<?xml version="1.0"?>
<dblpperson name="Frank Kargl" pid="46/306" n="266">
<person key="homepages/46/306" mdate="2025-01-10">
<author pid="46/306">Frank Kargl</author>
<url>http://www.kargl.net/</url>
<url>https://orcid.org/0000-0003-3800-8369</url>
<url>https://www.wikidata.org/entity/Q130907462</url>
<note type="affiliation">Ulm University, Faculty of Engineering and Computer Science</note>
<note type="affiliation">University of Twente, Faculty of Electrical Engineering, Mathematics and Computer Science</note>
</person>
<r><article key="journals/popets/MeissnerKEE25" mdate="2024-12-03">
<author pid="392/0539">Echo Mei&#223;ner</author>
<author pid="46/306">Frank Kargl</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="176/0554">Felix Engelmann</author>
<title>PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites.</title>
<pages>632-653</pages>
<year>2025</year>
<volume>2025</volume>
<journal>Proc. Priv. Enhancing Technol.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.56553/popets-2025-0034</ee>
<url>db/journals/popets/popets2025.html#MeissnerKEE25</url>
<stream>streams/journals/popets</stream>
</article>
</r>
<r><inproceedings key="conf/cscs2/TrkuljaHDMBKE25" mdate="2026-03-05">
<author orcid="0000-0003-2945-4869" pid="277/5192">Natasa Trkulja</author>
<author orcid="0009-0004-3406-267X" pid="348/8380">Artur Hermann</author>
<author orcid="0009-0005-1773-8516" pid="428/0601">Paul Lukas Duhr</author>
<author orcid="0000-0002-2937-6306" pid="392/0539">Echo Mei&#223;ner</author>
<author orcid="0000-0001-5973-0794" pid="48/10495">Michael Buchholz</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<author orcid="0000-0002-5432-4989" pid="117/6830">Benjamin Erb</author>
<title>Vehicle-to-Everything Trust: Enabling Autonomous Trust Assessment of V2X Data by Vehicles.</title>
<pages>8:1-8:14</pages>
<year>2025</year>
<booktitle>CSCS</booktitle>
<ee>https://doi.org/10.1145/3736130.3762691</ee>
<crossref>conf/cscs2/2025</crossref>
<url>db/conf/cscs2/cscs2025.html#TrkuljaHDMBKE25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/KleberEPEK25" mdate="2025-07-21">
<author pid="161/5354">Stephan Kleber</author>
<author pid="362/3342">Jeremias Eppler</author>
<author pid="411/3258">Tim Palm</author>
<author pid="411/3275">Dennis Eisermann</author>
<author pid="46/306">Frank Kargl</author>
<title>Assessing the Transferability of Adversarial Patches in Real-World Systems: Implications for Adversarial Testing of Image Recognition Security.</title>
<pages>42-48</pages>
<year>2025</year>
<booktitle>DSN-S</booktitle>
<ee>https://doi.org/10.1109/DSN-S65789.2025.00040</ee>
<crossref>conf/dsn/2025s</crossref>
<url>db/conf/dsn/dsn2025s.html#KleberEPEK25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fusion/OuattaraKDK25" mdate="2026-03-19">
<author pid="388/6179">Koffi Ismael Ouattara</author>
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="99/4618">Theo Dimitrakos</author>
<author pid="46/306">Frank Kargl</author>
<title>Quantifying Calibration Error in Neural Networks Through Evidence-Based Theory.</title>
<pages>1-8</pages>
<year>2025</year>
<booktitle>FUSION</booktitle>
<ee>https://doi.org/10.23919/FUSION65864.2025.11124121</ee>
<crossref>conf/fusion/2025</crossref>
<url>db/conf/fusion/fusion2025.html#OuattaraKDK25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itsc/HermannTEEK25" mdate="2026-03-30">
<author pid="348/8380">Artur Hermann</author>
<author pid="277/5192">Natasa Trkulja</author>
<author pid="411/3275">Dennis Eisermann</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>Hyperparameter Optimization-Based Trust Quantification for Misbehavior Detection Systems.</title>
<pages>2589-2596</pages>
<year>2025</year>
<booktitle>ITSC</booktitle>
<ee>https://doi.org/10.1109/ITSC60802.2025.11423703</ee>
<crossref>conf/itsc/2025</crossref>
<url>db/conf/itsc/itsc2025.html#HermannTEEK25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/rulemlrr/OuattaraPKDK25" mdate="2025-10-30">
<author pid="388/6179">Koffi Ismael Ouattara</author>
<author pid="183/8461">Ana Petrovska</author>
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="99/4618">Theo Dimitrakos</author>
<author pid="46/306">Frank Kargl</author>
<title>An Optimized Framework for DSPG Synthesis and Trust Network Analysis with Subjective Logic.</title>
<pages>54-71</pages>
<year>2025</year>
<booktitle>RuleML+RR</booktitle>
<ee>https://doi.org/10.1007/978-3-032-08887-1_4</ee>
<crossref>conf/rulemlrr/2025</crossref>
<url>db/conf/rulemlrr/rulemlrr2025.html#OuattaraPKDK25</url>
<stream>streams/conf/rulemlrr</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/HermannTMEK25" mdate="2025-07-12">
<author pid="348/8380">Artur Hermann</author>
<author pid="277/5192">Natasa Trkulja</author>
<author pid="392/0539">Echo Mei&#223;ner</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>Demo: Quantifying Trust in a Trust Assessment Framework.</title>
<pages>1-2</pages>
<year>2025</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC64509.2025.11054127</ee>
<crossref>conf/vnc/2025</crossref>
<url>db/conf/vnc/vnc2025.html#HermannTMEK25</url>
<stream>streams/conf/vnc</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/HermannTWEK25" mdate="2025-07-12">
<author pid="348/8380">Artur Hermann</author>
<author pid="277/5192">Natasa Trkulja</author>
<author pid="334/2176">Patrick Wachter</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>Quantification Methods for Trust in Cooperative Driving.</title>
<pages>1-8</pages>
<year>2025</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC64509.2025.11054209</ee>
<crossref>conf/vnc/2025</crossref>
<url>db/conf/vnc/vnc2025.html#HermannTWEK25</url>
<stream>streams/conf/vnc</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/HormannMSZK25" mdate="2025-07-12">
<author pid="401/5136">Max H&#246;rmann</author>
<author pid="401/4258">Marcus Marx</author>
<author pid="54/10194">Michele Segata</author>
<author pid="242/1853">Michele Zucchelli</author>
<author pid="46/306">Frank Kargl</author>
<title>Poster: MBHWS - a Mountainbike-to-Hiker Warning System.</title>
<pages>1-2</pages>
<year>2025</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC64509.2025.11054120</ee>
<crossref>conf/vnc/2025</crossref>
<url>db/conf/vnc/vnc2025.html#HormannMSZK25</url>
<stream>streams/conf/vnc</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/wons/ZucchelliMHKS25" mdate="2025-04-07">
<author pid="242/1853">Michele Zucchelli</author>
<author pid="401/4258">Marcus Marx</author>
<author pid="401/5136">Max H&#246;rmann</author>
<author pid="46/306">Frank Kargl</author>
<author pid="54/10194">Michele Segata</author>
<title>Challenges and Initial Measurements on Communication and Localization for Mountain Bike Safety Applications.</title>
<pages>1-8</pages>
<year>2025</year>
<booktitle>WONS</booktitle>
<ee>https://ieeexplore.ieee.org/document/10926002</ee>
<crossref>conf/wons/2025</crossref>
<url>db/conf/wons/wons2025.html#ZucchelliMHKS25</url>
<stream>streams/conf/wons</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2508-13813" mdate="2025-09-18">
<author pid="388/6179">Koffi Ismael Ouattara</author>
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="99/4618">Theo Dimitrakos</author>
<author pid="46/306">Frank Kargl</author>
<title>Assessing Trustworthiness of AI Training Dataset using Subjective Logic - A Use Case on Bias.</title>
<year>2025</year>
<month>August</month>
<volume>abs/2508.13813</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2508.13813</ee>
<url>db/journals/corr/corr2508.html#abs-2508-13813</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2511-20586" mdate="2026-01-14">
<author pid="388/6179">Koffi Ismael Ouattara</author>
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="99/4618">Theo Dimitrakos</author>
<author pid="411/3275">Dennis Eisermann</author>
<author pid="18/5416">Houda Labiod</author>
<author pid="46/306">Frank Kargl</author>
<title>PaTAS: A Framework for Trust Propagation in Neural Networks Using Subjective Logic.</title>
<year>2025</year>
<month>November</month>
<volume>abs/2511.20586</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2511.20586</ee>
<url>db/journals/corr/corr2511.html#abs-2511-20586</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/access/BradatschK24" mdate="2025-01-25">
<author orcid="0000-0001-7120-6557" pid="170/1086">Leonard Bradatsch</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>Integration of Security Service Functions Into Network-Level Access Control.</title>
<pages>197783-197815</pages>
<year>2024</year>
<volume>12</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2024.3522575</ee>
<url>db/journals/access/access12.html#BradatschK24</url>
<stream>streams/journals/access</stream>
</article>
</r>
<r><article key="journals/tissec/SommerGKKS24" mdate="2025-01-19">
<author orcid="0000-0002-4009-7164" pid="176/2333">Florian Sommer</author>
<author orcid="0000-0001-9991-8388" pid="329/1109">Mona Gierl</author>
<author orcid="0000-0001-8599-5999" pid="167/3305">Reiner Kriesten</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<author orcid="0000-0003-2567-2340" pid="12/3602">Eric Sax</author>
<title>Combining Cyber Security Intelligence to Refine Automotive Cyber Threats.</title>
<pages>16</pages>
<year>2024</year>
<month>May</month>
<volume>27</volume>
<journal>ACM Trans. Priv. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/3644075</ee>
<ee>https://www.wikidata.org/entity/Q128649297</ee>
<url>db/journals/tissec/tissec27.html#SommerGKKS24</url>
<stream>streams/journals/tissec</stream>
</article>
</r>
<r><inproceedings key="conf/fusion/OuattaraPHTDK24" mdate="2025-03-03">
<author orcid="0009-0005-5786-0049" pid="388/6179">Koffi Ismael Ouattara</author>
<author pid="183/8461">Ana Petrovska</author>
<author pid="348/8380">Artur Hermann</author>
<author pid="277/5192">Natasa Trkulja</author>
<author pid="99/4618">Theo Dimitrakos</author>
<author pid="46/306">Frank Kargl</author>
<title>On Subjective Logic Trust Discount for Referral Paths.</title>
<pages>1-8</pages>
<year>2024</year>
<booktitle>FUSION</booktitle>
<ee>https://doi.org/10.23919/FUSION59988.2024.10706345</ee>
<crossref>conf/fusion/2024</crossref>
<url>db/conf/fusion/fusion2024.html#OuattaraPHTDK24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secrypt/BradatschHK24" mdate="2024-09-05">
<author pid="170/1086">Leonard Bradatsch</author>
<author pid="348/8380">Artur Hermann</author>
<author pid="46/306">Frank Kargl</author>
<title>Attribute Threat Analysis and Risk Assessment for ABAC and TBAC Systems.</title>
<pages>26-39</pages>
<year>2024</year>
<booktitle>SECRYPT</booktitle>
<ee>https://doi.org/10.5220/0012715300003767</ee>
<crossref>conf/secrypt/2024</crossref>
<url>db/conf/secrypt/secrypt2024.html#BradatschHK24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2402-08299" mdate="2024-02-19">
<author pid="170/1086">Leonard Bradatsch</author>
<author pid="208/8365">Oleksandr Miroshkin</author>
<author pid="277/5192">Natasa Trkulja</author>
<author pid="46/306">Frank Kargl</author>
<title>Zero Trust Score-based Network-level Access Control in Enterprise Networks.</title>
<year>2024</year>
<volume>abs/2402.08299</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2402.08299</ee>
<url>db/journals/corr/corr2402.html#abs-2402-08299</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2409-10192" mdate="2024-10-12">
<author pid="392/0539">Echo Mei&#223;ner</author>
<author pid="46/306">Frank Kargl</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="176/0554">Felix Engelmann</author>
<title>PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites.</title>
<year>2024</year>
<volume>abs/2409.10192</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2409.10192</ee>
<url>db/journals/corr/corr2409.html#abs-2409-10192</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/access/SommerKK23" mdate="2023-06-15">
<author orcid="0000-0002-4009-7164" pid="176/2333">Florian Sommer</author>
<author orcid="0000-0001-8599-5999" pid="167/3305">Reiner Kriesten</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>Survey of Model-Based Security Testing Approaches in the Automotive Domain.</title>
<pages>55474-55514</pages>
<year>2023</year>
<volume>11</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2023.3282176</ee>
<url>db/journals/access/access11.html#SommerKK23</url>
</article>
</r>
<r><article key="journals/access/BradatschMK23" mdate="2023-11-28">
<author orcid="0000-0001-7120-6557" pid="170/1086">Leonard Bradatsch</author>
<author orcid="0000-0003-0264-6676" pid="208/8365">Oleksandr Miroshkin</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture.</title>
<pages>125307-125327</pages>
<year>2023</year>
<volume>11</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2023.3330706</ee>
<url>db/journals/access/access11.html#BradatschMK23</url>
</article>
</r>
<r><article key="journals/iotm/DrobotZBKSS23" mdate="2023-06-17">
<author pid="178/9803">Adam Drobot</author>
<author pid="15/4777">Tao Zhang</author>
<author pid="349/4724">Mary Lynn Buonarosa</author>
<author pid="46/306">Frank Kargl</author>
<author pid="349/4543">Steve Schwinke</author>
<author pid="s/BiplabSikdar">Biplab Sikdar 0001</author>
<title>The Internet of Vehicles (IoV) - Security, Privacy, Trust, and Reputation Management for Connected Vehicles.</title>
<pages>6-16</pages>
<year>2023</year>
<month>June</month>
<volume>6</volume>
<journal>IEEE Internet Things Mag.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/MIOT.2023.10145018</ee>
<url>db/journals/iotm/iotm6.html#DrobotZBKSS23</url>
</article>
</r>
<r><article key="journals/tits/PollnyHK23" mdate="2023-07-21">
<author orcid="0000-0001-8041-0947" pid="282/9055">Oliver P&#246;llny</author>
<author pid="33/3910">Albert Held</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>Survey of Air, Sea, and Road Vehicles Research for Motion Control Security.</title>
<pages>6748-6763</pages>
<year>2023</year>
<volume>24</volume>
<journal>IEEE Trans. Intell. Transp. Syst.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/TITS.2023.3264453</ee>
<url>db/journals/tits/tits24.html#PollnyHK23</url>
</article>
</r>
<r><inproceedings key="conf/cscs2/BottnerHETK23" mdate="2025-01-19">
<author orcid="0000-0001-5921-5055" pid="294/6593">Laura Bottner</author>
<author orcid="0009-0004-3406-267X" pid="348/8380">Artur Hermann</author>
<author orcid="0000-0002-5856-7654" pid="362/3342">Jeremias Eppler</author>
<author orcid="0000-0001-8069-9584" pid="04/7056">Thomas Th&#252;m</author>
<author pid="46/306">Frank Kargl</author>
<title>Evaluation of Free and Open Source Tools for Automated Software Composition Analysis.</title>
<pages>3:1-3:11</pages>
<year>2023</year>
<booktitle>CSCS</booktitle>
<ee>https://doi.org/10.1145/3631204.3631862</ee>
<ee>https://www.wikidata.org/entity/Q130850080</ee>
<crossref>conf/cscs2/2023</crossref>
<url>db/conf/cscs2/cscs2023.html#BottnerHETK23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifiptm/PetrovskaGDKLHT23" mdate="2025-01-29">
<author pid="183/8461">Ana Petrovska</author>
<author pid="396/0847">Gabriele Gelardi</author>
<author pid="55/1808">H&#252;seyin Demirci</author>
<author pid="290/1098">Emre Kocyigit</author>
<author pid="78/5724">Gabriele Lenzini</author>
<author pid="348/8380">Artur Hermann</author>
<author pid="277/5192">Natasa Trkulja</author>
<author pid="46/306">Frank Kargl</author>
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="99/4618">Theo Dimitrakos</author>
<title>Trust Level Evaluation Engine for Dynamic Trust Assessment with Reference to Subjective Logic.</title>
<pages>37-55</pages>
<year>2023</year>
<booktitle>IFIPTM</booktitle>
<ee>https://doi.org/10.1007/978-3-031-76714-2_3</ee>
<crossref>conf/ifiptm/2023</crossref>
<url>db/conf/ifiptm/ifiptm2023.html#PetrovskaGDKLHT23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/BradatschMTK23" mdate="2024-06-04">
<author pid="170/1086">Leonard Bradatsch</author>
<author pid="208/8365">Oleksandr Miroshkin</author>
<author pid="277/5192">Natasa Trkulja</author>
<author pid="46/306">Frank Kargl</author>
<title>Zero Trust Score-based Network-level Access Control in Enterprise Networks.</title>
<pages>1422-1429</pages>
<year>2023</year>
<booktitle>TrustCom</booktitle>
<ee>https://doi.org/10.1109/TrustCom60117.2023.00194</ee>
<crossref>conf/trustcom/2023</crossref>
<url>db/conf/trustcom/trustcom2023.html#BradatschMTK23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/HermannWTJBK23" mdate="2023-06-09">
<author pid="348/8380">Artur Hermann</author>
<author pid="69/1015">Michael Wolf</author>
<author pid="277/5192">Natasa Trkulja</author>
<author pid="61/8276">In&#232;s Ben Jemaa</author>
<author pid="127/3314">Anis Bkakria</author>
