Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
Author Templates
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Accessiblity Statement
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 80 (2021): Conference on Networked Systems 2021 (NetSys 2021)
Vol. 80 (2021): Conference on Networked Systems 2021 (NetSys 2021)
DOI:
https://doi.org/10.14279/tuj.eceasst.80
Published:
2021-09-08
Articles
Evaluation of Multi-hop Ad-hoc Routing Protocols in Wireless Seismic Data Acquisition
Aliyu Makama, Koojana Kuladinithi, Musab Ahmed, Andreas Timm-Giel
PDF
Demo: Traffic Splitting for Tor – A Defense against Fingerprinting Attacks
Sebastian Reuter, Jens Hiller, Jan Pennekamp, Andriy Panchenko, Klaus Wehrle
PDF
Navigating Communication Networks with Deep Reinforcement Learning
Patrick Krämer, Andreas Blenk
PDF
Count Me If You Can: Enumerating QUIC Servers Behind Load Balancers
Kashyap Thimmaraju, Björn Scheuermann
PDF
Zero Trust Service Function Chaining
Leonard Bradatsch, Frank Kargl, Oleksandr Miroshkin
PDF
Property Inference-based Federated Learning Groups for Collaborative Network Anomaly Detection
Jens Wettlaufer
PDF
Large Scale Monitoring of Web Application Software Distribution to Measure Threat Response Behavior
Fabian Marquardt, Lennart Buhl
PDF
Demo: Simulation-as-a-Service to Benchmark Opportunistic Networks
Jens Dede, Asanga Udugama, Anna Förster
PDF
Congestion Aware Objects Filtering for Collective Perception
Quentin Delooz, Andreas Festag, Alexey Vinel
PDF
Towards SCION-enabled IXPs: The SCION Peering Coordinator
Lars-Christian Schulz, David Hausheer
PDF
Polymorphic Protocols for Fighting Bots
August See
PDF
Molecular Communication Channel Modelling in FPGA Technology
Daniil Romanchenko, Matis Tartie, Ba Que Le, Jorge Torres Gómez, Falko Dressler
PDF
Firewall-as-a-Service for Campus Networks Based on P4-SFC
Marco Häberle, Benjamin Steinert, Michael Menth
PDF
IDN-Laser-Tester: A Framework for Detecting and Testing ILDA Digital Network Consumers for Laser Projection
Matthias Frank
PDF
Early Warning Identity Threat and Mitigation System
Aditya Tyagi, Razieh Nokhbeh Zaeem, K. Suzanne Barber
PDF
Towards opportunistic UAV relaying for smart cities
Tobias Hardes, Clemens Boos, Christoph Sommer
PDF
Information Management for Multi-Agent Systems
Yasin Alhamwy
PDF
Towards QoE-Driven Optimization of Multi-Dimensional Content Streaming
Yassin Alkhalili, Jannis Weil, anam tahir, Tobias Meuser, Boris Koldehofe, Andreas Mauthe, Heinz Koeppl, Ralf Steinmetz
PDF
Dynamic Monitoring Area Allocation for Aerial Post-Disaster Situation Monitoring
Julian Zobel, Niklas Stöhr, Ralf Kundel, Patrick Lieser, Ralf Steinmetz
PDF
An Application Layer Protocol to Support Cooperative Navigation of Multiple UAVs Systems
Maik Basso, Alexey Vinel, Edison Pignaton de Freitas
PDF
Hacking planned obsolescense in robotics, towards security-oriented robot teardown
Victor Mayoral-Vilches, Alfonso Glera-Picón, Unai Ayúcar-Carbajo, Stefan Rass, Martin Pinzger, Federico Maggi, Endika Gil-Uriarte
PDF
Ray-tracing based Inference Attacks on Physical Layer Security
Paul Walther, Markus Richter, Thorsten Strufe
PDF
Demo: Using LoRa Communications and Epidemic Routing in Disaster Rescue Operations
Yamani Dalpathadu, Showry Thumma, Asanga Udugama, Anna Förster
PDF
Deep Reinforcement Learning for Smart Queue Management
Hassan Fawaz, Djamal Zeghlache, Tran Anh Pham, Jérémie Leguay, Paolo Medagliani
PDF
Data Serialization Formats for the Internet of Things
Daniel Friesel, Olaf Spinczyk
PDF
Demonstration: A cloud-control system equipped with intrusion detection and mitigation
