@inproceedings{2019a, author = "S. Brack and R. Muth and S. Dietzel and B. Scheuermann", title = "Recommender Systems on Homomorphically Encrypted Databases for Enhanced User Privacy", year = 2019, booktitle = "LCN' 19: Symposium of the 44th IEEE Conference on Local Computer Networks", publisher = "IEEE", month = "Oct" } @article{Schaeffer2019a, author = "R. Naumann and S. Dietzel and B. Scheuermann", title = "Push the Barrier: Discrete Event Protocol Emulation", year = 2019, journal = "IEEE/ACM Transactions on Networking", publisher = "IEEE/ACM", month = "Jan", note = "to appear" } @article{2018a, author = "M. Schaeffer and R. Naumann and S. Dietzel and B. Scheuermann", title = "Impact of Prioritized Network Coding on Sensor Data Collection in Smart Factories", year = 2018, booktitle = "2018 IFIP Networking Conference (IFIP Networking)", publisher = "2018 IFIP Networking Conference (IFIP Networking)", month = "May" } @article{2018a, author = "S. Hager and P. John and S. Dietzel and B. Scheuermann", title = "RuleBender: Tree-based Policy Transformations for Practical Packet Classification Systems", year = 2018, journal = "Computer Networks", publisher = "Elsevier", volume = 135, month = "Apr", doi = "https://doi.org/10.1016/j.comnet.2018.02.019" } @article{henningsen2018misbehavior, author = "S. Henningsen and S. Dietzel and B. Scheuermann", title = "Misbehavior Detection in Industrial Wireless Networks: Challenges and Directions", year = 2018, journal = "Mobile Networks and Applications", publisher = "Springer" } @inproceedings{2018a, author = "S. Henningsen and L. Mann and S. Dietzel and B. Scheuermann", title = "Together We are Strong: Securing Industrial Wireless Networks with Overhearing Nodes", year = 2018, journal = "LCN '18: Proceedings of the 43th IEEE Conference on Local Computer Networks", publisher = "IEEE" } @inbook{2018a, author = "J. Petit and S. Dietzel and F. Kargl", title = "Privacy of Connected Vehicles", year = 2018, booktitle = "Handbook of Mobile Data Privacy", publisher = "Springer", doi = "10.1007/978-3-319-98161-1_9", url = "https://link.springer.com/book/10.1007%2F978-3-319-98161-1", isbn = "978-3-319-98161-1" } @inproceedings{2018a, author = "M. Schaeffer and R. Naumann and S. Dietzel and B. Scheuermann", title = "Hierarchical Layer Selection with Low Overhead in Prioritized Network Coding", year = 2018, booktitle = "Networking'17: 17th International IFIP TC6 Networking Conference", publisher = "IFIP" } @inproceedings{Brack2017a, author = "S. Brack and S. Dietzel and B. Scheuermann", title = "ANONUS: Anonymous Bonus Point System with Fraud Detection", year = 2017, booktitle = "LCN '17: The 42nd IEEE Conference on Local Computer Networks", month = "Oct", note = "to appear" } @inproceedings{2017a, author = "R. Naumann and S. Dietzel and L. Wartschinski and B. Schumacher and B. Scheuermann", title = "TANDEM: Prioritizing Wireless Communication for Robust Industrial Process Control", year = 2017, booktitle = "ICCCN '17: 2017 26th International Conference on Computer Communication and Networks", publisher = "IEEE", keywords = "wireless communication, wireless sensor networks, protocols, production facilities, ad hoc networks, routing", doi = "10.1109/ICCCN.2017.8038458", url = "http://ieeexplore.ieee.org/document/8038458/" } @inproceedings{2017a, author = "H. Sparka and R. Naumann and S. Dietzel and B. Scheuermann", title = "Effective Lossless Compression of Sensor Information in Manufacturing Industry", year = 2017, booktitle = "LCN '17: The 42nd IEEE Conference on Local Computer Networks", note = "to appear" } @inproceedings{DBLP:conf/adhocnets/HenningsenD017, author = "S. A. Henningsen and S. Dietzel and B. Scheuermann", title = "Challenges of Misbehavior Detection in Industrial Wireless Networks", year = 2017, booktitle = "Ad Hoc Networks - 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28-29, 2017, Proceedings", doi = "10.1007/978-3-319-74439-1\_4" } @inproceedings{2016a, author = "R. Naumann and S. Dietzel and B. Scheuermann", title = "Towards More Realistic Network Simulations: Leveraging the System-Call Barrier", year = 2016, booktitle = "Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering", publisher = "Springer", volume = 184, month = "Dec", doi = "10.1007/978-3-319-51204-4_15" } @inproceedings{2016a, author = "T. Dittler and F. Tschorsch and S. Dietzel and B. Scheuermann", title = "ANOTEL: Cellular Networks with Location Privacy", year = 2016, booktitle = "LCN '16: Proceedings of the 41th IEEE Conference on Local Computer Networks", publisher = "IEEE", month = "Nov" } @inproceedings{2016a, author = "R. Naumann and S. Dietzel and B. Scheuermann", title = "Best of Both Worlds: Prioritizing Network Coding without Increased Space Complexity", year = 2016, booktitle = "LCN '16: Proceedings of the 41th IEEE Conference on Local Computer Networks", publisher = "IEEE", month = "Nov", doi = "10.1109/LCN.2016.123" } @techreport{2016a, author = "R. W. van der Heijden and S. Dietzel and T. Leinmüller and F. Kargl", title = "Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems", year = 2016, institution = "arXiv.org", month = "Oct", eprint = "1610.06810", archiveprefix = "arXiv" } @techreport{2016a, author = "T. Dittler and F. Tschorsch and S. Dietzel and B. Scheuermann", title = "ANOTEL: Cellular Networks with Location Privacy (Extended Version)", year = 2016, journal = "Cryptology ePrint Archive", publisher = "IACR", volume = 2016, number = 764, month = "Aug", url = "https://eprint.iacr.org/2016/764" } @inproceedings{2016a, author = "J. Eising and F. Fischer and J. Flaig and O. Florian and C. Fritze and K. Indych and M. Montenegro and S. Müller and M. Schneider and N. Vieregg and A. Wegge and H. Döbler and F. Koller and O. Menzel and S. Dietzel and B. Scheuermann", title = "PARCOURS: A SUMO-Integrated 3D Driving Simulator for Behavioral Studies", year = 2016, booktitle = "SUMO '16: SUMO User Conference", month = "May", url = "http://www.dlr.de/ts/en/Portaldata/16/Resources/veranstaltungen/2016/SUMOconference_proceedings_2016.pdf" } @article{2016a, author = "S. Henningsen and S. Dietzel and B. Scheuermann", title = "Attack Detection in Wireless Networks Using Channel State Information", year = 2016, journal = "2nd KuVS Expert Talk on Localization" } @inproceedings{2015a, author = "R. Naumann and S. Dietzel and B. Scheuermann", title = "INFLATE: Incremental Wireless Transmission for Sensor Information in Industrial Environments", year = 2015, booktitle = "ANTS '15: Proceedings of the 9th IEEE International Conference on Advanced Networks and Telecommunications Systems", publisher = "IEEE", month = "Dec", doi = "10.1109/ANTS.2015.7413631", note = "to appear" } @inproceedings{2015a, author = "S. Dietzel and R. van der Heijden and J. Petit and F. Kargl", title = "Context-adaptive Detection of Insider Attacks in VANET Information Dissemination Schemes", year = 2015, booktitle = "VNC '15: Proceedings of the 7th Annual IEEE Vehicular Networking Conference", publisher = "IEEE", month = "Dec", note = "to appear" } @inproceedings{2015a, author = "S. Dietzel and A. Peter and F. Kargl", title = "Secure Cluster-based In-network Information Aggregation for Vehicular Networks", year = 2015, booktitle = "VTC Spring '15: IEEE 81st Vehicular Technology Conference", publisher = "IEEE", doi = "10.1109/VTCSpring.2015.7146074" } @article{2015a, author = "S. Dietzel and J. Gürtler and F. Kargl", title = "A resilient in-network aggregation mechanism for VANETs based on dissemination redundancy", year = 2015, journal = "Elsevier Ad Hoc Networks", publisher = "Elsevier", doi = "10.1016/j.adhoc.2015.09.002" } @article{Dietzel2014a, author = "S. Dietzel and J. Petit and F. Kargl and B. Scheuermann", title = "In-Network Aggregation for Vehicular Ad Hoc Networks", year = 2014, journal = "IEEE Communications Surveys & Tutorials", volume = 16, number = 4, doi = "10.1109/COMST.2014.2320091" } @inproceedings{2014a, author = "S. Dietzel and R. van der Heijden and H. Decke and F. Kargl", title = "A flexible, subjective logic-based framework for misbehavior detection in V2V networks", year = 2014, booktitle = "IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)", publisher = "IEEE", doi = "10.1109/WoWMoM.2014.6918989" } @inproceedings{2014a, author = "S. Dietzel and J. Gürtler and R. van der Heijden and F. Kargl", title = "Redundancy-based Statistical Analysis for Insider Attack Detection in VANET Aggregation Schemes", year = 2014, booktitle = "IEEE Vehicular Networking Conference (VNC)", publisher = "IEEE", doi = "10.1109/VNC.2014.7013332" } @inproceedings{2013a, author = "S. Dietzel and M. Balanici and F. Kargl", title = "Short paper: Towards data-similarity-based clustering for inter-vehicle communication", year = 2013, booktitle = "IEEE Vehicular