<author pid="46/306">Frank Kargl</author>
<title>Privacy of Smart Traffic Lights Systems.</title>
<pages>17-24</pages>
<year>2023</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC57357.2023.10136320</ee>
<crossref>conf/vnc/2023</crossref>
<url>db/conf/vnc/vnc2023.html#HermannWTJBK23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/KarglTHSLKJ23" mdate="2023-08-25">
<author pid="46/306">Frank Kargl</author>
<author pid="277/5192">Natasa Trkulja</author>
<author pid="348/8380">Artur Hermann</author>
<author pid="176/2333">Florian Sommer</author>
<author pid="355/0336">Anderson Ramon Ferraz de Lucena</author>
<author pid="131/6225">Alexander Kiening</author>
<author pid="276/2203">Sergej Japs</author>
<title>Securing Cooperative Intersection Management through Subjective Trust Networks.</title>
<pages>1-7</pages>
<year>2023</year>
<booktitle>VTC2023-Spring</booktitle>
<ee>https://doi.org/10.1109/VTC2023-Spring57618.2023.10200789</ee>
<crossref>conf/vtc/2023s</crossref>
<url>db/conf/vtc/vtc2023s.html#KarglTHSLKJ23</url>
</inproceedings>
</r>
<r><proceedings key="conf/vnc/2023" mdate="2023-06-09">
<editor pid="19/6445">Sinem Coleri</editor>
<editor pid="97/194">Onur Altintas</editor>
<editor pid="46/306">Frank Kargl</editor>
<editor pid="36/9583">Takamasa Higuchi</editor>
<editor pid="54/10194">Michele Segata</editor>
<editor pid="133/5068">Florian Klingler</editor>
<title>IEEE Vehicular Networking Conference, VNC 2023, Istanbul, Turkey, April 26-28, 2023</title>
<booktitle>VNC</booktitle>
<publisher>IEEE</publisher>
<year>2023</year>
<isbn>979-8-3503-3549-1</isbn>
<ee>https://doi.org/10.1109/VNC57357.2023</ee>
<url>db/conf/vnc/vnc2023.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2301-03584" mdate="2023-01-19">
<author pid="161/5354">Stephan Kleber</author>
<author pid="183/6724">Milan Stute</author>
<author pid="95/1816">Matthias Hollick</author>
<author pid="46/306">Frank Kargl</author>
<title>Network Message Field Type Classification and Recognition for Unknown Binary Protocols.</title>
<year>2023</year>
<volume>abs/2301.03584</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2301.03584</ee>
<url>db/journals/corr/corr2301.html#abs-2301-03584</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2301-03585" mdate="2023-01-19">
<author pid="161/5354">Stephan Kleber</author>
<author pid="46/306">Frank Kargl</author>
<title>Refining Network Message Segmentation with Principal Component Analysis.</title>
<year>2023</year>
<volume>abs/2301.03585</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2301.03585</ee>
<url>db/journals/corr/corr2301.html#abs-2301-03585</url>
</article>
</r>
<r><article publtype="informal" key="journals/dagstuhl-reports/KarglKMWG23" mdate="2024-03-14">
<author pid="46/306">Frank Kargl</author>
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="164/1098">Jason Millar</author>
<author pid="66/788">Andr&#233; Weimerskirch</author>
<author pid="118/8960">Kevin Gomez</author>
<title>Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242).</title>
<pages>22-54</pages>
<year>2023</year>
<volume>13</volume>
<journal>Dagstuhl Reports</journal>
<number>6</number>
<ee type="oa">https://doi.org/10.4230/DagRep.13.6.22</ee>
<url>db/journals/dagstuhl-reports/dagstuhl-reports13.html#KarglKMWG23</url>
</article>
</r>
<r><article publtype="informal" key="journals/dagstuhl-reports/DietrichKKLH23" mdate="2024-04-10">
<author pid="13/1169">Sven Dietrich</author>
<author pid="46/306">Frank Kargl</author>
<author pid="k/HartmutKonig">Hartmut K&#246;nig</author>
<author pid="63/4310">Pavel Laskov</author>
<author pid="348/8380">Artur Hermann</author>
<title>Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431).</title>
<pages>90-129</pages>
<year>2023</year>
<volume>13</volume>
<journal>Dagstuhl Reports</journal>
<number>10</number>
<ee type="oa">https://doi.org/10.4230/DagRep.13.10.90</ee>
<url>db/journals/dagstuhl-reports/dagstuhl-reports13.html#DietrichKKLH23</url>
</article>
</r>
<r><article key="journals/eceasst/BradatschKM22" mdate="2022-11-15">
<author pid="170/1086">Leonard Bradatsch</author>
<author pid="46/306">Frank Kargl</author>
<author pid="208/8365">Oleksandr Miroshkin</author>
<title>Zero Trust Service Function Chaining.</title>
<year>2022</year>
<volume>80</volume>
<journal>Electron. Commun. Eur. Assoc. Softw. Sci. Technol.</journal>
<ee type="oa">https://doi.org/10.14279/tuj.eceasst.80.1138</ee>
<url>db/journals/eceasst/eceasst80.html#BradatschKM22</url>
</article>
</r>
<r><article key="journals/tissec/OserHLK22" mdate="2023-08-28">
<author orcid="0000-0002-2461-343X" pid="231/4158">Pascal Oser</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author orcid="0000-0001-8676-2353" pid="231/4172">Stefan L&#252;ders</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>Risk Prediction of IoT Devices Based on Vulnerability Analysis.</title>
<pages>14:1-14:36</pages>
<year>2022</year>
<volume>25</volume>
<journal>ACM Trans. Priv. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/3510360</ee>
<ee>https://www.wikidata.org/entity/Q114255211</ee>
<url>db/journals/tissec/tissec25.html#OserHLK22</url>
</article>
</r>
<r><inproceedings key="conf/cns/KleberK22" mdate="2022-12-05">
<author orcid="0000-0001-9836-4897" pid="161/5354">Stephan Kleber</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>Refining Network Message Segmentation with Principal Component Analysis.</title>
<pages>281-289</pages>
<year>2022</year>
<booktitle>CNS</booktitle>
<ee>https://doi.org/10.1109/CNS56114.2022.9947242</ee>
<crossref>conf/cns/2022</crossref>
<url>db/conf/cns/cns2022.html#KleberK22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cscs2/PollnyKH22" mdate="2022-12-05">
<author orcid="0000-0001-8041-0947" pid="282/9055">Oliver P&#246;llny</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<author orcid="0000-0002-5182-9463" pid="33/3910">Albert Held</author>
<title>Steering Your Car With Electromagnetic Fields.</title>
<pages>8:1-8:9</pages>
<year>2022</year>
<booktitle>CSCS</booktitle>
<ee>https://doi.org/10.1145/3568160.3570228</ee>
<crossref>conf/cscs2/2022</crossref>
<url>db/conf/cscs2/cscs2022.html#PollnyKH22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/KleberKSH22" mdate="2025-03-03">
<author orcid="0000-0001-9836-4897" pid="161/5354">Stephan Kleber</author>
<author pid="46/306">Frank Kargl</author>
<author pid="183/6724">Milan Stute</author>
<author orcid="0000-0002-9163-5989" pid="95/1816">Matthias Hollick</author>
<title>Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols.</title>
<pages>80-87</pages>
<year>2022</year>
<booktitle>DSN Workshops</booktitle>
<ee>https://doi.org/10.1109/DSN-W54100.2022.00023</ee>
<crossref>conf/dsn/2022w</crossref>
<url>db/conf/dsn/dsn2022w.html#KleberKSH22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/BradatschHSKM22" mdate="2022-11-09">
<author pid="170/1086">Leonard Bradatsch</author>
<author pid="239/5155">Marco H&#228;berle</author>
<author pid="325/8765">Benjamin Steinert</author>
<author pid="46/306">Frank Kargl</author>
<author pid="80/2984">Michael Menth</author>
<title>Secure Service Function Chaining in the Context of Zero Trust Security.</title>
<pages>123-131</pages>
<year>2022</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN53696.2022.9843821</ee>
<crossref>conf/lcn/2022</crossref>
<url>db/conf/lcn/lcn2022.html#BradatschHSKM22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/Al-MomaniBWSJK22" mdate="2025-06-30">
<author pid="174/7724">Ala'a Al-Momani</author>
<author orcid="0000-0001-9312-8000" pid="58/3065">Christoph B&#246;sch 0001</author>
<author orcid="0000-0002-0950-9490" pid="23/6789">Kim Wuyts</author>
<author orcid="0000-0002-8126-4491" pid="166/1069">Laurens Sion</author>
<author pid="13/86">Wouter Joosen</author>
<author pid="46/306">Frank Kargl</author>
<title>Mitigation lost in translation: leveraging threat information to improve privacy solution selection.</title>
<pages>1236-1247</pages>
<year>2022</year>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/3477314.3507107</ee>
<ee>https://www.wikidata.org/entity/Q130926992</ee>
<crossref>conf/sac/2022</crossref>
<url>db/conf/sac/sac2022.html#Al-MomaniBWSJK22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/stm/OserELK22" mdate="2023-05-17">
<author orcid="0000-0002-2461-343X" pid="231/4158">Pascal Oser</author>
<author orcid="0000-0001-9356-0231" pid="176/0554">Felix Engelmann</author>
<author orcid="0000-0001-8676-2353" pid="231/4172">Stefan L&#252;ders</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices.</title>
<pages>52-70</pages>
<year>2022</year>
<booktitle>STM</booktitle>
<ee>https://doi.org/10.1007/978-3-031-29504-1_3</ee>
<crossref>conf/stm/2022</crossref>
<url>db/conf/stm/stm2022.html#OserELK22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2209-03826" mdate="2022-09-27">
<author pid="231/4158">Pascal Oser</author>
<author pid="176/0554">Felix Engelmann</author>
<author pid="231/4172">Stefan L&#252;ders</author>
<author pid="46/306">Frank Kargl</author>
<title>Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices.</title>
<year>2022</year>
<volume>abs/2209.03826</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2209.03826</ee>
<url>db/journals/corr/corr2209.html#abs-2209-03826</url>
</article>
</r>
<r><article publtype="informal" key="journals/dagstuhl-reports/KarglKWW22" mdate="2022-09-26">
<author pid="46/306">Frank Kargl</author>
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="66/788">Andr&#233; Weimerskirch</author>
<author pid="14/2900">Ian Williams</author>
<title>Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042).</title>
<pages>83-100</pages>
<year>2022</year>
<volume>12</volume>
<journal>Dagstuhl Reports</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.4230/DagRep.12.1.83</ee>
<url>db/journals/dagstuhl-reports/dagstuhl-reports12.html#KarglKWW22</url>
</article>
</r>
<r><article key="journals/ijhci/SindermannSKHM21" mdate="2022-08-16">
<author orcid="0000-0003-1064-8866" pid="273/3806">Cornelia Sindermann</author>
<author orcid="0000-0001-6734-6928" pid="288/8012">Helena S. Schmitt</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<author orcid="0000-0002-9652-5586" pid="137/4024">Cornelia Herbert</author>
<author orcid="0000-0001-8112-0837" pid="25/8259">Christian Montag</author>
<title>Online Privacy Literacy and Online Privacy Behavior - The Role of Crystallized Intelligence and Personality.</title>
<pages>1455-1466</pages>
<year>2021</year>
<volume>37</volume>
<journal>Int. J. Hum. Comput. Interact.</journal>
<number>15</number>
<ee>https://doi.org/10.1080/10447318.2021.1894799</ee>
<ee>https://www.wikidata.org/entity/Q113182945</ee>
<url>db/journals/ijhci/ijhci37.html#SindermannSKHM21</url>
</article>
</r>
<r><article key="journals/popets/EngelmannMPKB21" mdate="2025-06-30">
<author pid="176/0554">Felix Engelmann</author>
<author pid="169/4738">Lukas M&#252;ller</author>
<author pid="43/8243">Andreas Peter 0001</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0001-9312-8000" pid="58/3065">Christoph B&#246;sch 0001</author>
<title>SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges.</title>
<pages>270-290</pages>
<year>2021</year>
<volume>2021</volume>
<journal>Proc. Priv. Enhancing Technol.</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.2478/popets-2021-0070</ee>
<url>db/journals/popets/popets2021.html#EngelmannMPKB21</url>
</article>
</r>
<r><article key="journals/tdsc/KoppMHK21" mdate="2021-09-16">
<author orcid="0000-0001-6013-3540" pid="159/0709">Henning Kopp</author>
<author orcid="0000-0002-5917-2419" pid="175/1346">David M&#246;dinger</author>
<author orcid="0000-0002-7480-9617" pid="h/FranzJHauck">Franz J. Hauck</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>Cryptographic Design of PriCloud, a Privacy-Preserving Decentralized Storage with Remuneration.</title>
<pages>1908-1919</pages>
<year>2021</year>
<volume>18</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TDSC.2019.2942300</ee>
<url>db/journals/tdsc/tdsc18.html#KoppMHK21</url>
</article>
</r>
<r><inproceedings key="conf/ccs/EngelmannSGKB21" mdate="2025-06-30">
<author pid="176/0554">Felix Engelmann</author>
<author pid="304/2560">Jan Philip Speichert</author>
<author pid="132/5749">Ralf God</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0001-9312-8000" pid="58/3065">Christoph B&#246;sch 0001</author>
<title>Confidential Token-Based License Management.</title>
<pages>39-48</pages>
<year>2021</year>
<booktitle>AMSec@CCS</booktitle>
<ee>https://doi.org/10.1145/3462223.3485619</ee>
<crossref>conf/ccs/2021amsec</crossref>
<url>db/conf/ccs/amsec2021.html#EngelmannSGKB21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csci/SommerKK21" mdate="2024-05-07">
<author pid="176/2333">Florian Sommer</author>
<author orcid="0000-0001-8599-5999" pid="167/3305">Reiner Kriesten</author>
<author pid="46/306">Frank Kargl</author>
<title>Model-Based Security Testing of Vehicle Networks.</title>
<pages>685-691</pages>
<year>2021</year>
<booktitle>CSCI</booktitle>
<ee>https://doi.org/10.1109/CSCI54926.2021.00179</ee>
<crossref>conf/csci/2021</crossref>
<url>db/conf/csci/csci2021.html#SommerKK21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/KrollKKHC21" mdate="2026-02-25">
<author orcid="0000-0002-0700-1378" pid="302/8998">Tobias Kr&#246;ll</author>
<author orcid="0000-0001-9836-4897" pid="161/5354">Stephan Kleber</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0002-9163-5989" pid="95/1816">Matthias Hollick</author>
<author orcid="0009-0006-4341-2808" pid="155/8567">Jiska Classen</author>
<title>ARIstoteles - Dissecting Apple's Baseband Interface.</title>
<pages>133-151</pages>
<year>2021</year>
<booktitle>ESORICS (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-88418-5_7</ee>
<crossref>conf/esorics/2021-1</crossref>
<url>db/conf/esorics/esorics2021-1.html#KrollKKHC21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/re/JapsAKHDK21" mdate="2024-08-04">
<author pid="276/2203">Sergej Japs</author>
<author pid="125/5898">Harald Anacker</author>
<author orcid="0000-0003-2268-6392" pid="224/5794">Lydia Kaiser</author>
<author pid="62/8291">J&#246;rg Holtmann</author>
<author orcid="0009-0009-6877-740X" pid="96/7180">Roman Dumitrescu</author>
<author pid="46/306">Frank Kargl</author>
<title>D-REQs: Determination of security &#38; safety requirements in workshops based on the use of model-based systems engineering.</title>
<pages>412-414</pages>
<year>2021</year>
<booktitle>RE Workshops</booktitle>
<ee>https://doi.org/10.1109/REW53955.2021.00073</ee>
<crossref>conf/re/2021w</crossref>
<url>db/conf/re/re2021w.html#JapsAKHDK21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/Al-MomaniWSKJEB21" mdate="2025-06-30">
<author pid="174/7724">Ala'a Al-Momani</author>
<author orcid="0000-0002-0950-9490" pid="23/6789">Kim Wuyts</author>
<author orcid="0000-0002-8126-4491" pid="166/1069">Laurens Sion</author>
<author pid="46/306">Frank Kargl</author>
<author pid="13/86">Wouter Joosen</author>
<author pid="117/6830">Benjamin Erb</author>
<author orcid="0000-0001-9312-8000" pid="58/3065">Christoph B&#246;sch 0001</author>
<title>Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns.</title>
<pages>1217-1225</pages>
<year>2021</year>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/3412841.3441996</ee>
<crossref>conf/sac/2021</crossref>
<url>db/conf/sac/sac2021.html#Al-MomaniWSKJEB21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/MeissnerEKE21" mdate="2025-12-01">
<author orcid="0000-0002-2937-6306" pid="392/0539">Echo Mei&#223;ner</author>
<author pid="176/0554">Felix Engelmann</author>
<author pid="46/306">Frank Kargl</author>
<author pid="117/6830">Benjamin Erb</author>
<title>PeQES: a platform for privacy-enhanced quantitative empirical studies.</title>
<pages>1226-1234</pages>
<year>2021</year>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/3412841.3441997</ee>
<ee>https://www.wikidata.org/entity/Q131132585</ee>
<crossref>conf/sac/2021</crossref>
<url>db/conf/sac/sac2021.html#MeissnerEKE21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/MeissnerKE21" mdate="2025-12-01">
<author orcid="0000-0002-2937-6306" pid="392/0539">Echo Mei&#223;ner</author>
<author pid="46/306">Frank Kargl</author>
<author pid="117/6830">Benjamin Erb</author>
<title>WAIT: protecting the integrity of web applications with binary-equivalent transparency.</title>
<pages>1950-1953</pages>
<year>2021</year>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/3412841.3442143</ee>
<crossref>conf/sac/2021</crossref>
<url>db/conf/sac/sac2021.html#MeissnerKE21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/PollnyHK21" mdate="2021-06-18">
