Thomas Engel
Thomas Engel
Bestätigte E-Mail-Adresse bei
TitelZitiert vonJahr
Internet of things in the 5G era: Enablers, architecture, and business models
MR Palattella, M Dohler, A Grieco, G Rizzo, J Torsner, T Engel, L Ladid
IEEE Journal on Selected Areas in Communications 34 (3), 510-527, 2016
Website fingerprinting in onion routing based anonymization networks
A Panchenko, L Niessen, A Zinnen, T Engel
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
On optimal scheduling in duty-cycled industrial IoT applications using IEEE802. 15.4 e TSCH
MR Palattella, N Accettura, LA Grieco, G Boggia, M Dohler, T Engel
IEEE Sensors Journal 13 (10), 3655-3666, 2013
BotTrack: tracking botnets using NetFlow and PageRank
J François, S Wang, T Engel
International Conference on Research in Networking, 1-14, 2011
Driver behavior profiling using smartphones: A low-cost platform for driver monitoring
G Castignani, T Derrmann, R Frank, T Engel
IEEE Intelligent Transportation Systems Magazine 7 (1), 91-102, 2015
Website Fingerprinting at Internet Scale.
A Panchenko, F Lanze, J Pennekamp, T Engel, A Zinnen, M Henze, ...
NDSS, 2016
Botcloud: Detecting botnets using mapreduce
J Francois, S Wang, W Bronzi, R State, T Engel
2011 IEEE International Workshop on Information Forensics and Security, 1-6, 2011
Luxembourg sumo traffic (lust) scenario: 24 hours of mobility for vehicular networking research
L Codeca, R Frank, T Engel
Proceedings of the 7th IEEE Vehicular Networking Conference, 1-8, 2015
A big data architecture for large scale security monitoring
S Marchal, X Jiang, R State, T Engel
2014 IEEE International Congress on Big Data, 56-63, 2014
Bluetooth Low Energy: An alternative technology for VANET applications
R Frank, W Bronzi, G Castignani, T Engel
Wireless On-demand Network Systems and Services (WONS), 2014 11th Annual …, 2014
On-the-fly bandwidth reservation for 6TiSCH wireless industrial networks
MR Palattella, T Watteyne, Q Wang, K Muraoka, N Accettura, D Dujovne, ...
IEEE Sensors Journal 16 (2), 550-560, 2016
Phishstorm: Detecting phishing with streaming analytics
S Marchal, J François, R State, T Engel
IEEE Transactions on Network and Service Management 11 (4), 458-471, 2014
Model synchronization based on triple graph grammars: correctness, completeness and invertibility
F Hermann, H Ehrig, F Orejas, K Czarnecki, Z Diskin, Y Xiong, ...
Software & Systems Modeling 14 (1), 241-269, 2015
Self adaptive high interaction honeypots driven by game theory
G Wagener, A Dulaunoy, T Engel
Symposium on Self-Stabilizing Systems, 741-755, 2009
6tisch wireless industrial networks: Determinism meets ipv6
MR Palattella, P Thubert, X Vilajosana, T Watteyne, Q Wang, T Engel
Internet of Things, 111-141, 2014
CCN traffic optimization for IoT
J François, T Cholez, T Engel
Network of the Future (NOF), 2013 Fourth International Conference on the, 1-5, 2013
Bluetooth low energy performance and robustness analysis for inter-vehicular communications
W Bronzi, R Frank, G Castignani, T Engel
Ad Hoc Networks 37, 76-86, 2016
Proactive discovery of phishing related domain names
S Marchal, J François, T Engel
International Workshop on Recent Advances in Intrusion Detection, 190-209, 2012
Collusion detection for grid computing
E Staab, T Engel
Cluster Computing and the Grid, 2009. CCGRID'09. 9th IEEE/ACM International …, 2009
Runtime monitoring and dynamic reconfiguration for intrusion detection systems
M Rehák, E Staab, V Fusenig, M Pěchouček, M Grill, J Stiborek, K Bartoš, ...
International Workshop on Recent Advances in Intrusion Detection, 61-80, 2009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20