Ageing detection and failure prediction are essential in many Internet o...
Automotive softwarization is progressing and future cars are expected to...
Modern In-Vehicle Networks (IVNs) are composed of a large number of devi...
In this paper, we revisit the use of honeypots for detecting reflective
...
Security is essential for the Internet of Things (IoT). Cryptographic
op...
Embedded digital devices, such as Field-Programmable Gate Arrays (FPGAs)...
In this paper, we revisit the performance of the QUIC connection setup a...
The IPv6 over Bluetooth Low Energy (BLE) standard defines the transfer o...
In this paper, we study the potentials of passive measurements to gain
a...
Connecting long-range wireless networks to the Internet imposes challeng...
In this paper, we present the design, implementation, and analysis of DN...
The critical remote-code-execution (RCE) Log4Shell is a severe vulnerabi...
This paper presents LoRa-ICN, a comprehensive IoT networking system base...
Constrained devices on the Internet of Things (IoT) continuously produce...
Current designs of future In-Vehicle Networks (IVN) prepare for switched...
Connected cars are vulnerable to cyber attacks. Security challenges aris...
LoRa is a popular wireless technology that enables low-throughput (bytes...
Large-scale Internet scans are a common method to identify victims of a
...
In this paper, we revisit the open DNS (ODNS) infrastructure and, for th...
Real-time networks based on Ethernet require robust quality-of-service f...
When the global rollout of the DNS Security Extensions (DNSSEC) began in...
In this paper, we present first measurements of Internet background radi...
In this paper, we shed new light on the DNS amplification ecosystem, by
...
Security in the Internet of Things (IoT) requires ways to regularly upda...
Developing an operating system (OS) for low-end embedded devices require...
Content replication to many destinations is a common use case in the Int...
Clock configuration within constrained general-purpose microcontrollers ...
Current In-Vehicle Networks (IVNs) connect Electronic Control Units (ECU...
During disasters, crisis, and emergencies the public relies on online
se...
Security and trust are essential building blocks for the emerging Intern...
Inter-connected sensors and actuators have scaled down to small embedded...
The emerging Internet of Things (IoT) challenges the end-to-end transpor...
IP spoofing enables reflection and amplification attacks, which cause ma...
Service-Oriented Architecture (SOA) is about to enter automotive network...
Energy-constrained sensor nodes can adaptively optimize their energy
con...
Ethernet has become the next standard for automotive and industrial
auto...
Ethernet is the most promising solution to reduce complexity and enhance...
Bluetooth (BT) mesh is a new mode of BT operation for low-energy devices...
Quality of Service (QoS) in the IP world mainly manages forwarding resou...
On the Internet of Things (IoT), devices continuously communicate with e...
This paper evaluates two forwarding strategies for fragmented datagrams ...
Future in-vehicular networks will be based on Ethernet. The IEEE
Time-Se...
Industrial control systems (ICS) are managed remotely with the help of
d...
Information Centric Networking is considered a promising communication
t...
Industrial production plants traditionally include sensors for monitorin...
The message-driven nature of actors lays a foundation for developing sca...
In this paper, we analyze the evolution of Certificate Transparency (CT)...
Future automotive applications ranging from advanced driver assistance t...
This paper takes a comprehensive view on the protocol stacks that are un...
Modern cities and metropolitan areas all over the world face new managem...