<author pid="282/9055">Oliver P&#246;llny</author>
<author pid="33/3910">Albert Held</author>
<author pid="46/306">Frank Kargl</author>
<title>The Effect Of Sound On The Gyroscopes In Your Car.</title>
<pages>1-5</pages>
<year>2021</year>
<booktitle>VTC Spring</booktitle>
<ee>https://doi.org/10.1109/VTC2021-Spring51267.2021.9448756</ee>
<crossref>conf/vtc/2021s</crossref>
<url>db/conf/vtc/vtc2021s.html#PollnyHK21</url>
</inproceedings>
</r>
<r><proceedings key="conf/vnc/2021" mdate="2021-12-27">
<editor pid="46/306">Frank Kargl</editor>
<editor pid="97/194">Onur Altintas</editor>
<editor pid="07/5352-1">Christoph Sommer 0001</editor>
<editor pid="36/9583">Takamasa Higuchi</editor>
<editor pid="133/5068">Florian Klingler</editor>
<title>13th IEEE Vehicular Networking Conference, VNC 2021, Ulm, Germany, November 10-12, 2021</title>
<booktitle>VNC</booktitle>
<publisher>IEEE</publisher>
<year>2021</year>
<isbn>978-1-6654-4450-7</isbn>
<ee>https://doi.org/10.1109/VNC52810.2021</ee>
<url>db/conf/vnc/vnc2021.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2103-05544" mdate="2025-12-01">
<author pid="392/0539">Echo Mei&#223;ner</author>
<author pid="176/0554">Felix Engelmann</author>
<author pid="46/306">Frank Kargl</author>
<author pid="117/6830">Benjamin Erb</author>
<title>PeQES: A Platform for Privacy-enhanced Quantitative Empirical Studies.</title>
<year>2021</year>
<volume>abs/2103.05544</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2103.05544</ee>
<url>db/journals/corr/corr2103.html#abs-2103-05544</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2104-06136" mdate="2025-12-01">
<author pid="392/0539">Echo Mei&#223;ner</author>
<author pid="46/306">Frank Kargl</author>
<author pid="117/6830">Benjamin Erb</author>
<title>WAIT: Protecting the Integrity of Web Applications with Binary-Equivalent Transparency.</title>
<year>2021</year>
<volume>abs/2104.06136</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2104.06136</ee>
<url>db/journals/corr/corr2104.html#abs-2104-06136</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2107-08671" mdate="2021-07-22">
<author pid="170/1086">Leonard Bradatsch</author>
<author pid="46/306">Frank Kargl</author>
<author pid="208/8365">Oleksandr Miroshkin</author>
<title>Zero Trust Service Function Chaining.</title>
<year>2021</year>
<volume>abs/2107.08671</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2107.08671</ee>
<url>db/journals/corr/corr2107.html#abs-2107-08671</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2110-05118" mdate="2025-06-30">
<author pid="176/0554">Felix Engelmann</author>
<author pid="304/2560">Jan Philip Speichert</author>
<author pid="132/5749">Ralf God</author>
<author pid="46/306">Frank Kargl</author>
<author pid="58/3065">Christoph B&#246;sch 0001</author>
<title>Confidential Token-Based License Management.</title>
<year>2021</year>
<volume>abs/2110.05118</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2110.05118</ee>
<url>db/journals/corr/corr2110.html#abs-2110-05118</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/EngelmannMPKB21" mdate="2025-06-30">
<author pid="176/0554">Felix Engelmann</author>
<author pid="169/4738">Lukas M&#252;ller</author>
<author pid="43/8243">Andreas Peter 0001</author>
<author pid="46/306">Frank Kargl</author>
<author pid="58/3065">Christoph B&#246;sch 0001</author>
<title>SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges.</title>
<pages>631</pages>
<year>2021</year>
<volume>2021</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2021/631</ee>
<url>db/journals/iacr/iacr2021.html#EngelmannMPKB21</url>
</article>
</r>
<r><article key="journals/imwut/OserFWKSGL0K20" mdate="2025-01-19">
<author pid="231/4158">Pascal Oser</author>
<author pid="237/9961">Sebastian S. Feger</author>
<author pid="36/11536">Pawel W. Wozniak</author>
<author orcid="0000-0002-0698-7470" pid="161/5379">Jakob Karolus</author>
<author orcid="0000-0001-6882-6480" pid="149/7626">Dayana Spagnuelo</author>
<author orcid="0000-0002-1499-6123" pid="142/5277-2">Akash Gupta 0002</author>
<author pid="231/4172">Stefan L&#252;ders</author>
<author pid="s/AlbrechtSchmidt1">Albrecht Schmidt 0001</author>
<author pid="46/306">Frank Kargl</author>
<title>SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization.</title>
<pages>114:1-114:22</pages>
<year>2020</year>
<volume>4</volume>
<journal>Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3414173</ee>
<ee>https://www.wikidata.org/entity/Q131128719</ee>
<url>db/journals/imwut/imwut4.html#OserFWKSGL0K20</url>
</article>
</r>
<r><inproceedings key="conf/icc/KamelWHKUK20" mdate="2024-02-05">
<author pid="223/8350">Joseph Kamel</author>
<author pid="69/1015">Michael Wolf</author>
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="98/7910">Arnaud Kaiser</author>
<author orcid="0000-0002-7887-6139" pid="66/4100">Pascal Urien</author>
<author pid="46/306">Frank Kargl</author>
<title>VeReMi Extension: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs.</title>
<pages>1-6</pages>
<year>2020</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC40277.2020.9149132</ee>
<crossref>conf/icc/2020</crossref>
<url>db/conf/icc/icc2020.html#KamelWHKUK20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/KleberHK20" mdate="2023-03-21">
<author orcid="0000-0001-9836-4897" pid="161/5354">Stephan Kleber</author>
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="46/306">Frank Kargl</author>
<title>Message Type Identification of Binary Network Protocols using Continuous Segment Similarity.</title>
<pages>2243-2252</pages>
<year>2020</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFOCOM41043.2020.9155275</ee>
<crossref>conf/infocom/2020</crossref>
<url>db/conf/infocom/infocom2020.html#KleberHK20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ivs/PollnyHK20" mdate="2021-01-15">
<author pid="282/9055">Oliver P&#246;llny</author>
<author pid="33/3910">Albert Held</author>
<author pid="46/306">Frank Kargl</author>
<title>On The Manipulation of Wheel Speed Sensors and Their Impact in Autonomous Vehicles.</title>
<pages>1530-1537</pages>
<year>2020</year>
<booktitle>IV</booktitle>
<ee>https://doi.org/10.1109/IV47402.2020.9304808</ee>
<crossref>conf/ivs/2020</crossref>
<url>db/conf/ivs/ivs2020.html#PollnyHK20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/LukasederHK20" mdate="2021-01-13">
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="257/8253">Maya Halter</author>
<author pid="46/306">Frank Kargl</author>
<title>Context-based Access Control and Trust Scores in Zero Trust Campus Networks.</title>
<pages>53-66</pages>
<year>2020</year>
<booktitle>Sicherheit</booktitle>
<ee type="oa">https://doi.org/10.18420/sicherheit2020_04</ee>
<crossref>conf/sicherheit/2020</crossref>
<url>db/conf/sicherheit/sicherheit2020.html#LukasederHK20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/WolfWMGGWBDHK20" mdate="2024-10-06">
<author pid="69/1015">Michael Wolf</author>
<author pid="222/8113">Alexander Willecke</author>
<author pid="283/6790">Johannes-Christian M&#252;ller</author>
<author pid="216/6760">Keno Garlichs</author>
<author orcid="0000-0001-6521-3013" pid="239/6024">Thomas Griebel</author>
<author pid="w/LarsCWolf">Lars C. Wolf</author>
<author pid="48/10495">Michael Buchholz</author>
<author pid="65/6193">Klaus Dietmayer</author>
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="46/306">Frank Kargl</author>
<title>Securing CACC: Strategies for Mitigating Data Injection Attacks.</title>
<pages>1-7</pages>
<year>2020</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC51378.2020.9318396</ee>
<crossref>conf/vnc/2020</crossref>
<url>db/conf/vnc/vnc2020.html#WolfWMGGWBDHK20</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2002-03391" mdate="2021-09-24">
<author pid="161/5354">Stephan Kleber</author>
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="46/306">Frank Kargl</author>
<title>Message Type Identification of Binary Network Protocols using Continuous Segment Similarity.</title>
<year>2020</year>
<volume>abs/2002.03391</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2002.03391</ee>
<url>db/journals/corr/corr2002.html#abs-2002-03391</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2007-14724" mdate="2025-01-03">
<author pid="231/4158">Pascal Oser</author>
<author pid="237/9961">Sebastian S. Feger</author>
<author pid="36/11536">Pawel W. Wozniak</author>
<author pid="161/5379">Jakob Karolus</author>
<author pid="149/7626">Dayana Spagnuelo</author>
<author orcid="0000-0002-1499-6123" pid="142/5277-2">Akash Gupta 0002</author>
<author pid="231/4172">Stefan L&#252;ders</author>
<author pid="s/AlbrechtSchmidt1">Albrecht Schmidt 0001</author>
<author pid="46/306">Frank Kargl</author>
<title>SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization.</title>
<year>2020</year>
<volume>abs/2007.14724</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2007.14724</ee>
<url>db/journals/corr/corr2007.html#abs-2007-14724</url>
</article>
</r>
<r><article key="journals/comsur/KleberMK19" mdate="2025-01-19">
<author orcid="0000-0001-9836-4897" pid="161/5354">Stephan Kleber</author>
<author orcid="0000-0002-2528-7760" pid="218/5772">Lisa Maile</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis.</title>
<pages>526-561</pages>
<year>2019</year>
<volume>21</volume>
<journal>IEEE Commun. Surv. Tutorials</journal>
<number>1</number>
<ee>https://doi.org/10.1109/COMST.2018.2867544</ee>
<ee>https://www.wikidata.org/entity/Q129316357</ee>
<url>db/journals/comsur/comsur21.html#KleberMK19</url>
</article>
</r>
<r><article key="journals/comsur/HeijdenDLK19" mdate="2025-01-19">
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens Wouter van der Heijden</author>
<author orcid="0000-0002-4192-0327" pid="26/8089">Stefan Dietzel</author>
<author orcid="0000-0002-2068-6738" pid="54/4411">Tim Leinm&#252;ller</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems.</title>
<pages>779-811</pages>
<year>2019</year>
<volume>21</volume>
<journal>IEEE Commun. Surv. Tutorials</journal>
<number>1</number>
<ee>https://doi.org/10.1109/COMST.2018.2873088</ee>
<ee>https://www.wikidata.org/entity/Q128452965</ee>
<url>db/journals/comsur/comsur21.html#HeijdenDLK19</url>
</article>
</r>
<r><inproceedings key="conf/ccs/HeinlGWPK19" mdate="2025-01-19">
<author orcid="0000-0002-1094-4828" pid="252/4801">Michael P. Heinl</author>
<author pid="223/3060">Alexander Giehl</author>
<author pid="121/4945">Norbert Wiedermann</author>
<author orcid="0000-0002-1658-1140" pid="208/8361">Sven Plaga</author>
<author pid="46/306">Frank Kargl</author>
<title>MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness.</title>
<pages>1-15</pages>
<year>2019</year>
<booktitle>CCSW</booktitle>
<ee>https://doi.org/10.1145/3338466.3358917</ee>
<ee>https://www.wikidata.org/entity/Q130961320</ee>
<crossref>conf/ccs/2019ccsw</crossref>
<url>db/conf/ccs/ccsw2019.html#HeinlGWPK19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/KleberK19" mdate="2023-03-21">
<author orcid="0000-0001-9836-4897" pid="161/5354">Stephan Kleber</author>
<author pid="46/306">Frank Kargl</author>
<title>Poster: Network Message Field Type Recognition.</title>
<pages>2581-2583</pages>
<year>2019</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3319535.3363261</ee>
<crossref>conf/ccs/2019</crossref>
<url>db/conf/ccs/ccs2019.html#KleberK19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icves/RofailAMK19" mdate="2020-04-05">
<author pid="262/2113">Mark Rofail</author>
<author pid="262/2052">Aysha Alsafty</author>
<author pid="165/8342">Matthias Matousek</author>
<author pid="46/306">Frank Kargl</author>
<title>Multi-Modal Deep Learning for Vehicle Sensor Data Abstraction and Attack Detection.</title>
<pages>1-7</pages>
<year>2019</year>
<booktitle>ICVES</booktitle>
<ee>https://doi.org/10.1109/ICVES.2019.8906405</ee>
<crossref>conf/icves/2019</crossref>
<url>db/conf/icves/icves2019.html#RofailAMK19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ivs/MatousekEAKB19" mdate="2025-06-30">
<author pid="165/8342">Matthias Matousek</author>
<author pid="89/9541">Mohamed El-Zohairy</author>
<author pid="174/7724">Ala'a Al-Momani</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0001-9312-8000" pid="58/3065">Christoph B&#246;sch 0001</author>
<title>Detecting Anomalous Driving Behavior using Neural Networks.</title>
<pages>2229-2235</pages>
<year>2019</year>
<booktitle>IV</booktitle>
<ee>https://doi.org/10.1109/IVS.2019.8814246</ee>
<crossref>conf/ivs/2019</crossref>
<url>db/conf/ivs/ivs2019.html#MatousekEAKB19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/Al-MomaniKSKB19" mdate="2025-06-30">
<author pid="174/7724">Ala'a Al-Momani</author>
<author pid="46/306">Frank Kargl</author>
<author pid="57/9852">Robert Karl Schmidt</author>
<author pid="92/1639">Antonio Kung</author>
<author orcid="0000-0001-9312-8000" pid="58/3065">Christoph B&#246;sch 0001</author>
<title>A Privacy-Aware V-Model for Software Development.</title>
<pages>100-104</pages>
<year>2019</year>
<booktitle>IEEE Symposium on Security and Privacy Workshops</booktitle>
<ee>https://doi.org/10.1109/SPW.2019.00028</ee>
<crossref>conf/sp/2019w</crossref>
<url>db/conf/sp/spw2019.html#Al-MomaniKSKB19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/Al-MomaniKB19" mdate="2025-06-30">
<author pid="174/7724">Ala'a Al-Momani</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0001-9312-8000" pid="58/3065">Christoph B&#246;sch 0001</author>
<title>Ride and Hide: A Study on the Privacy of Ride Hailing Services.</title>
<pages>1-8</pages>
<year>2019</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC48660.2019.9062820</ee>
<crossref>conf/vnc/2019</crossref>
<url>db/conf/vnc/vnc2019.html#Al-MomaniKB19</url>
</inproceedings>
</r>
<r><article key="journals/tits/ForsterLGPK18" mdate="2024-05-07">
<author orcid="0000-0003-0754-2569" pid="164/7340">David F&#246;rster</author>
<author orcid="0009-0000-5654-4275" pid="02/2549">Hans L&#246;hr</author>
<author pid="227/6503">Anne Gratz</author>
<author pid="33/7861">Jonathan Petit</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios.</title>
<pages>3400-3405</pages>
<year>2018</year>
<volume>19</volume>
<journal>IEEE Trans. Intell. Transp. Syst.</journal>
<number>10</number>
<ee>https://doi.org/10.1109/TITS.2017.2775519</ee>
<url>db/journals/tits/tits19.html#ForsterLGPK18</url>
</article>
</r>
<r><inproceedings key="conf/debs/MeissnerEKT18" mdate="2025-12-01">
<author orcid="0000-0002-2937-6306" pid="392/0539">Echo Mei&#223;ner</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<author pid="52/733">Matthias Tichy</author>
<title>Retro-&#955;: An Event-sourced Platform for Serverless Applications with Retroactive Computing Support.</title>
<pages>76-87</pages>
<year>2018</year>
<booktitle>DEBS</booktitle>
<ee>https://doi.org/10.1145/3210284.3210285</ee>
<crossref>conf/debs/2018</crossref>
<url>db/conf/debs/debs2018.html#MeissnerEKT18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/debs/ErbMOK18" mdate="2025-12-01">
<author pid="117/6830">Benjamin Erb</author>
<author orcid="0000-0002-2937-6306" pid="392/0539">Echo Mei&#223;ner</author>
<author pid="221/4125">Ferdinand Ogger</author>
<author pid="46/306">Frank Kargl</author>
<title>Log Pruning in Distributed Event-sourced Systems.</title>
<pages>230-233</pages>
<year>2018</year>
<booktitle>DEBS</booktitle>
<ee>https://doi.org/10.1145/3210284.3219767</ee>
<ee>https://www.wikidata.org/entity/Q130851277</ee>
<crossref>conf/debs/2018</crossref>
<url>db/conf/debs/debs2018.html#ErbMOK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/debs/MeissnerEK18" mdate="2025-12-01">
<author orcid="0000-0002-2937-6306" pid="392/0539">Echo Mei&#223;ner</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>Performance Engineering in Distributed Event-sourced Systems.</title>
<pages>242-245</pages>
<year>2018</year>
<booktitle>DEBS</booktitle>
<ee>https://doi.org/10.1145/3210284.3219770</ee>
<ee>https://www.wikidata.org/entity/Q130845449</ee>
<crossref>conf/debs/2018</crossref>
<url>db/conf/debs/debs2018.html#MeissnerEK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dfn/LukasederFK18" mdate="2023-07-04">
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="220/5342">Jessika Fiedler</author>
<author pid="46/306">Frank Kargl</author>
<title>Performance Evaluation in High-Speed Networks by the Example of Intrusion Detection Systems.</title>
<pages>33-42</pages>
<year>2018</year>
<booktitle>DFN-Forum Kommunikationstechnologien</booktitle>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/16576</ee>
<crossref>conf/dfn/2018</crossref>
<url>db/conf/dfn/dfn2018.html#LukasederFK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/EngelmannKB18" mdate="2025-06-30">