Fatemeh Akbarian, William Tärneberg, Emma Fitzgerald, Maria Kihl
PDF
Towards Deterministic Reconfigurable Networks
Zikai George Zhou, Wolfgang Kellerer
PDF
On the Resilience of Opportunistic Networks against DoS Attacks
Sanaz Afzali, Asanga Udugama, Anna Förster, Mathias Fischer
PDF
Smart Urban Data Space for Citizen Science
Heiko Bornholdt, David Jost, Philipp Kisters, Michel Rottleuthner, Sehrish Shafeeq, Winfried Lamersdorf, Thomas Schmidt, Mathias Fischer
PDF
“Vehicular Steganography”?: Opportunities and Challenges
Martin Cooney, Eric Järpe, Alexey Vinel
PDF
A Novel Approach to Achieving End-to-End QoS for Avionic Applications
Yevhenii Shudrenko, Daniel Plöger, Koojana Kuladinithi, Andreas Timm-Giel
PDF
User Space Packet Schedulers: Towards Rapid Prototyping of Queue-Management Algorithms
Ralf Kundel, Paul Stiegele, Dat Tran, Julian Zobel, Osama Abboud, Rhaban Hark, Ralf Steinmetz
PDF
Privacy-Preserving and Scalable Authentication based on Network Connection Traces
David Monschein, Oliver Waldhorst
PDF
Implementing DNSSEC soft delegation for microservices
Andres Marin-Lopez, Patricia Arias-Cabarcos, Thorsten Strufe, Gabriel Barceló-Soteras, Florina Almenares-Mendoza, Daniel Díaz-Sánchez
PDF
MoleNet: An Underground Sensor Network for Soil Monitoring
Jens Dede, Daniel Helms, Anna Förster
PDF
Impact of radio channel characteristics on the longitudinal behaviour of truck platoons in critical car-following situations
Salil Sharma, Ehab Al-Khannaq, Raphael Riebl, Wouter Schakel, Peter Knoppers, Alexander Verbraeck, Hans van Lint
PDF
Towards Optimization-Based Predictive Congestion Control for the Tor Network
Christoph Döpmann, Felix Fiedler, Sergio Lucia, Florian Tschorsch
PDF
Discrete event simulation for the purpose of real-time performance evaluation of distributed hardware-in-the-loop simulators for autonomous driving vehicle validation
Christoph Funda, Kai-Steffen Hielscher, Reinhard German
PDF
Browser Fingerprinting: How to Protect Machine Learning Models and Data with Differential Privacy?
Katharina Dietz, Michael Mühlhauser, Michael Seufert, Nicholas Gray, Tobias Hoßfeld, Dominik Herrmann
PDF
Federated User Clustering for non-IID Federated Learning
Lucas Pacheco, Denis Rosário, Eduadro Cerqueira, Torsten Braun
PDF
FlowEmu: An Open-Source Flow-Based Network Emulator
Daniel Stolpmann, Andreas Timm-Giel
PDF
Modular Platform for Detecting and Classifying Phishing Websites Using Cyber Threat Intelligence
Ahmed Elmisery, Mirela Sertovic
PDF
Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays
Martin Byrenheid, Stefanie Roos, Thorsten Strufe
PDF
Early Work: Path Selection in a Path-aware Network Architecture
Thorben Krüger, David Hausheer
PDF
Time- and Frequency-Domain Dynamic Spectrum Access: Learning Cyclic Medium Access Patterns in Partially Observable Environments
Sebastian Lindner, Daniel Stolpmann, Andreas Timm-Giel
PDF
Discrete-time Analysis of Multicomponent GI/GI/1 Queueing Networks
Stefan Geissler, Stanislav Lange, Tobias Hossfeld, Phuoc Tran-Gia
PDF
Demonstration: A cloud-native digital twin with adaptive cloud-based control and intrusion detection
William Tärneberg, Martin Gunnarsson, Maria Kihl, Christian Gehrmann
PDF
Wiretapping Pods and Nodes - Lawful Interception in Kubernetes
Daniel Spiekermann, Jörg Keller
PDF
Preface
Preface and Table of Contents
Mathias Fischer, Winfried Lamersdorf
PDF
Information
For Readers
For Authors
For Librarians
Usage Statistics Information
We log anonymous usage statistics. Please read the
privacy information
for details.