Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Industrial control protocols in the Internet core: Dismantling operational practices., , and . Int. J. Netw. Manag., (2022)A Reproducibility Study of "IP Spoofing Detection in Inter-Domain Traffic"., , , and . CoRR, (2019)Uncovering Vulnerable Industrial Control Systems from the Internet Core., , and . CoRR, (2019)Alternative Delta Time Encoding for Content-Centric Networking (CCNx) Using Compact Floating-Point Arithmetic., , , and . RFC, (February 2024)The Dagstuhl beginners guide to reproducibility for experimental networking research., , , , , , , , and . Comput. Commun. Rev., 49 (1): 24-30 (2019)PHiLIP on the HiL: Automated Multi-platform OS Testing with External Reference Devices., , , and . CoRR, (2021)IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison., , , and . CoRR, (2020)Poster: DSME-LoRa - A Flexible MAC for LoRa., , , and . ICNP, page 1-2. IEEE, (2021)Mind the gap: multi-hop IPv6 over BLE in the IoT., , and . CoNEXT, page 382-396. ACM, (2021)Bewegtes Lernen in mobilen Kommunikationsinfrastrukturen., , , , and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-55 of LNI, page 249-263. GI, (2004)