  173. QoS Performance Study of One Way Link Characteristics in an IEEE 802.16d TDD System
  174. Towards a nation-centric understanding of the internet
  175. Fast adaptive routing supporting mobile senders in Source Specific Multicast
  176. A common API for hybrid group communication
  177. BIDIR-SAM: Large-scale content distribution in structured overlay networks
  178. Connecting the worlds: Multipoint videoconferencing integrating H.323 and IPv4, SIP and IPv6 with autonomous sender authentication
  179. A Generalized Group Communication Network Stack and its Application to Hybrid Multicast
  180. Overlay AuthoCast: Distributed Sender Authentication in Overlay Multicast
  181. An a priori estimator for the delay distribution in global hybrid multicast
  182. Broadcasting in Prefix Space: P2P Data Dissemination with Predictable Performance
  183. OASIS: An Overlay Abstraction for Re-architecting Large Scale Internet Group Services
  184. Peer the peers
  185. Scalable Distributed Conference Control in Heterogeneous Peer-to-Peer Scenarios with SIP
  186. What is happening from behind?
  187. Peer-to-peer videoconferencing with H.264 software codec for mobiles
  188. An optimized 11.264-based video conferencing software for mobile devices
  189. AuthoCast
  190. Towards Seamless Handovers in SSM Source Mobility An Evaluation of the Tree Morphing Protocol
  191. Towards seamless source mobility in SSM: design and evaluation of the Tree Morphing protocol
  192. Video-based e-learning in groups: combining SIP and multicast in a mobile learning internet infrastructure
  193. Between underlay and overlay
  194. Information services and technologies
  195. Network transparency in a mountain rescue domain
  196. Editorial
  197. A Hybrid Network Architecture for Mobile Multimedia Group Conferencing based on SIP Initiated SSM
  198. A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources
  199. On the Correlation of Geographic and Network Proximity at Internet Edges and Its Implications for Mobile Unicast and Multicast Routing
  200. Scalable Mobile Multimedia Group Conferencing Based on SIP Initiated SSM
  201. Exploring the routing complexity of mobile multicast
  202. Morphing distribution trees—On the evolution of multicast states under mobility and an adaptive routing scheme for mobile SSM sources
  203. Semantic overlays in educational content networks – the hylOs approach
  204. Unencapsulated Mobile Multicast Routing for Next Generation Video Networks
  205. Predictive versus Reactive—Analysis of Handover Performance and Its Implications on IPv6 and Multicast Mobility
  206. Global serverless videoconferencing over IP
  207. Media objects in time––a multimedia streaming system––work in progress paper v 1.5
  208. Stochastic path-integral simulation of quantum scattering
  209. Projectile break-up with two outgoing intermediate-mass fragments in 26 AMeV32S+197Au
  210. ETM – An Optimized Routing Protocol for Mobile SSM Sources
  211. A First Performance Analysis of the Tree Morphing Approach to IPv6 Source Mobility in Source Specific Multicast Routing
  212. DoS Protection through Credit Based Metering - Simulation-Based Evaluation for Time-Sensitive Networking in Cars
  213. SDN4CoRE: A Simulation Model for Software-Defined Networking for Communication over Real-Time Ethernet