<author pid="176/0554">Felix Engelmann</author>
<author pid="46/306">Frank Kargl</author>
<author pid="58/3065">Christoph B&#246;sch 0001</author>
<title>Coloured Ring Confidential Transactions.</title>
<pages>188-196</pages>
<year>2018</year>
<booktitle>DPM/CBT@ESORICS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-00305-0_14</ee>
<crossref>conf/esorics/2018dpm</crossref>
<url>db/conf/esorics/dpm2018.html#EngelmannKB18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fusion/HeijdenKK18" mdate="2021-09-24">
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="159/0709">Henning Kopp</author>
<author pid="46/306">Frank Kargl</author>
<title>Multi-Source Fusion Operations in Subjective Logic.</title>
<pages>1990-1997</pages>
<year>2018</year>
<booktitle>FUSION</booktitle>
<ee>https://doi.org/10.23919/ICIF.2018.8455615</ee>
<crossref>conf/fusion/2018</crossref>
<url>db/conf/fusion/fusion2018.html#HeijdenKK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/grades/ErbMKSCMP18" mdate="2025-12-01">
<author pid="117/6830">Benjamin Erb</author>
<author orcid="0000-0002-2937-6306" pid="392/0539">Echo Mei&#223;ner</author>
<author pid="46/306">Frank Kargl</author>
<author pid="201/4815">Benjamin A. Steer</author>
<author orcid="0000-0002-5745-1609" pid="41/5008">F&#233;lix Cuadrado</author>
<author pid="146/0411">Domagoj Margan</author>
<author pid="45/4887">Peter R. Pietzuch</author>
<title>Graphtides: a framework for evaluating stream-based graph processing platforms.</title>
<pages>3:1-3:10</pages>
<year>2018</year>
<booktitle>GRADES/NDA@SIGMOD/PODS</booktitle>
<ee>https://doi.org/10.1145/3210259.3210262</ee>
<crossref>conf/grades/2018</crossref>
<url>db/conf/grades/grades2018.html#ErbMKSCMP18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcs/ModingerKKH18" mdate="2023-03-24">
<author orcid="0000-0002-5917-2419" pid="175/1346">David M&#246;dinger</author>
<author pid="159/0709">Henning Kopp</author>
<author pid="46/306">Frank Kargl</author>
<author pid="h/FranzJHauck">Franz J. Hauck</author>
<title>A Flexible Network Approach to Privacy of Blockchain Transactions.</title>
<pages>1486-1491</pages>
<year>2018</year>
<booktitle>ICDCS</booktitle>
<ee>https://doi.org/10.1109/ICDCS.2018.00153</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDCS.2018.00153</ee>
<crossref>conf/icdcs/2018</crossref>
<url>db/conf/icdcs/icdcs2018.html#ModingerKKH18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/KoppKBP18" mdate="2025-06-30">
<author pid="159/0709">Henning Kopp</author>
<author pid="46/306">Frank Kargl</author>
<author pid="58/3065">Christoph B&#246;sch 0001</author>
<author pid="43/8243">Andreas Peter 0001</author>
<title>uMine: A Blockchain Based on Human Miners.</title>
<pages>20-38</pages>
<year>2018</year>
<booktitle>ICICS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-01950-1_2</ee>
<crossref>conf/icics/2018</crossref>
<url>db/conf/icics/icics2018.html#KoppKBP18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/KoppKB18" mdate="2025-06-30">
<author pid="159/0709">Henning Kopp</author>
<author pid="46/306">Frank Kargl</author>
<author pid="58/3065">Christoph B&#246;sch 0001</author>
<title>Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons.</title>
<pages>459-477</pages>
<year>2018</year>
<booktitle>ICICS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-01950-1_27</ee>
<crossref>conf/icics/2018</crossref>
<url>db/conf/icics/icics2018.html#KoppKB18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/KleberUHSMKB18" mdate="2025-06-30">
<author orcid="0000-0001-9836-4897" pid="161/5354">Stephan Kleber</author>
<author pid="165/8330">Florian Unterstein</author>
<author orcid="0000-0003-1238-1114" pid="118/1329">Matthias Hiller</author>
<author pid="60/4647">Frank Slomka</author>
<author pid="165/8342">Matthias Matousek</author>
<author pid="46/306">Frank Kargl</author>
<author pid="58/3065">Christoph B&#246;sch 0001</author>
<title>Secure Code Execution: A Generic PUF-Driven System Architecture.</title>
<pages>25-46</pages>
<year>2018</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-99136-8_2</ee>
<crossref>conf/isw/2018</crossref>
<url>db/conf/isw/isc2018.html#KleberUHSMKB18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ithings/MahmoudKAK18" mdate="2022-01-03">
<author orcid="0000-0003-3026-0092" pid="242/4490">Omnia Mahmoud</author>
<author pid="159/0709">Henning Kopp</author>
<author pid="242/4380">Amr T. Abdelhamid</author>
<author pid="46/306">Frank Kargl</author>
<title>Applications of Smart-Contracts: Anonymous Decentralized Insurances with IoT Sensors.</title>
<pages>1507-1512</pages>
<year>2018</year>
<booktitle>iThings/GreenCom/CPSCom/SmartData</booktitle>
<ee>https://doi.org/10.1109/Cybermatics_2018.2018.00254</ee>
<crossref>conf/ithings/2018</crossref>
<url>db/conf/ithings/ithings2018.html#MahmoudKAK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/LukasederSKEK18" mdate="2023-03-21">
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="225/4693">Kevin St&#246;lzle</author>
<author orcid="0000-0001-9836-4897" pid="161/5354">Stephan Kleber</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>An SDN-based Approach For Defending Against Reflective DDoS Attacks.</title>
<pages>299-302</pages>
<year>2018</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN.2018.8638036</ee>
<crossref>conf/lcn/2018</crossref>
<url>db/conf/lcn/lcn2018.html#LukasederSKEK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/MuenchSKFB18" mdate="2023-06-15">
<author pid="185/2352">Marius Muench</author>
<author pid="224/2488">Jan Stijohann</author>
<author pid="46/306">Frank Kargl</author>
<author pid="88/3343">Aur&#233;lien Francillon</author>
<author pid="56/490">Davide Balzarotti</author>
<title>What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.</title>
<year>2018</year>
<booktitle>NDSS</booktitle>
<ee type="oa">https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_01A-4_Muench_paper.pdf</ee>
<crossref>conf/ndss/2018</crossref>
<url>db/conf/ndss/ndss2018.html#MuenchSKFB18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/securecomm/LukasederMEK18" mdate="2021-10-14">
<author pid="185/1695">Thomas Lukaseder</author>
<author orcid="0000-0002-2528-7760" pid="218/5772">Lisa Maile</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks.</title>
<pages>102-121</pages>
<year>2018</year>
<booktitle>SecureComm (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-01704-0_6</ee>
<crossref>conf/securecomm/2018-2</crossref>
<url>db/conf/securecomm/securecomm2018-2.html#LukasederMEK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/securecomm/HeijdenLK18" mdate="2021-09-24">
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="46/306">Frank Kargl</author>
<title>VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs.</title>
<pages>318-337</pages>
<year>2018</year>
<booktitle>SecureComm (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-01701-9_18</ee>
<crossref>conf/securecomm/2018-1</crossref>
<url>db/conf/securecomm/securecomm2018-1.html#HeijdenLK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spaccs/OserKL18" mdate="2018-12-26">
<author orcid="0000-0002-2461-343X" pid="231/4158">Pascal Oser</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<author orcid="0000-0001-8676-2353" pid="231/4172">Stefan L&#252;ders</author>
<title>Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics.</title>
<pages>417-427</pages>
<year>2018</year>
<booktitle>SpaCCS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-05345-1_36</ee>
<crossref>conf/spaccs/2018</crossref>
<url>db/conf/spaccs/spaccs2018.html#OserKL18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/Al-MomaniKSB18" mdate="2025-06-30">
<author pid="174/7724">Ala'a Al-Momani</author>
<author pid="46/306">Frank Kargl</author>
<author pid="57/9852">Robert Karl Schmidt</author>
<author orcid="0000-0001-9312-8000" pid="58/3065">Christoph B&#246;sch 0001</author>
<title>iRide: A Privacy-Preserving Architecture for Self-Driving Cabs Service.</title>
<pages>1-8</pages>
<year>2018</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2018.8628378</ee>
<crossref>conf/vnc/2018</crossref>
<url>db/conf/vnc/vnc2018.html#Al-MomaniKSB18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/MatousekYAHK18" mdate="2021-09-24">
<author pid="165/8342">Matthias Matousek</author>
<author pid="223/8292">Mahmoud Yassin</author>
<author pid="174/7724">Ala'a Al-Momani</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="46/306">Frank Kargl</author>
<title>Robust Detection of Anomalous Driving Behavior.</title>
<pages>1-5</pages>
<year>2018</year>
<booktitle>VTC Spring</booktitle>
<ee>https://doi.org/10.1109/VTCSpring.2018.8417777</ee>
<crossref>conf/vtc/2018s</crossref>
<url>db/conf/vtc/vtc2018s.html#MatousekYAHK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/woot/KleberKK18" mdate="2021-02-01">
<author pid="161/5354">Stephan Kleber</author>
<author pid="159/0709">Henning Kopp</author>
<author pid="46/306">Frank Kargl</author>
<title>NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages.</title>
<year>2018</year>
<booktitle>WOOT @ USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/woot18/presentation/kleber</ee>
<crossref>conf/woot/2018</crossref>
<url>db/conf/woot/woot2018.html#KleberKK18</url>
</inproceedings>
</r>
<r><incollection publtype="encyclopedia" key="reference/sp/PetitDK18" mdate="2018-11-06">
<author pid="33/7861">Jonathan Petit</author>
<author pid="26/8089">Stefan Dietzel</author>
<author pid="46/306">Frank Kargl</author>
<title>Privacy of Connected Vehicles.</title>
<pages>229-251</pages>
<year>2018</year>
<crossref>reference/sp/2018mdp</crossref>
<booktitle>Handbook of Mobile Data Privacy</booktitle>
<ee>https://doi.org/10.1007/978-3-319-98161-1_9</ee>
<url>db/reference/sp/mdp2018.html#PetitDK18</url>
</incollection>
</r>
<r><data key="data/10/HeijdenLK18" mdate="2024-09-05">
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens Wouter van der Heijden</author>
<author pid="185/1695">Thomas Lukaseder</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>Evaluation of misbehavior detection mechanisms in Maat using VeReMi.</title>
<year>2018</year>
<month>December</month>
<ee type="oa">https://doi.org/10.5281/zenodo.1994034</ee>
<publisher>Zenodo</publisher>
<stream>streams/repo/zenodo</stream>
<rel sort="0" label="Version 1" uri="https://doi.org/10.5281/zenodo.1994033" type="versionOf"></rel>
</data>
</r>
<r><article publtype="informal" key="journals/corr/abs-1804-06701" mdate="2021-09-24">
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="46/306">Frank Kargl</author>
<title>VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs.</title>
<year>2018</year>
<volume>abs/1804.06701</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1804.06701</ee>
<url>db/journals/corr/corr1804.html#abs-1804-06701</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1804-06750" mdate="2018-08-13">
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="218/5772">Lisa Maile</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks.</title>
<year>2018</year>
<volume>abs/1804.06750</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1804.06750</ee>
<url>db/journals/corr/corr1804.html#abs-1804-06750</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1805-01388" mdate="2021-09-24">
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="159/0709">Henning Kopp</author>
<author pid="46/306">Frank Kargl</author>
<title>Multi-Source Fusion Operations in Subjective Logic.</title>
<year>2018</year>
<volume>abs/1805.01388</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1805.01388</ee>
<url>db/journals/corr/corr1805.html#abs-1805-01388</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1805-11407" mdate="2018-08-13">
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="220/5342">Jessika Fiedler</author>
<author pid="46/306">Frank Kargl</author>
<title>Performance Evaluation in High-Speed Networks by the Example of Intrusion Detection.</title>
<year>2018</year>
<volume>abs/1805.11407</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1805.11407</ee>
<url>db/journals/corr/corr1805.html#abs-1805-11407</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1807-10554" mdate="2025-06-30">
<author pid="176/0554">Felix Engelmann</author>
<author pid="46/306">Frank Kargl</author>
<author pid="58/3065">Christoph B&#246;sch 0001</author>
<title>Coloured Ring Confidential Transactions.</title>
<year>2018</year>
<volume>abs/1807.10554</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1807.10554</ee>
<url>db/journals/corr/corr1807.html#abs-1807-10554</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1807-11338" mdate="2018-08-13">
<author pid="175/1346">David M&#246;dinger</author>
<author pid="159/0709">Henning Kopp</author>
<author pid="46/306">Frank Kargl</author>
<author pid="h/FranzJHauck">Franz J. Hauck</author>
<title>A Flexible Network Approach to Privacy of Blockchain Transactions.</title>
<year>2018</year>
<volume>abs/1807.11338</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1807.11338</ee>
<url>db/journals/corr/corr1807.html#abs-1807-11338</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1808-01177" mdate="2018-09-02">
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="225/4693">Kevin St&#246;lzle</author>
<author pid="161/5354">Stephan Kleber</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>An SDN-based Approach For Defending Against Reflective DDoS Attacks.</title>
<year>2018</year>
<volume>abs/1808.01177</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1808.01177</ee>
<url>db/journals/corr/corr1808.html#abs-1808-01177</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1808-05357" mdate="2021-06-28">
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="133/4864-5">Shreya Ghosh 0005</author>
<author pid="46/306">Frank Kargl</author>
<title>Mitigation of Flooding and Slow DDoS Attacks in a Software-Defined Network.</title>
<year>2018</year>
<volume>abs/1808.05357</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1808.05357</ee>
<url>db/journals/corr/corr1808.html#abs-1808-05357</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/KoppKBP18" mdate="2025-06-30">
<author pid="159/0709">Henning Kopp</author>
<author pid="46/306">Frank Kargl</author>
<author pid="58/3065">Christoph B&#246;sch 0001</author>
<author pid="43/8243">Andreas Peter 0001</author>
<title>uMine: a Blockchain based on Human Miners.</title>
<pages>722</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2018/722</ee>
<url>db/journals/iacr/iacr2018.html#KoppKBP18</url>
</article>
</r>
<r><article key="journals/ieeesp/DacierKCKD17" mdate="2025-03-03">
<author orcid="0000-0003-3206-2030" pid="76/5806">Marc Dacier</author>
<author pid="k/HartmutKonig">Hartmut K&#246;nig</author>
<author pid="185/2416">Radoslaw Cwalinski</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0009-0005-8326-9930" pid="13/1169">Sven Dietrich</author>
<title>Security Challenges and Opportunities of Software-Defined Networking.</title>
<pages>96-100</pages>
<year>2017</year>
<volume>15</volume>
<journal>IEEE Secur. Priv.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/MSP.2017.46</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2017.46</ee>
<ee>https://www.wikidata.org/entity/Q114986088</ee>
<url>db/journals/ieeesp/ieeesp15.html#DacierKCKD17</url>
</article>
</r>
<r><inproceedings key="conf/automotiveSS/CorbettBLK17" mdate="2023-07-04">
<author pid="89/7415">Christopher Corbett</author>
<author pid="217/6916">Tobias Basic</author>
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="46/306">Frank Kargl</author>
<title>A Testing Framework Architecture for Automotive Intrusion Detection Systems.</title>
<pages>89-102</pages>
<year>2017</year>
<booktitle>Automotive - Safety &#38; Security</booktitle>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/149</ee>
<crossref>conf/automotiveSS/2017</crossref>
<url>db/conf/automotiveSS/automotiveSS2017.html#CorbettBLK17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/debs/ErbMPK17" mdate="2025-12-01">
<author pid="117/6830">Benjamin Erb</author>
<author orcid="0000-0002-2937-6306" pid="392/0539">Echo Mei&#223;ner</author>
<author orcid="0000-0001-8308-6636" pid="199/2423">Jakob Pietron</author>
<author pid="46/306">Frank Kargl</author>
<title>Chronograph: A Distributed Processing Platform for Online and Batch Computations on Event-sourced Graphs.</title>
<pages>78-87</pages>
<year>2017</year>
<booktitle>DEBS</booktitle>
<ee>https://doi.org/10.1145/3093742.3093913</ee>
<crossref>conf/debs/2017</crossref>
<url>db/conf/debs/debs2017.html#ErbMPK17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurosp/KoppMHKB17" mdate="2025-06-30">