Networking Conference (VNC)", publisher = "IEEE", doi = "10.1109/VNC.2013.6737622" } @inproceedings{2013a, author = "R. van der Heijden and S. Dietzel and F. Kargl", title = "SeDyA: secure dynamic aggregation in VANETs", year = 2013, booktitle = "ACM conference on Security and privacy in wireless and mobile networks (WiSec)", publisher = "ACM", doi = "10.1145/2462096.2462119" } @article{2013a, author = "S. Dietzel and J. Petit and G. Heijenk and F. Kargl", title = "Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols", year = 2013, journal = "IEEE Transactions on Vehicular Technology", publisher = "IEEE", volume = 62, number = 4, doi = "10.1109/TVT.2012.2236117" } @inproceedings{2012a, author = "F. Schaub and B. Könings and S. Dietzel and M. Weber and F. Kargl", title = "Privacy Context Model for Dynamic Privacy Adaptation in Ubiquitous Computing", year = 2012, booktitle = "ACM Conference on Ubiquitous Computing", publisher = "ACM", doi = "10.1145/2370216.2370383" } @inproceedings{2012a, author = "S. Dietzel and M. Kost and F. Schaub and F. Kargl", title = "CANE: A Controlled Application Environment for privacy protection in ITS", year = 2012, booktitle = "12th International Conference on ITS Telecommunications (ITST)", publisher = "IEEE", doi = "10.1109/ITST.2012.6458663" } @inproceedings{2012a, author = "S. Dietzel and J. Petit and F. Kargl and G. Heijenk", title = "Short paper: Analyzing Dissemination Redundancy to Achieve Data Consistency in VANETs", year = 2012, booktitle = "Ninth ACM international workshop on VehiculAr InterNETworking (VANET)", publisher = "ACM", doi = "10.1145/2307888.2307914" } @article{2011a, author = "M. Kost and B. Wiedersheim and S. Dietzel and F. Schaub and T. Bachmor", title = "WiSec 2011 demo: PRECIOSA PeRA - practical enforcement of privacy policies in intelligent transportation systems", year = 2011, journal = "ACM SIGMOBILE Mobile Computing and Communications Review", publisher = "ACM", volume = 15, number = 3, doi = "10.1145/2073290.2073298" } @inproceedings{2011a, author = "S. Dietzel", title = "Privacy Implications of in-Network Aggregation Mechanisms for VANETs (Invited Paper)", year = 2011, booktitle = "8th International Conference on Wireless on-Demand Network Systems and Services (WONS)", publisher = "IEEE", doi = "10.1109/WONS.2011.5720205" } @article{2011a, author = "S. Dietzel and F. Kargl and G. Heijenk and F. Schaub", title = "Modeling in-Network Aggregation in VANETs", year = 2011, journal = "IEEE Communications Magazine", publisher = "IEEE", volume = 49, number = 11, doi = "10.1109/MCOM.2011.6069721" } @inproceedings{2010a, author = "E. Schoch and B. Bako and S. Dietzel and F. Kargl", title = "Dependable and secure geocast in vehicular networks", year = 2010, booktitle = "Seventh ACM international workshop on VehiculAr InterNETworking (VANET)", publisher = "ACM", doi = "10.1145/1860058.1860068" } @inproceedings{2010a, author = "F. Kargl and F. Schaub and S. Dietzel", title = "Mandatory Enforcement of Privacy Policies using Trusted Computing Principles", year = 2010, booktitle = "Intelligent Information Privacy Management Symposium", publisher = "AAAI", url = "http://doc.utwente.nl/72421/" } @article{2010a, author = "S. Dietzel and E. Schoch and B. Könings and M. Weber and F. Kargl", title = "Resilient Secure Aggregation for Vehicular Networks", year = 2010, journal = "IEEE Network", publisher = "IEEE", volume = 24, number = 1, doi = "10.1109/MNET.2010.5395780" } @inproceedings{2010a, author = "S. Dietzel and F. Kargl and G. Heijenk and F. Schaub", title = "On the Potential of Generic Modeling for VANET Data Aggregation Protocols", year = 2010, booktitle = "2nd IEEE Vehicular Networking Conference (VNC)", publisher = "IEEE", doi = "10.1109/VNC.2010.5698256" } @inproceedings{2009a, author = "B. Könings and F. Schaub and F. Kargl and S. Dietzel", title = "Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard", year = 2009, booktitle = "IEEE 34th Conference on Local Computer Networks (LCN)", institution = "IEEE", doi = "10.1109/LCN.2009.5355149" } @inproceedings{2009a, author = "S. Dietzel and B. Bako and E. Schoch and F. Kargl", title = "A Fuzzy Logic Based Approach for Structure-Free Aggregation in Vehicular ad-hoc Networks", year = 2009, booktitle = "Sixth ACM international workshop on VehiculAr InterNETworking (VANET)", publisher = "ACM", doi = "10.1145/1614269.1614283" }