<author pid="159/0709">Henning Kopp</author>
<author pid="175/1346">David M&#246;dinger</author>
<author pid="h/FranzJHauck">Franz J. Hauck</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0001-9312-8000" pid="58/3065">Christoph B&#246;sch 0001</author>
<title>Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives.</title>
<pages>14-22</pages>
<year>2017</year>
<booktitle>EuroS&#38;P Workshops</booktitle>
<ee>https://doi.org/10.1109/EuroSPW.2017.45</ee>
<crossref>conf/eurosp/2017w</crossref>
<url>db/conf/eurosp/eurosp2017w.html#KoppMHKB17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kivs/ErbMHPK17" mdate="2025-12-01">
<author pid="117/6830">Benjamin Erb</author>
<author orcid="0000-0002-2937-6306" pid="392/0539">Echo Mei&#223;ner</author>
<author pid="183/5211">Gerhard Habiger</author>
<author orcid="0000-0001-8308-6636" pid="199/2423">Jakob Pietron</author>
<author pid="46/306">Frank Kargl</author>
<title>Consistent retrospective snapshots in distributed event-sourced systems.</title>
<pages>1-8</pages>
<year>2017</year>
<booktitle>NetSys</booktitle>
<ee>https://doi.org/10.1109/NetSys.2017.7903947</ee>
<crossref>conf/kivs/2017</crossref>
<url>db/conf/kivs/netsys2017.html#ErbMHPK17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/BradatschLK17" mdate="2023-03-24">
<author pid="170/1086">Leonard Bradatsch</author>
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="46/306">Frank Kargl</author>
<title>A Testing Framework for High-Speed Network and Security Devices.</title>
<pages>506-509</pages>
<year>2017</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN.2017.91</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/LCN.2017.91</ee>
<crossref>conf/lcn/2017</crossref>
<url>db/conf/lcn/lcn2017.html#BradatschLK17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/LukasederHSWHK17" mdate="2023-03-24">
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="202/9544">Alexander Hunt</author>
<author pid="209/2006">Christian Stehle</author>
<author pid="209/2441">Denis Wagner</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="46/306">Frank Kargl</author>
<title>An Extensible Host-Agnostic Framework for SDN-Assisted DDoS-Mitigation.</title>
<pages>619-622</pages>
<year>2017</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN.2017.103</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/LCN.2017.103</ee>
<crossref>conf/lcn/2017</crossref>
<url>db/conf/lcn/lcn2017.html#LukasederHSWHK17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/middleware/EngelmannKKGW17" mdate="2025-01-19">
<author pid="176/0554">Felix Engelmann</author>
<author pid="159/0709">Henning Kopp</author>
<author pid="46/306">Frank Kargl</author>
<author pid="147/4590">Florian Glaser</author>
<author pid="24/2155">Christof Weinhardt</author>
<title>Towards an economic analysis of routing in payment channel networks.</title>
<pages>2:1-2:6</pages>
<year>2017</year>
<booktitle>SERIAL@Middleware</booktitle>
<ee>https://doi.org/10.1145/3152824.3152826</ee>
<ee>https://www.wikidata.org/entity/Q131109649</ee>
<crossref>conf/middleware/2017serial</crossref>
<url>db/conf/middleware/serial2017.html#EngelmannKKGW17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/middleware/HeijdenEMSK17" mdate="2021-09-24">
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="176/0554">Felix Engelmann</author>
<author orcid="0000-0002-5917-2419" pid="175/1346">David M&#246;dinger</author>
<author pid="207/8394">Franziska Sch&#246;nig</author>
<author pid="46/306">Frank Kargl</author>
<title>Blackchain: scalability for resource-constrained accountable vehicle-to-x communication.</title>
<pages>4:1-4:5</pages>
<year>2017</year>
<booktitle>SERIAL@Middleware</booktitle>
<ee>https://doi.org/10.1145/3152824.3152828</ee>
<crossref>conf/middleware/2017serial</crossref>
<url>db/conf/middleware/serial2017.html#HeijdenEMSK17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/stm/WhitefieldCKPST17" mdate="2023-08-06">
<author orcid="0000-0002-9528-6632" pid="177/9145">Jorden Whitefield</author>
<author orcid="0000-0003-2680-4907" pid="22/150-2">Liqun Chen 0002</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0003-2188-5285" pid="30/9784">Andrew Paverd</author>
<author orcid="0000-0001-8365-6993" pid="s/SASchneider">Steve A. Schneider</author>
<author orcid="0000-0003-1835-4803" pid="37/5761">Helen Treharne</author>
<author orcid="0000-0002-7167-0146" pid="18/5892">Stephan Wesemeyer</author>
<title>Formal Analysis of V2X Revocation Protocols.</title>
<pages>147-163</pages>
<year>2017</year>
<booktitle>STM</booktitle>
<ee>https://doi.org/10.1007/978-3-319-68063-7_10</ee>
<crossref>conf/stm/2017</crossref>
<url>db/conf/stm/stm2017.html#WhitefieldCKPST17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/HeijdenLK17" mdate="2021-09-24">
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="46/306">Frank Kargl</author>
<title>Analyzing attacks on cooperative adaptive cruise control (CACC).</title>
<pages>45-52</pages>
<year>2017</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2017.8275598</ee>
<crossref>conf/vnc/2017</crossref>
<url>db/conf/vnc/vnc2017.html#HeijdenLK17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/woot/KleberNK17" mdate="2021-02-01">
<author pid="161/5354">Stephan Kleber</author>
<author pid="205/2063">Henrik Ferdinand N&#246;lscher</author>
<author pid="46/306">Frank Kargl</author>
<title>Automated PCB Reverse Engineering.</title>
<year>2017</year>
<booktitle>WOOT</booktitle>
<ee type="oa">https://www.usenix.org/conference/woot17/workshop-program/presentation/kleber</ee>
<crossref>conf/woot/2017</crossref>
<url>db/conf/woot/woot2017.html#KleberNK17</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/HeijdenAKA17" mdate="2021-09-24">
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="174/7724">Ala'a Al-Momani</author>
<author pid="46/306">Frank Kargl</author>
<author pid="39/120">Osama M. F. Abu-Sharkh</author>
<title>Enhanced Position Verification for VANETs using Subjective Logic.</title>
<year>2017</year>
<volume>abs/1703.10399</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1703.10399</ee>
<url>db/journals/corr/corr1703.html#HeijdenAKA17</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/WhitefieldCKPST17" mdate="2021-07-06">
<author pid="177/9145">Jorden Whitefield</author>
<author pid="22/150-2">Liqun Chen 0002</author>
<author pid="46/306">Frank Kargl</author>
<author pid="30/9784">Andrew Paverd</author>
<author pid="s/SASchneider">Steve A. Schneider</author>
<author pid="37/5761">Helen Treharne</author>
<author pid="18/5892">Stephan Wesemeyer</author>
<title>Formal Analysis of V2X Revocation Protocols.</title>
<year>2017</year>
<volume>abs/1704.07216</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1704.07216</ee>
<url>db/journals/corr/corr1704.html#WhitefieldCKPST17</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1710-05789" mdate="2021-09-24">
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="46/306">Frank Kargl</author>
<title>Analyzing Attacks on Cooperative Adaptive Cruise Control (CACC).</title>
<year>2017</year>
<volume>abs/1710.05789</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1710.05789</ee>
<url>db/journals/corr/corr1710.html#abs-1710-05789</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1710-08891" mdate="2021-09-24">
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="176/0554">Felix Engelmann</author>
<author pid="175/1346">David M&#246;dinger</author>
<author pid="207/8394">Franziska Sch&#246;nig</author>
<author pid="46/306">Frank Kargl</author>
<title>Blackchain: Scalability for Resource-Constrained Accountable Vehicle-to-X Communication.</title>
<year>2017</year>
<volume>abs/1710.08891</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1710.08891</ee>
<url>db/journals/corr/corr1710.html#abs-1710-08891</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1711-02597" mdate="2018-08-13">
<author pid="176/0554">Felix Engelmann</author>
<author pid="147/4590">Florian Glaser</author>
<author pid="159/0709">Henning Kopp</author>
<author pid="46/306">Frank Kargl</author>
<author pid="24/2155">Christof Weinhardt</author>
<title>Towards an Economic Analysis of Routing in Payment Channel Networks.</title>
<year>2017</year>
<volume>abs/1711.02597</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1711.02597</ee>
<url>db/journals/corr/corr1711.html#abs-1711-02597</url>
</article>
</r>
<r><article key="journals/adhoc/DietzelGK16" mdate="2025-01-19">
<author orcid="0000-0002-4192-0327" pid="26/8089">Stefan Dietzel</author>
<author orcid="0000-0003-0580-0034" pid="157/2921">Julian G&#252;rtler</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<title>A resilient in-network aggregation mechanism for VANETs based on dissemination redundancy.</title>
<pages>101-109</pages>
<year>2016</year>
<volume>37</volume>
<journal>Ad Hoc Networks</journal>
<ee>https://doi.org/10.1016/j.adhoc.2015.09.002</ee>
<ee>https://www.wikidata.org/entity/Q123365543</ee>
<url>db/journals/adhoc/adhoc37.html#DietzelGK16</url>
</article>
</r>
<r><article key="journals/adhoc/ForsterKL16" mdate="2024-05-07">
<author orcid="0000-0003-0754-2569" pid="164/7340">David F&#246;rster</author>
<author orcid="0000-0003-3800-8369" pid="46/306">Frank Kargl</author>
<author orcid="0009-0000-5654-4275" pid="02/2549">Hans L&#246;hr</author>
<title>PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks.</title>
<pages>122-132</pages>
<year>2016</year>
<volume>37</volume>
<journal>Ad Hoc Networks</journal>
<ee>https://doi.org/10.1016/j.adhoc.2015.09.011</ee>
<url>db/journals/adhoc/adhoc37.html#ForsterKL16</url>
</article>
</r>
<r><article key="journals/popets/BoschEKKP16" mdate="2025-06-30">
<author orcid="0000-0001-9312-8000" pid="58/3065">Christoph B&#246;sch 0001</author>
<author orcid="0000-0002-5432-4989" pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<author pid="159/0709">Henning Kopp</author>
<author orcid="0000-0002-0161-1570" pid="189/1772">Stefan Pfattheicher</author>
<title>Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns.</title>
<pages>237-254</pages>
<year>2016</year>
<volume>2016</volume>
<journal>Proc. Priv. Enhancing Technol.</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.1515/popets-2016-0038</ee>
<url>db/journals/popets/popets2016.html#BoschEKKP16</url>
</article>
</r>
<r><inproceedings key="conf/ispec/KoppBK16" mdate="2025-06-30">
<author pid="159/0709">Henning Kopp</author>
<author pid="58/3065">Christoph B&#246;sch 0001</author>
<author pid="46/306">Frank Kargl</author>
<title>KopperCoin - A Distributed File Storage with Financial Incentives.</title>
<pages>79-93</pages>
<year>2016</year>
<booktitle>ISPEC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-49151-6_6</ee>
<crossref>conf/ispec/2016</crossref>
<url>db/conf/ispec/ispec2016.html#KoppBK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/LukasederBEK16" mdate="2023-03-24">
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="170/1086">Leonard Bradatsch</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>Setting Up a High-Speed TCP Benchmarking Environment - Lessons Learned.</title>
<pages>160-163</pages>
<year>2016</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN.2016.32</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/LCN.2016.32</ee>
<crossref>conf/lcn/2016</crossref>
<url>db/conf/lcn/lcn2016.html#LukasederBEK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/LukasederBEHK16" mdate="2023-03-24">
<author pid="185/1695">Thomas Lukaseder</author>
<author pid="170/1086">Leonard Bradatsch</author>
<author pid="117/6830">Benjamin Erb</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="46/306">Frank Kargl</author>
<title>A Comparison of TCP Congestion Control Algorithms in 10G Networks.</title>
<pages>706-714</pages>
<year>2016</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN.2016.121</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/LCN.2016.121</ee>
<crossref>conf/lcn/2016</crossref>
<url>db/conf/lcn/lcn2016.html#LukasederBEHK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/middleware/ErbK16" mdate="2018-11-06">
<author pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>Chronograph: A Distributed Platform for Event-Sourced Graph Computing.</title>
<pages>15-16</pages>
<year>2016</year>
<booktitle>Middleware Posters and Demos</booktitle>
<ee>https://doi.org/10.1145/3007592.3007601</ee>
<crossref>conf/middleware/2016pd</crossref>
<url>db/conf/middleware/middleware2016pd.html#ErbK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/MeissnerEHLK16" mdate="2025-12-01">
<author orcid="0000-0002-2937-6306" pid="392/0539">Echo Mei&#223;ner</author>
<author pid="117/6830">Benjamin Erb</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="163/0433">Kristin Lange</author>
<author pid="46/306">Frank Kargl</author>
<title>Mobile triage management in disaster area networks using decentralized replication.</title>
<pages>7-12</pages>
<year>2016</year>
<booktitle>CHANTS@MOBICOM</booktitle>
<ee>https://doi.org/10.1145/2979683.2979689</ee>
<crossref>conf/mobicom/2016chants</crossref>
<url>db/conf/mobicom/chants2016.html#MeissnerEHLK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobihoc/KraftEMK16" mdate="2017-05-05">
<author pid="145/8309">Robin Kraft</author>
<author pid="117/6830">Benjamin Erb</author>
<author pid="175/1346">David M&#246;dinger</author>
<author pid="46/306">Frank Kargl</author>
<title>Using conflict-free replicated data types for serverless mobile social applications.</title>
<pages>49-54</pages>
<year>2016</year>
<booktitle>HOTPOST@MobiHoc</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2944868</ee>
<crossref>conf/mobihoc/2016hotpost</crossref>
<url>db/conf/mobihoc/hotpost2016.html#KraftEMK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sicherheit/CorbettSKP16" mdate="2023-07-04">
<author pid="89/7415">Christopher Corbett</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<author pid="180/3916">Felix Preussner</author>
<title>Automotive Ethernet: security opportunity or challenge?</title>
<pages>45-54</pages>
<year>2016</year>
<booktitle>Sicherheit</booktitle>
<crossref>conf/sicherheit/2016</crossref>
<url>db/conf/sicherheit/sicherheit2016.html#CorbettSKP16</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/880</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/CaselliZASK16" mdate="2021-02-01">
<author pid="125/3305">Marco Caselli</author>
<author pid="z/EmmanueleZambon">Emmanuele Zambon</author>
<author pid="150/8002">Johanna Amann</author>
<author pid="s/RobinSommer">Robin Sommer</author>
<author pid="46/306">Frank Kargl</author>
<title>Specification Mining for Intrusion Detection in Networked Control Systems.</title>
<pages>791-806</pages>
<year>2016</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/caselli</ee>
<crossref>conf/uss/2016</crossref>
<url>db/conf/uss/uss2016.html#CaselliZASK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/Al-MomaniHKW16" mdate="2021-09-24">
<author pid="174/7724">Ala'a Al-Momani</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0003-2090-6136" pid="131/9706">Christian Waldschmidt</author>
<title>Exploiting propagation effects for authentication and misbehavior detection in VANETs.</title>
<pages>1-4</pages>
<year>2016</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2016.7835973</ee>
<crossref>conf/vnc/2016</crossref>
<url>db/conf/vnc/vnc2016.html#Al-MomaniHKW16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/BerlinHMK16" mdate="2017-05-26">
<author pid="194/3314">Olga Berlin</author>
<author pid="33/3910">Albert Held</author>
<author pid="165/8342">Matthias Matousek</author>
<author pid="46/306">Frank Kargl</author>
<title>POSTER: Anomaly-based misbehaviour detection in connected car backends.</title>
<pages>1-2</pages>
<year>2016</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2016.7835978</ee>
<crossref>conf/vnc/2016</crossref>
<url>db/conf/vnc/vnc2016.html#BerlinHMK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/HeijdenAKA16" mdate="2021-09-24">
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="174/7724">Ala'a Al-Momani</author>
<author pid="46/306">Frank Kargl</author>
<author pid="39/120">Osama M. F. Abu-Sharkh</author>
<title>Enhanced Position Verification for VANETs Using Subjective Logic.</title>
<pages>1-7</pages>
<year>2016</year>
<booktitle>VTC Fall</booktitle>
<ee>https://doi.org/10.1109/VTCFall.2016.7881000</ee>
<crossref>conf/vtc/2016f</crossref>
<url>db/conf/vtc/vtc2016f.html#HeijdenAKA16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/HeijdenDLK16" mdate="2021-09-24">
<author pid="128/4581">Rens W. van der Heijden</author>
<author pid="26/8089">Stefan Dietzel</author>
<author pid="54/4411">Tim Leinm&#252;ller</author>
<author pid="46/306">Frank Kargl</author>
<title>Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems.</title>
<year>2016</year>
<volume>abs/1610.06810</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1610.06810</ee>
<url>db/journals/corr/corr1610.html#HeijdenDLK16</url>
</article>
</r>
<r><article publtype="informal" key="journals/dagstuhl-reports/DacierDKK16" mdate="2017-06-07">
<author pid="76/5806">Marc Dacier</author>
<author pid="13/1169">Sven Dietrich</author>
<author pid="46/306">Frank Kargl</author>
<author pid="k/HartmutKonig">Hartmut K&#246;nig</author>
<title>Network Attack Detection and Defense (Dagstuhl Seminar 16361).</title>
<pages>1-28</pages>
<year>2016</year>
<volume>6</volume>
<journal>Dagstuhl Reports</journal>
<number>9</number>
<ee type="oa">https://doi.org/10.4230/DagRep.6.9.1</ee>
<url>db/journals/dagstuhl-reports/dagstuhl-reports6.html#DacierDKK16</url>
</article>
</r>
<r><article key="journals/comsur/PetitSFK15" mdate="2020-04-09">
<author pid="33/7861">Jonathan Petit</author>
<author orcid="0000-0003-1039-7155" pid="08/7562">Florian Schaub</author>
<author pid="56/2818">Michael Feiri</author>
<author pid="46/306">Frank Kargl</author>
<title>Pseudonym Schemes in Vehicular Networks: A Survey.</title>
<pages>228-255</pages>
<year>2015</year>
<volume>17</volume>
<journal>IEEE Commun. Surv. Tutorials</journal>
<number>1</number>
<ee>https://doi.org/10.1109/COMST.2014.2345420</ee>
<url>db/journals/comsur/comsur17.html#PetitSFK15</url>
</article>
</r>
<r><inproceedings key="conf/ccs/CaselliZK15" mdate="2018-11-06">
<author pid="125/3305">Marco Caselli</author>
<author pid="z/EmmanueleZambon">Emmanuele Zambon</author>
<author pid="46/306">Frank Kargl</author>
<title>Sequence-aware Intrusion Detection in Industrial Control Systems.</title>
<pages>13-24</pages>
<year>2015</year>
<booktitle>CPSS@ASIACSS</booktitle>
<ee>https://doi.org/10.1145/2732198.2732200</ee>
<crossref>conf/ccs/2015asiacpss</crossref>
<url>db/conf/ccs/asiacpss2015.html#CaselliZK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/debs/ErbK15" mdate="2018-11-06">
<author orcid="0000-0002-5432-4989" pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>A conceptual model for event-sourced graph computing.</title>
<pages>352-355</pages>
<year>2015</year>
<booktitle>DEBS</booktitle>
<ee>https://doi.org/10.1145/2675743.2776773</ee>
<crossref>conf/debs/2015</crossref>
<url>db/conf/debs/debs2015.html#ErbK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/essos/FazouaneKHMK15" mdate="2021-09-24">
<author pid="159/0705">Marouane Fazouane</author>
<author pid="159/0709">Henning Kopp</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="73/4987">Daniel Le M&#233;tayer</author>
<author pid="46/306">Frank Kargl</author>
<title>Formal Verification of Privacy Properties in Electric Vehicle Charging.</title>
<pages>17-33</pages>
<year>2015</year>
<booktitle>ESSoS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-15618-7_2</ee>
<crossref>conf/essos/2015</crossref>
<url>db/conf/essos/essos2015.html#FazouaneKHMK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip11-10/CaselliZPK15" mdate="2023-07-27">
<author pid="125/3305">Marco Caselli</author>
<author pid="z/EmmanueleZambon">Emmanuele Zambon</author>
<author pid="33/7861">Jonathan Petit</author>
<author pid="46/306">Frank Kargl</author>
<title>Modeling Message Sequences for Intrusion Detection in Industrial Control Systems.</title>
<pages>49-71</pages>
<year>2015</year>
<booktitle>Critical Infrastructure Protection</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-26567-4_4</ee>
<crossref>conf/ifip11-10/2015</crossref>
<url>db/conf/ifip11-10/iccip2015.html#CaselliZPK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kivs/KleberHKK15" mdate="2023-03-24">
<author orcid="0000-0001-9836-4897" pid="161/5354">Stephan Kleber</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="159/0709">Henning Kopp</author>
<author pid="46/306">Frank Kargl</author>
<title>Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions.</title>
<pages>1-8</pages>
<year>2015</year>
<booktitle>NetSys</booktitle>
<ee>https://doi.org/10.1109/NetSys.2015.7089068</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/NetSys.2015.7089068</ee>
<crossref>conf/kivs/2015</crossref>
<url>db/conf/kivs/netsys2015.html#KleberHKK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trust/ForsterLZK15" mdate="2017-06-05">
<author orcid="0000-0003-0754-2569" pid="164/7340">David F&#246;rster</author>
<author pid="02/2549">Hans L&#246;hr</author>
<author pid="68/2288">Jan Zibuschka</author>
<author pid="46/306">Frank Kargl</author>
<title>REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks.</title>
<pages>193-208</pages>
<year>2015</year>
<booktitle>TRUST</booktitle>
<ee>https://doi.org/10.1007/978-3-319-22846-4_12</ee>
<crossref>conf/trust/2015</crossref>
<url>db/conf/trust/trust2015.html#ForsterLZK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/Al-MomaniKWMS15" mdate="2021-04-09">
<author pid="174/7724">Ala'a Al-Momani</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0003-2090-6136" pid="131/9706">Christian Waldschmidt</author>
<author pid="118/0634">Steffen Moser</author>
<author pid="60/4647">Frank Slomka</author>
<title>Wireless channel-based message authentication.</title>
<pages>271-274</pages>
<year>2015</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2015.7385587</ee>
<crossref>conf/vnc/2015</crossref>
<url>db/conf/vnc/vnc2015.html#Al-MomaniKWMS15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/ForsterLK15" mdate="2024-05-07">
<author orcid="0000-0003-0754-2569" pid="164/7340">David F&#246;rster</author>
<author orcid="0009-0000-5654-4275" pid="02/2549">Hans L&#246;hr</author>
<author pid="46/306">Frank Kargl</author>
<title>Decentralized enforcement of k-anonymity for location privacy using secret sharing.</title>
<pages>279-286</pages>
<year>2015</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2015.7385589</ee>
<crossref>conf/vnc/2015</crossref>
<url>db/conf/vnc/vnc2015.html#ForsterLK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/DietzelHPK15" mdate="2021-09-24">
<author pid="26/8089">Stefan Dietzel</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="33/7861">Jonathan Petit</author>
<author pid="46/306">Frank Kargl</author>
<title>Context-adaptive detection of insider attacks in VANET information dissemination schemes.</title>
<pages>287-294</pages>
<year>2015</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2015.7385590</ee>
<crossref>conf/vnc/2015</crossref>
<url>db/conf/vnc/vnc2015.html#DietzelHPK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/DietzelPK15" mdate="2025-05-26">
<author pid="26/8089">Stefan Dietzel</author>
<author pid="43/8243">Andreas Peter 0001</author>
<author pid="46/306">Frank Kargl</author>
<title>Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks.</title>
<pages>1-5</pages>
<year>2015</year>
<booktitle>VTC Spring</booktitle>
<ee>https://doi.org/10.1109/VTCSpring.2015.7146074</ee>
<crossref>conf/vtc/2015s</crossref>
<url>db/conf/vtc/vtc2015s.html#DietzelPK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/FeiriPPZK15" mdate="2017-06-05">
<author pid="56/2818">Michael Feiri</author>
<author pid="164/8830">Rolf Pielage</author>
<author pid="33/7861">Jonathan Petit</author>
<author orcid="0000-0002-9081-5996" pid="93/4627">Nicola Zannone</author>
<author pid="46/306">Frank Kargl</author>
<title>Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET.</title>
<pages>1-5</pages>
<year>2015</year>
<booktitle>VTC Spring</booktitle>
<ee>https://doi.org/10.1109/VTCSpring.2015.7146029</ee>
<crossref>conf/vtc/2015s</crossref>
<url>db/conf/vtc/vtc2015s.html#FeiriPPZK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisec/ForsterKL15" mdate="2024-05-07">
<author orcid="0000-0003-0754-2569" pid="164/7340">David F&#246;rster</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0009-0000-5654-4275" pid="02/2549">Hans L&#246;hr</author>
<title>A framework for evaluating pseudonym strategies in vehicular ad-hoc networks.</title>
<pages>19:1-19:6</pages>
<year>2015</year>
<booktitle>WISEC</booktitle>
<ee>https://doi.org/10.1145/2766498.2766520</ee>
<crossref>conf/wisec/2015</crossref>
<url>db/conf/wisec/wisec2015.html#ForsterKL15</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/KleberUMKSH15" mdate="2020-05-11">
<author pid="161/5354">Stephan Kleber</author>
<author pid="165/8330">Florian Unterstein</author>
<author pid="165/8342">Matthias Matousek</author>
<author pid="46/306">Frank Kargl</author>
<author pid="60/4647">Frank Slomka</author>
<author pid="118/1329">Matthias Hiller</author>
<title>Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption.</title>
<pages>651</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/651</ee>
<url>db/journals/iacr/iacr2015.html#KleberUMKSH15</url>
</article>
</r>
<r><article key="journals/comsur/DietzelPKS14" mdate="2020-04-09">
<author pid="26/8089">Stefan Dietzel</author>
<author pid="33/7861">Jonathan Petit</author>
<author pid="46/306">Frank Kargl</author>
<author pid="15/503-1">Bj&#246;rn Scheuermann 0001</author>
<title>In-Network Aggregation for Vehicular Ad Hoc Networks.</title>
<pages>1909-1932</pages>
<year>2014</year>
<volume>16</volume>
<journal>IEEE Commun. Surv. Tutorials</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.1109/COMST.2014.2320091</ee>
<url>db/journals/comsur/comsur16.html#DietzelPKS14</url>
</article>
</r>
<r><article key="journals/ieeesp/KarglHKVD14" mdate="2021-09-24">
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="k/HartmutKonig">Hartmut K&#246;nig</author>
<author pid="58/185">Alfonso Valdes</author>
<author orcid="0000-0003-3206-2030" pid="76/5806">Marc Dacier</author>
<title>Insights on the Security and Dependability of Industrial Control Systems.</title>
<pages>75-78</pages>
<year>2014</year>
<volume>12</volume>
<journal>IEEE Secur. Priv.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/MSP.2014.120</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2014.120</ee>
<url>db/journals/ieeesp/ieeesp12.html#KarglHKVD14</url>
</article>
</r>
<r><article key="journals/it/ErbKD14" mdate="2023-08-28">
<author orcid="0000-0002-5432-4989" pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<author pid="75/916">J&#246;rg Domaschka</author>
<title>Concurrent programming in web applications.</title>
<pages>119-126</pages>
<year>2014</year>
<volume>56</volume>
<journal>it Inf. Technol.</journal>
<number>3</number>
<ee>https://doi.org/10.1515/itit-2013-1030</ee>
<ee>https://www.wikidata.org/entity/Q115723350</ee>
<url>db/journals/it/it56.html#ErbKD14</url>
</article>
</r>
<r><inproceedings key="conf/critis/CaselliK14" mdate="2017-05-21">
<author pid="125/3305">Marco Caselli</author>
<author pid="46/306">Frank Kargl</author>
<title>A Security Assessment Methodology for Critical Infrastructures.</title>
<pages>332-343</pages>
<year>2014</year>
<booktitle>CRITIS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-31664-2_34</ee>
<crossref>conf/critis/2014</crossref>
<url>db/conf/critis/critis2014.html#CaselliK14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fgct/EngelmannLEHK14" mdate="2021-09-24">
<author pid="176/0554">Felix Engelmann</author>
<author pid="185/1695">Thomas Lukaseder</author>
<author orcid="0000-0002-5432-4989" pid="117/6830">Benjamin Erb</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="46/306">Frank Kargl</author>
<title>Dynamic packet-filtering in high-speed networks using NetFPGAs.</title>
<pages>55-59</pages>
<year>2014</year>
<booktitle>FGCT</booktitle>
<ee>https://doi.org/10.1109/FGCT.2014.6933224</ee>
<crossref>conf/fgct/2014</crossref>
<url>db/conf/fgct/fgct2014.html#EngelmannLEHK14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mum/BuchenscheitKNSSK14" mdate="2018-11-06">
<author pid="154/1762">Andreas Buchenscheit</author>
<author pid="35/8087">Bastian K&#246;nings</author>
<author pid="86/261">Andreas Neubert</author>
<author orcid="0000-0003-1039-7155" pid="08/7562">Florian Schaub</author>
<author pid="79/2065">Matthias Schneider</author>
<author pid="46/306">Frank Kargl</author>
<title>Privacy implications of presence sharing in mobile messaging applications.</title>
<pages>20-29</pages>
<year>2014</year>
<booktitle>MUM</booktitle>
<ee>https://doi.org/10.1145/2677972.2677980</ee>
<crossref>conf/mum/2014</crossref>
<url>db/conf/mum/mum2014.html#BuchenscheitKNSSK14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/simutools/ErbK14" mdate="2017-06-05">
<author orcid="0000-0002-5432-4989" pid="117/6830">Benjamin Erb</author>
<author pid="46/306">Frank Kargl</author>
<title>Combining discrete event simulations and event sourcing.</title>
<pages>51-55</pages>
<year>2014</year>
<booktitle>SimuTools</booktitle>
<ee>https://doi.org/10.4108/icst.simutools.2014.254624</ee>
<ee>http://dl.acm.org/citation.cfm?id=2643102</ee>
<crossref>conf/simutools/2014</crossref>
<url>db/conf/simutools/simutools2014.html#ErbK14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/ForsterKL14" mdate="2024-05-07">
<author orcid="0000-0003-0754-2569" pid="164/7340">David F&#246;rster</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0009-0000-5654-4275" pid="02/2549">Hans L&#246;hr</author>
<title>PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET).</title>
<pages>25-32</pages>
<year>2014</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2014.7013305</ee>
<crossref>conf/vnc/2014</crossref>
<url>db/conf/vnc/vnc2014.html#ForsterKL14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/FeiriPK14" mdate="2017-05-26">
<author pid="56/2818">Michael Feiri</author>
<author pid="33/7861">Jonathan Petit</author>
<author pid="46/306">Frank Kargl</author>
<title>Formal model of certificate omission schemes in VANET.</title>
<pages>41-44</pages>
<year>2014</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2014.7013307</ee>
<crossref>conf/vnc/2014</crossref>
<url>db/conf/vnc/vnc2014.html#FeiriPK14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/DietzelGHK14" mdate="2021-09-24">
<author pid="26/8089">Stefan Dietzel</author>
<author pid="157/2921">Julian G&#252;rtler</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="46/306">Frank Kargl</author>
<title>Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes.</title>
<pages>135-142</pages>
<year>2014</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2014.7013332</ee>
<crossref>conf/vnc/2014</crossref>
<url>db/conf/vnc/vnc2014.html#DietzelGHK14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wivec/PetitFK14" mdate="2017-05-22">
<author pid="33/7861">Jonathan Petit</author>
<author pid="56/2818">Michael Feiri</author>
<author pid="46/306">Frank Kargl</author>
<title>Revisiting attacker model for smart vehicles.</title>
<pages>1-5</pages>
<year>2014</year>
<booktitle>WiVeC</booktitle>
<ee>https://doi.org/10.1109/WIVEC.2014.6953258</ee>
<crossref>conf/wivec/2014</crossref>
<url>db/conf/wivec/wivec2014.html#PetitFK14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wowmom/DietzelHDK14" mdate="2023-03-24">
<author pid="26/8089">Stefan Dietzel</author>
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="157/7936">Hendrik Decke</author>
<author pid="46/306">Frank Kargl</author>
<title>A flexible, subjective logic-based framework for misbehavior detection in V2V networks.</title>
<pages>1-6</pages>
<year>2014</year>
<booktitle>WoWMoM</booktitle>
<ee>https://doi.org/10.1109/WoWMoM.2014.6918989</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/WoWMoM.2014.6918989</ee>
<crossref>conf/wowmom/2014</crossref>
<url>db/conf/wowmom/wowmom2014.html#DietzelHDK14</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/dagstuhl-reports/DacierKKV14" mdate="2017-06-07">
<author pid="76/5806">Marc Dacier</author>
<author pid="46/306">Frank Kargl</author>
<author pid="k/HartmutKonig">Hartmut K&#246;nig</author>
<author pid="58/185">Alfonso Valdes</author>
<title>Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292).</title>
<pages>62-79</pages>
<year>2014</year>
<volume>4</volume>
<journal>Dagstuhl Reports</journal>
<number>7</number>
<ee type="oa">https://doi.org/10.4230/DagRep.4.7.62</ee>
<url>db/journals/dagstuhl-reports/dagstuhl-reports4.html#DacierKKV14</url>
</article>
</r>
<r><article key="journals/puc/SchaubHK013" mdate="2020-07-09">
<author orcid="0000-0003-1039-7155" pid="08/7562">Florian Schaub</author>
<author pid="51/9246">Markus Hipp</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>On credibility improvements for automotive navigation systems.</title>
<pages>803-813</pages>
<year>2013</year>
<volume>17</volume>
<journal>Pers. Ubiquitous Comput.</journal>
<number>5</number>
<ee type="oa">https://doi.org/10.1007/s00779-012-0519-0</ee>
<url>db/journals/puc/puc17.html#SchaubHK013</url>
</article>
</r>
<r><article key="journals/tvt/DietzelPHK13" mdate="2020-06-25">
<author pid="26/8089">Stefan Dietzel</author>
<author pid="33/7861">Jonathan Petit</author>
<author orcid="0000-0002-1911-6324" pid="h/GeertJHeijenk">Geert J. Heijenk</author>
<author pid="46/306">Frank Kargl</author>
<title>Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols.</title>
<pages>1505-1518</pages>
<year>2013</year>
<volume>62</volume>
<journal>IEEE Trans. Veh. Technol.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TVT.2012.2236117</ee>
<url>db/journals/tvt/tvt62.html#DietzelPHK13</url>
</article>
</r>
<r><inproceedings key="conf/ccs/FeiriPK13" mdate="2018-11-06">
<author pid="56/2818">Michael Feiri</author>
<author pid="33/7861">Jonathan Petit</author>
<author pid="46/306">Frank Kargl</author>
<title>Efficient and secure storage of private keys for pseudonymous vehicular communication.</title>
<pages>9-18</pages>
<year>2013</year>
<booktitle>CyCAR@CCS</booktitle>
<ee>https://doi.org/10.1145/2517968.2517972</ee>
<crossref>conf/ccs/2013cycar</crossref>
<url>db/conf/ccs/cycar2013.html#FeiriPK13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/HoferPSK13" mdate="2020-12-25">
<author pid="140/6383">Christina H&#246;fer</author>
<author pid="33/7861">Jonathan Petit</author>
<author pid="57/9852">Robert Karl Schmidt</author>
<author pid="46/306">Frank Kargl</author>
<title>POPCORN: privacy-preserving charging for emobility.</title>
<pages>37-48</pages>
<year>2013</year>
<booktitle>CyCAR@CCS</booktitle>
<ee>https://doi.org/10.1145/2517968.2517971</ee>
<ee>https://www.wikidata.org/entity/Q101069854</ee>
<crossref>conf/ccs/2013cycar</crossref>
<url>db/conf/ccs/cycar2013.html#HoferPSK13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/critis/CaselliHZK13" mdate="2017-05-21">
<author pid="125/3305">Marco Caselli</author>
<author pid="46/8412">Dina Hadziosmanovic</author>
<author pid="z/EmmanueleZambon">Emmanuele Zambon</author>
<author pid="46/306">Frank Kargl</author>
<title>On the Feasibility of Device Fingerprinting in Industrial Control Systems.</title>
<pages>155-166</pages>
<year>2013</year>
<booktitle>CRITIS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-03964-0_14</ee>
<crossref>conf/critis/2013</crossref>
<url>db/conf/critis/critis2013.html#CaselliHZK13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/LefevrePBLK13" mdate="2017-05-26">
<author pid="36/8116">St&#233;phanie Lefevre</author>
<author pid="33/7861">Jonathan Petit</author>
<author pid="b/RuzenaBajcsy">Ruzena Bajcsy</author>
<author pid="95/5971">Christian Laugier</author>
<author pid="46/306">Frank Kargl</author>
<title>Impact of V2X privacy strategies on Intersection Collision Avoidance systems.</title>
<pages>71-78</pages>
<year>2013</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2013.6737592</ee>
<crossref>conf/vnc/2013</crossref>
<url>db/conf/vnc/vnc2013.html#LefevrePBLK13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/FeiriPSK13" mdate="2017-05-26">
<author pid="56/2818">Michael Feiri</author>
<author pid="33/7861">Jonathan Petit</author>
<author pid="57/9852">Robert Karl Schmidt</author>
<author pid="46/306">Frank Kargl</author>
<title>The impact of security on cooperative awareness in VANET.</title>
<pages>127-134</pages>
<year>2013</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2013.6737599</ee>
<crossref>conf/vnc/2013</crossref>
<url>db/conf/vnc/vnc2013.html#FeiriPSK13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/DietzelBK13" mdate="2018-11-02">
<author pid="26/8089">Stefan Dietzel</author>
<author orcid="0000-0002-6811-7577" pid="142/0312">Mihail Balanici</author>
<author pid="46/306">Frank Kargl</author>
<title>Short paper: Towards data-similarity-based clustering for inter-vehicle communication.</title>
<pages>238-241</pages>
<year>2013</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2013.6737622</ee>
<crossref>conf/vnc/2013</crossref>
<url>db/conf/vnc/vnc2013.html#DietzelBK13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/KnapikSK13" mdate="2017-05-21">
<author pid="124/7033">Peter Knapik</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<title>Electronic Decal: A Security Function Based on V2X Communication.</title>
<pages>1-5</pages>
<year>2013</year>
<booktitle>VTC Spring</booktitle>
<ee>https://doi.org/10.1109/VTCSpring.2013.6692534</ee>
<crossref>conf/vtc/2013s</crossref>
<url>db/conf/vtc/vtc2013s.html#KnapikSK13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisec/KarglFB13" mdate="2018-11-06">
<author pid="46/306">Frank Kargl</author>
<author pid="41/5132">Arik Friedman</author>
<author pid="62/3483">Roksana Boreli</author>
<title>Differential privacy in intelligent transportation systems.</title>
<pages>107-112</pages>
<year>2013</year>
<booktitle>WISEC</booktitle>
<ee>https://doi.org/10.1145/2462096.2462114</ee>
<crossref>conf/wisec/2013</crossref>
<url>db/conf/wisec/wisec2013.html#KarglFB13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisec/HeijdenDK13" mdate="2021-09-24">
<author orcid="0000-0003-3280-1825" pid="128/4581">Rens W. van der Heijden</author>
<author pid="26/8089">Stefan Dietzel</author>
<author pid="46/306">Frank Kargl</author>
<title>SeDyA: secure dynamic aggregation in VANETs.</title>
<pages>131-142</pages>
<year>2013</year>
<booktitle>WISEC</booktitle>
<ee>https://doi.org/10.1145/2462096.2462119</ee>
<crossref>conf/wisec/2013</crossref>
<url>db/conf/wisec/wisec2013.html#HeijdenDK13</url>
</inproceedings>
</r>
<r><proceedings key="conf/mobisys/2013vanet" mdate="2013-06-30">
<editor pid="17/1861">Javier Goz&#225;lvez</editor>
<editor pid="46/306">Frank Kargl</editor>
<editor pid="41/6797">Jens Mittag</editor>
<editor pid="60/3388">Robin Kravets</editor>
<editor pid="127/6641">Michael Tsai</editor>
<title>Proceeding of the tenth ACM international workshop on Vehicular inter-networking, systems, and applications, VANET 2013, Taipei, Taiwan, June 25, 2013</title>
<publisher>ACM</publisher>
<booktitle>Vehicular Ad Hoc Networks</booktitle>
<year>2013</year>
<isbn>978-1-4503-2073-3</isbn>
<ee>http://dl.acm.org/citation.cfm?id=2482967</ee>
<url>db/conf/mobisys/vanet2013.html</url>
</proceedings>
</r>
<r><article key="journals/ncn/DresslerK12" mdate="2020-02-24">
<author orcid="0000-0002-1989-1750" pid="d/FalkoDressler">Falko Dressler</author>
<author pid="46/306">Frank Kargl</author>
<title>Towards security in nano-communication: Challenges and opportunities.</title>
<pages>151-160</pages>
<year>2012</year>
<volume>3</volume>
<journal>Nano Commun. Networks</journal>
<number>3</number>
<ee>https://doi.org/10.1016/j.nancom.2012.08.001</ee>
<url>db/journals/ncn/ncn3.html#DresslerK12</url>
</article>
</r>
<r><inproceedings key="conf/huc/SchaubKD0K12" mdate="2018-11-06">
<author pid="08/7562">Florian Schaub</author>
<author pid="35/8087">Bastian K&#246;nings</author>
<author pid="26/8089">Stefan Dietzel</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<author pid="46/306">Frank Kargl</author>
<title>Privacy context model for dynamic privacy adaptation in ubiquitous computing.</title>
<pages>752-757</pages>
<year>2012</year>
<booktitle>UbiComp</booktitle>
<ee>https://doi.org/10.1145/2370216.2370383</ee>
<crossref>conf/huc/2012</crossref>
<url>db/conf/huc/ubicomp2012.html#SchaubKD0K12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/DresslerK12" mdate="2019-12-27">
<author orcid="0000-0002-1989-1750" pid="d/FalkoDressler">Falko Dressler</author>
<author pid="46/306">Frank Kargl</author>
<title>Security in nano communication: Challenges and open research issues.</title>
<pages>6183-6187</pages>
<year>2012</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2012.6364977</ee>
<crossref>conf/icc/2012</crossref>
<url>db/conf/icc/icc2012.html#DresslerK12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/DietzelPKH12" mdate="2018-11-06">
<author pid="26/8089">Stefan Dietzel</author>
<author pid="33/7861">Jonathan Petit</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0002-1911-6324" pid="h/GeertJHeijenk">Geert Heijenk</author>
<title>Analyzing dissemination redundancy to achieve data consistency in VANETs.</title>
<pages>131-134</pages>
<year>2012</year>
<booktitle>VANET@MOBICOM</booktitle>
<ee>https://doi.org/10.1145/2307888.2307914</ee>
<crossref>conf/mobicom/2012vanet</crossref>
<url>db/conf/mobicom/vanet2012.html#DietzelPKH12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/FeiriPK12" mdate="2018-11-06">
<author pid="56/2818">Michael Feiri</author>
<author pid="33/7861">Jonathan Petit</author>
<author pid="46/306">Frank Kargl</author>
<title>Congestion-based certificate omission in VANETs.</title>
<pages>135-138</pages>
<year>2012</year>
<booktitle>VANET@MOBICOM</booktitle>
<ee>https://doi.org/10.1145/2307888.2307915</ee>
<crossref>conf/mobicom/2012vanet</crossref>
<url>db/conf/mobicom/vanet2012.html#FeiriPK12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/percom/SchaubKWK12" mdate="2023-03-24">
<author orcid="0000-0003-1039-7155" pid="08/7562">Florian Schaub</author>
<author pid="35/8087">Bastian K&#246;nings</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<author pid="46/306">Frank Kargl</author>
<title>Towards context adaptive privacy decisions in ubiquitous computing.</title>
<pages>407-410</pages>
<year>2012</year>
<booktitle>PerCom Workshops</booktitle>
<ee>https://doi.org/10.1109/PerComW.2012.6197521</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PerComW.2012.6197521</ee>
<crossref>conf/percom/2012w</crossref>
<url>db/conf/percom/percomw2012.html#SchaubKWK12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/BismeyerMBK12" mdate="2017-05-26">
<author pid="43/11063">Norbert Bi&#223;meyer</author>
<author pid="124/7172">Sebastian Mauthofer</author>
<author pid="64/6668">Kpatcha M. Bayarou</author>
<author pid="46/306">Frank Kargl</author>
<title>Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters.</title>
<pages>78-85</pages>
<year>2012</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2012.6407448</ee>
<crossref>conf/vnc/2012</crossref>
<url>db/conf/vnc/vnc2012.html#BismeyerMBK12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/KnapikSMK12" mdate="2017-05-26">
<author pid="124/7033">Peter Knapik</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="16/11446">Maik M&#252;ller</author>
<author pid="46/306">Frank Kargl</author>
<title>Understanding vehicle related crime to elaborate on countermeasures based on ADAS and V2X communication.</title>
<pages>86-93</pages>
<year>2012</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2012.6407449</ee>
<crossref>conf/vnc/2012</crossref>
<url>db/conf/vnc/vnc2012.html#KnapikSMK12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/PetitBFK12" mdate="2025-06-30">
<author pid="33/7861">Jonathan Petit</author>
<author orcid="0000-0001-9312-8000" pid="58/3065">Christoph B&#246;sch 0001</author>
<author pid="56/2818">Michael Feiri</author>
<author pid="46/306">Frank Kargl</author>
<title>On the potential of PUF for pseudonym generation in vehicular networks.</title>
<pages>94-100</pages>
<year>2012</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2012.6407450</ee>
<crossref>conf/vnc/2012</crossref>
<url>db/conf/vnc/vnc2012.html#PetitBFK12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/FeiriPK12" mdate="2017-05-26">
<author pid="56/2818">Michael Feiri</author>
<author pid="33/7861">Jonathan Petit</author>
<author pid="46/306">Frank Kargl</author>
<title>Evaluation of congestion-based certificate omission in VANETs.</title>
<pages>101-108</pages>
<year>2012</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2012.6407417</ee>
<crossref>conf/vnc/2012</crossref>
<url>db/conf/vnc/vnc2012.html#FeiriPK12</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/dagstuhl-reports/DacierKV12" mdate="2017-06-07">
<author pid="76/5806">Marc Dacier</author>
<author pid="46/306">Frank Kargl</author>
<author pid="58/185">Alfonso Valdes</author>
<title>Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502).</title>
<pages>49-63</pages>
<year>2012</year>
<volume>2</volume>
<journal>Dagstuhl Reports</journal>
<number>12</number>
<ee type="oa">https://doi.org/10.4230/DagRep.2.12.49</ee>
<url>db/journals/dagstuhl-reports/dagstuhl-reports2.html#DacierKV12</url>
</article>
</r>
<r><article key="journals/cm/DresslerKOTW11" mdate="2020-08-25">
<author orcid="0000-0002-1989-1750" pid="d/FalkoDressler">Falko Dressler</author>
<author pid="46/306">Frank Kargl</author>
<author pid="57/6706">J&#246;rg Ott</author>
<author pid="96/1437">Ozan K. Tonguz</author>
<author orcid="0000-0003-1074-9771" pid="24/641">Lars Wischhof</author>
<title>Research challenges in intervehicular communication: lessons of the 2010 Dagstuhl Seminar.</title>
<pages>158-164</pages>
<year>2011</year>
<volume>49</volume>
<journal>IEEE Commun. Mag.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/MCOM.2011.5762813</ee>
<url>db/journals/cm/cm49.html#DresslerKOTW11</url>
</article>
</r>
<r><article key="journals/cm/DietzelKHS11" mdate="2020-08-25">
<author pid="26/8089">Stefan Dietzel</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0002-1911-6324" pid="h/GeertJHeijenk">Geert J. Heijenk</author>
<author orcid="0000-0003-1039-7155" pid="08/7562">Florian Schaub</author>
<title>Modeling in-network aggregation in VANETs.</title>
<pages>142-148</pages>
<year>2011</year>
<volume>49</volume>
<journal>IEEE Commun. Mag.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/MCOM.2011.6069721</ee>
<url>db/journals/cm/cm49.html#DietzelKHS11</url>
</article>
</r>
<r><article key="journals/sigmobile/KarglP11" mdate="2025-03-03">
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0002-3267-5374" pid="p/PanagiotisPapadimitratos">Panos Papadimitratos</author>
<title>ACM WiSec 2011 poster and demo session.</title>
<pages>34</pages>
<year>2011</year>
<volume>15</volume>
<journal>ACM SIGMOBILE Mob. Comput. Commun. Rev.</journal>
<number>3</number>
<ee>https://doi.org/10.1145/2073290.2073296</ee>
<url>db/journals/sigmobile/sigmobile15.html#KarglP11</url>
</article>
</r>
<r><inproceedings key="conf/IEEEares/KostFKK11" mdate="2023-03-24">
<author pid="15/4489">Martin Kost</author>
<author pid="f/JCFreytag">Johann Christoph Freytag</author>
<author pid="46/306">Frank Kargl</author>
<author pid="92/1639">Antonio Kung</author>
<title>Privacy Verification Using Ontologies.</title>
<pages>627-632</pages>
<year>2011</year>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1109/ARES.2011.97</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARES.2011.97</ee>
<crossref>conf/IEEEares/2011</crossref>
<url>db/conf/IEEEares/ares2011.html#KostFKK11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/SchmidtBLKS11" mdate="2018-11-06">
<author pid="57/9852">Robert Karl Schmidt</author>
<author pid="45/10194">Achim Brakemeier</author>
<author pid="54/4411">Tim Leinm&#252;ller</author>
<author pid="46/306">Frank Kargl</author>
<author pid="64/4710">G&#252;nter Sch&#228;fer</author>
<title>Advanced carrier sensing to resolve local channel congestion.</title>
<pages>11-20</pages>
<year>2011</year>
<booktitle>Vehicular Ad Hoc Networks</booktitle>
<ee>https://doi.org/10.1145/2030698.2030701</ee>
<crossref>conf/mobicom/2011vanet</crossref>
<url>db/conf/mobicom/vanet2011.html#SchmidtBLKS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/PetitFK11" mdate="2017-05-26">
<author pid="33/7861">Jonathan Petit</author>
<author pid="56/2818">Michael Feiri</author>
<author pid="46/306">Frank Kargl</author>
<title>Spoofed data detection in VANETs using dynamic thresholds.</title>
<pages>25-32</pages>
<year>2011</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2011.6117120</ee>
<crossref>conf/vnc/2011</crossref>
<url>db/conf/vnc/vnc2011.html#PetitFK11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wowmom/KungFK11" mdate="2023-03-24">
<author pid="92/1639">Antonio Kung</author>
<author pid="f/JCFreytag">Johann Christoph Freytag</author>
<author pid="46/306">Frank Kargl</author>
<title>Privacy-by-design in ITS applications.</title>
<pages>1-6</pages>
<year>2011</year>
<booktitle>WOWMOM</booktitle>
<ee>https://doi.org/10.1109/WoWMoM.2011.5986166</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/WoWMoM.2011.5986166</ee>
<crossref>conf/wowmom/2011</crossref>
<url>db/conf/wowmom/wowmom2011.html#KungFK11</url>
</inproceedings>
</r>
<r><article key="journals/comcom/MaKW10" mdate="2020-02-20">
<author pid="44/6134">Zhendong Ma</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Measuring long-term location privacy in vehicular communication systems.</title>
<pages>1414-1427</pages>
<year>2010</year>
<volume>33</volume>
<journal>Comput. Commun.</journal>
<number>12</number>
<ee>https://doi.org/10.1016/j.comcom.2010.02.032</ee>
<url>db/journals/comcom/comcom33.html#MaKW10</url>
</article>
</r>
<r><article key="journals/network/SchmidtLSKS10" mdate="2020-09-11">
<author pid="57/9852">Robert Karl Schmidt</author>
<author pid="54/4411">Tim Leinm&#252;ller</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<author pid="64/4710">G&#252;nter Sch&#228;fer</author>
<title>Exploration of adaptive beaconing for efficient intervehicle safety communication.</title>
<pages>14-19</pages>
<year>2010</year>
<volume>24</volume>
<journal>IEEE Netw.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/MNET.2010.5395778</ee>
<url>db/journals/network/network24.html#SchmidtLSKS10</url>
</article>
</r>
<r><article key="journals/network/DietzelSKWK10" mdate="2020-09-11">
<author pid="26/8089">Stefan Dietzel</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="35/8087">Bastian K&#246;nings</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<author pid="46/306">Frank Kargl</author>
<title>Resilient secure aggregation for vehicular networks.</title>
<pages>26-31</pages>
<year>2010</year>
<volume>24</volume>
<journal>IEEE Netw.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/MNET.2010.5395780</ee>
<url>db/journals/network/network24.html#DietzelSKWK10</url>
</article>
</r>
<r><article key="journals/scn/LeinmullerSKM10" mdate="2020-09-10">
<author pid="54/4411">Tim Leinm&#252;ller</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<author pid="05/1911">Christian Maih&#246;fer</author>
<title>Decentralized position verification in geographic <i>ad hoc</i> routing.</title>
<pages>289-302</pages>
<year>2010</year>
<volume>3</volume>
<journal>Secur. Commun. Networks</journal>
<number>4</number>
<ee>https://doi.org/10.1002/sec.56</ee>
<url>db/journals/scn/scn3.html#LeinmullerSKM10</url>
</article>
</r>
<r><inproceedings key="conf/aaaiss/KarglSD10" mdate="2012-02-17">
<author pid="46/306">Frank Kargl</author>
<author pid="08/7562">Florian Schaub</author>
<author pid="26/8089">Stefan Dietzel</author>
<title>Mandatory Enforcement of Privacy Policies using Trusted Computing Principles.</title>
<year>2010</year>
<booktitle>AAAI Spring Symposium: Intelligent Information Privacy Management</booktitle>
<ee>http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/view/1049</ee>
<crossref>conf/aaaiss/2010-5</crossref>
<url>db/conf/aaaiss/aaaiss2010-5.html#KarglSD10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aaaiss/KoningsSWK10" mdate="2012-12-15">
<author pid="35/8087">Bastian K&#246;nings</author>
<author pid="08/7562">Florian Schaub</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<author pid="46/306">Frank Kargl</author>
<title>Towards Territorial Privacy in Smart Environments.</title>
<year>2010</year>
<booktitle>AAAI Spring Symposium: Intelligent Information Privacy Management</booktitle>
<ee>http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/view/1043</ee>
<crossref>conf/aaaiss/2010-5</crossref>
<url>db/conf/aaaiss/aaaiss2010-5.html#KoningsSWK10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/automotiveUI/HippSKW10" mdate="2018-11-06">
<author pid="51/9246">Markus Hipp</author>
<author orcid="0000-0003-1039-7155" pid="08/7562">Florian Schaub</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Interaction weaknesses of personal navigation devices.</title>
<pages>129-136</pages>
<year>2010</year>
<booktitle>AutomotiveUI</booktitle>
<ee>https://doi.org/10.1145/1969773.1969796</ee>
<crossref>conf/automotiveUI/2010</crossref>
<url>db/conf/automotiveUI/automotiveUI2010.html#HippSKW10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/SchochBDK10" mdate="2018-11-06">
<author pid="27/5992">Elmar Schoch</author>
<author pid="24/3677">Boto Bako</author>
<author pid="26/8089">Stefan Dietzel</author>
<author pid="46/306">Frank Kargl</author>
<title>Dependable and secure geocast in vehicular networks.</title>
<pages>61-68</pages>
<year>2010</year>
<booktitle>Vehicular Ad Hoc Networks</booktitle>
<ee>https://doi.org/10.1145/1860058.1860068</ee>
<crossref>conf/mobicom/2010vanet</crossref>
<url>db/conf/mobicom/vanet2010.html#SchochBDK10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/DietzelKHS10" mdate="2018-11-02">
<author pid="26/8089">Stefan Dietzel</author>
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0002-1911-6324" pid="h/GeertJHeijenk">Geert J. Heijenk</author>
<author orcid="0000-0003-1039-7155" pid="08/7562">Florian Schaub</author>
<title>On the potential of generic modeling for VANET data aggregation protocols.</title>
<pages>78-85</pages>
<year>2010</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2010.5698256</ee>
<crossref>conf/vnc/2010</crossref>
<url>db/conf/vnc/vnc2010.html#DietzelKHS10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wcnc/SchaubKMW10" mdate="2017-06-05">
<author orcid="0000-0003-1039-7155" pid="08/7562">Florian Schaub</author>
<author pid="46/306">Frank Kargl</author>
<author pid="44/6134">Zhendong Ma</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>V-Tokens for Conditional Pseudonymity in VANETs.</title>
<pages>1-6</pages>
<year>2010</year>
<booktitle>WCNC</booktitle>
<ee>https://doi.org/10.1109/WCNC.2010.5506126</ee>
<crossref>conf/wcnc/2010</crossref>
<url>db/conf/wcnc/wcnc2010.html#SchaubKMW10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisec/SchochK10" mdate="2018-11-06">
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<title>On the efficiency of secure beaconing in VANETs.</title>
<pages>111-116</pages>
<year>2010</year>
<booktitle>WISEC</booktitle>
<ee>https://doi.org/10.1145/1741866.1741885</ee>
<crossref>conf/wisec/2010</crossref>
<url>db/conf/wisec/wisec2010.html#SchochK10</url>
</inproceedings>
</r>
<r><proceedings key="conf/dagstuhl/2010P10402" mdate="2021-06-10">
<editor pid="d/FalkoDressler">Falko Dressler</editor>
<editor pid="46/306">Frank Kargl</editor>
<editor pid="57/6706">J&#246;rg Ott</editor>
<editor pid="96/1437">Ozan K. Tonguz</editor>
<editor pid="24/641">Lars Wischhof</editor>
<title>Inter-Vehicular Communication, 03.10. - 06.10.2010</title>
<booktitle>Inter-Vehicular Communication</booktitle>
<volume>10402</volume>
<year>2010</year>
<publisher>Schloss Dagstuhl - Leibniz-Zentrum f&#252;r Informatik, Germany</publisher>
<series href="db/series/dagstuhl/index.html">Dagstuhl Seminar Proceedings</series>
<url>db/conf/dagstuhl/P10402.html</url>
<ee type="oa">http://drops.dagstuhl.de/portals/10402/</ee>
</proceedings>
</r>
<r><inproceedings publtype="informal" key="conf/dagstuhl/DresslerKOTW10" mdate="2018-08-23">
<author pid="d/FalkoDressler">Falko Dressler</author>
<author pid="46/306">Frank Kargl</author>
<author pid="57/6706">J&#246;rg Ott</author>
<author pid="96/1437">Ozan K. Tonguz</author>
<author pid="24/641">Lars Wischhof</author>
<title>10402 Abstracts Collection and Executive Summary - Inter-Vehicular Communication.</title>
<year>2010</year>
<booktitle>Inter-Vehicular Communication</booktitle>
<ee type="oa">http://drops.dagstuhl.de/opus/volltexte/2011/2929/</ee>
<crossref>conf/dagstuhl/2010P10402</crossref>
<url>db/conf/dagstuhl/P10402.html#DresslerKOTW10</url>
</inproceedings>
</r>
<r><inproceedings publtype="informal" key="conf/dagstuhl/KarglBEPS10" mdate="2018-08-23">
<author pid="46/306">Frank Kargl</author>
<author pid="84/3267">Levente Butty&#225;n</author>
<author pid="42/9851">David Eckhoff</author>
<author pid="p/PanagiotisPapadimitratos">Panagiotis Papadimitratos</author>
<author pid="27/5992">Elmar Schoch</author>
<title>10402 Report - Working Group on Security and Privacy.</title>
<year>2010</year>
<booktitle>Inter-Vehicular Communication</booktitle>
<ee type="oa">http://drops.dagstuhl.de/opus/volltexte/2011/2927/</ee>
<crossref>conf/dagstuhl/2010P10402</crossref>
<url>db/conf/dagstuhl/P10402.html#KarglBEPS10</url>
</inproceedings>
</r>
<r><article key="journals/pik/KarglFS09" mdate="2021-04-29">
<author pid="46/306">Frank Kargl</author>
<author pid="50/6903-1">Matthias Frank 0001</author>
<author pid="00/4292">Burkhard Stiller</author>
<title>Editorial on Special Issue &#34;Mobile Ad-hoc Networks&#34;.</title>
<pages>206-207</pages>
<year>2009</year>
<volume>32</volume>
<journal>Prax. Inf.verarb. Kommun.</journal>
<number>4</number>
<ee>https://doi.org/10.1515/piko.2009.0039</ee>
<url>db/journals/pik/pik32.html#KarglFS09</url>
</article>
</r>
<r><inproceedings key="conf/cse/SchaubMK09" mdate="2023-03-24">
<author orcid="0000-0003-1039-7155" pid="08/7562">Florian Schaub</author>
<author pid="44/6134">Zhendong Ma</author>
<author pid="46/306">Frank Kargl</author>
<title>Privacy Requirements in Vehicular Communication Systems.</title>
<pages>139-145</pages>
<year>2009</year>
<booktitle>CSE (3)</booktitle>
<ee>https://doi.org/10.1109/CSE.2009.135</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSE.2009.135</ee>
<crossref>conf/cse/2009</crossref>
<url>db/conf/cse/cse2009-3.html#SchaubMK09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/KoningsSKD09" mdate="2023-03-24">
<author pid="35/8087">Bastian K&#246;nings</author>
<author orcid="0000-0003-1039-7155" pid="08/7562">Florian Schaub</author>
<author pid="46/306">Frank Kargl</author>
<author pid="26/8089">Stefan Dietzel</author>
<title>Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard.</title>
<pages>14-21</pages>
<year>2009</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN.2009.5355149</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/LCN.2009.5355149</ee>
<crossref>conf/lcn/2009</crossref>
<url>db/conf/lcn/lcn2009.html#KoningsSKD09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mass/MaKW09" mdate="2023-03-24">
<author pid="44/6134">Zhendong Ma</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Measuring location privacy in V2X communication systems with accumulated information.</title>
<pages>322-331</pages>
<year>2009</year>
<booktitle>MASS</booktitle>
<ee>https://doi.org/10.1109/MOBHOC.2009.5336983</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MOBHOC.2009.5336983</ee>
<crossref>conf/mass/2009</crossref>
<url>db/conf/mass/mass2009.html#MaKW09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/DietzelBSK09" mdate="2025-01-19">
<author pid="26/8089">Stefan Dietzel</author>
<author pid="24/3677">Boto Bako</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<title>A fuzzy logic based approach for structure-free aggregation in vehicular ad-hoc networks.</title>
<pages>79-88</pages>
<year>2009</year>
<booktitle>Vehicular Ad Hoc Networks</booktitle>
<ee>https://doi.org/10.1145/1614269.1614283</ee>
<ee>https://www.wikidata.org/entity/Q130906806</ee>
<crossref>conf/mobicom/2009vanet</crossref>
<url>db/conf/mobicom/vanet2009.html#DietzelBSK09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vnc/BuchenscheitSK009" mdate="2017-06-05">
<author pid="154/1762">Andreas Buchenscheit</author>
<author orcid="0000-0003-1039-7155" pid="08/7562">Florian Schaub</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>A VANET-based emergency vehicle warning system.</title>
<pages>1-8</pages>
<year>2009</year>
<booktitle>VNC</booktitle>
<ee>https://doi.org/10.1109/VNC.2009.5416384</ee>
<crossref>conf/vnc/2009</crossref>
<url>db/conf/vnc/vnc2009.html#BuchenscheitSK009</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-0912-5391" mdate="2018-08-13">
<author pid="p/PanagiotisPapadimitratos">Panagiotis Papadimitratos</author>
<author pid="84/3267">Levente Butty&#225;n</author>
<author pid="00/1005">Tam&#225;s Holczer</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="43/5273">Julien Freudiger</author>
<author pid="50/5973">Maxim Raya</author>
<author pid="44/6134">Zhendong Ma</author>
<author pid="46/306">Frank Kargl</author>
<author pid="92/1639">Antonio Kung</author>
<author pid="h/JPHubaux">Jean-Pierre Hubaux</author>
<title>Secure Vehicular Communication Systems: Design and Architecture</title>
<ee type="oa">http://arxiv.org/abs/0912.5391</ee>
<year>2009</year>
<journal>CoRR</journal>
<volume>abs/0912.5391</volume>
<url>db/journals/corr/corr0912.html#abs-0912-5391</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-0912-5393" mdate="2023-07-25">
<author pid="46/306">Frank Kargl</author>
<author pid="p/PanagiotisPapadimitratos">Panagiotis Papadimitratos</author>
<author pid="84/3267">Levente Butty&#225;n</author>
<author pid="66/11147">Michael M&#252;ter</author>
<author pid="96/4047">Bj&#246;rn Wiedersheim</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="79/7661-1">Ta Vinh Thong 0001</author>
<author pid="91/1831">Giorgio Calandriello</author>
<author pid="33/3910">Albert Held</author>
<author pid="92/1639">Antonio Kung</author>
<author pid="h/JPHubaux">Jean-Pierre Hubaux</author>
<title>Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges</title>
<ee type="oa">http://arxiv.org/abs/0912.5393</ee>
<year>2009</year>
<journal>CoRR</journal>
<volume>abs/0912.5393</volume>
<url>db/journals/corr/corr0912.html#abs-0912-5393</url>
</article>
</r>
<r><article key="journals/cm/PapadimitratosB08" mdate="2020-08-25">
<author orcid="0000-0002-3267-5374" pid="p/PanagiotisPapadimitratos">Panagiotis Papadimitratos</author>
<author pid="84/3267">Levente Butty&#225;n</author>
<author pid="00/1005">Tam&#225;s Holczer</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="43/5273">Julien Freudiger</author>
<author pid="50/5973">Maxim Raya</author>
<author pid="44/6134">Zhendong Ma</author>
<author pid="46/306">Frank Kargl</author>
<author pid="92/1639">Antonio Kung</author>
<author pid="h/JPHubaux">Jean-Pierre Hubaux</author>
<title>Secure vehicular communication systems: design and architecture.</title>
<pages>100-109</pages>
<year>2008</year>
<volume>46</volume>
<journal>IEEE Commun. Mag.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/MCOM.2008.4689252</ee>
<url>db/journals/cm/cm46.html#PapadimitratosB08</url>
</article>
</r>
<r><article key="journals/cm/KarglPBMSWTCHKH08" mdate="2023-07-25">
<author pid="46/306">Frank Kargl</author>
<author orcid="0000-0002-3267-5374" pid="p/PanagiotisPapadimitratos">Panagiotis Papadimitratos</author>
<author pid="84/3267">Levente Butty&#225;n</author>
<author pid="66/11147">Michael M&#252;ter</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="96/4047">Bj&#246;rn Wiedersheim</author>
<author pid="79/7661-1">Ta Vinh Thong 0001</author>
<author pid="91/1831">Giorgio Calandriello</author>
<author pid="33/3910">Albert Held</author>
<author pid="92/1639">Antonio Kung</author>
<author pid="h/JPHubaux">Jean-Pierre Hubaux</author>
<title>Secure vehicular communication systems: implementation, performance, and research challenges.</title>
<pages>110-118</pages>
<year>2008</year>
<volume>46</volume>
<journal>IEEE Commun. Mag.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/MCOM.2008.4689253</ee>
<url>db/journals/cm/cm46.html#KarglPBMSWTCHKH08</url>
</article>
</r>
<r><article key="journals/cm/SchochK008" mdate="2020-08-25">
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Communication patterns in VANETs.</title>
<pages>119-125</pages>
<year>2008</year>
<volume>46</volume>
<journal>IEEE Commun. Mag.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/MCOM.2008.4689254</ee>
<url>db/journals/cm/cm46.html#SchochK008</url>
</article>
</r>
<r><article key="journals/scn/SchochKKW08" mdate="2020-09-10">
<author pid="27/5992">Elmar Schoch</author>
<author pid="74/505">Moritz Keppler</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>On the security of context-adaptive information dissemination.</title>
<pages>205-218</pages>
<year>2008</year>
<volume>1</volume>
<journal>Secur. Commun. Networks</journal>
<number>3</number>
<ee>https://doi.org/10.1002/sec.29</ee>
<url>db/journals/scn/scn1.html#SchochKKW08</url>
</article>
</r>
<r><inproceedings key="conf/globecom/BakoKSW08" mdate="2017-05-23">
<author pid="24/3677">Boto Bako</author>
<author pid="46/306">Frank Kargl</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Advanced Adaptive Gossiping Using 2-Hop Neighborhood Information.</title>
<pages>5474-5479</pages>
<year>2008</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2008.ECP.1045</ee>
<crossref>conf/globecom/2008</crossref>
<url>db/conf/globecom/globecom2008.html#BakoKSW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itng/LimMKGFT08" mdate="2023-03-24">
<author pid="63/148">Yen Yang Lim</author>
<author orcid="0000-0001-7375-8208" pid="65/6118">Marco Messina</author>
<author pid="46/306">Frank Kargl</author>
<author pid="36/6009">Leena Ganguli</author>
<author pid="24/3071">Martin Fischer</author>
<author pid="63/6459">Tommy Kwong-Kin Tsang</author>
<title>SNMP-Proxy for Wireless Sensor Network.</title>
<pages>738-743</pages>
<year>2008</year>
<booktitle>ITNG</booktitle>
<ee>https://doi.org/10.1109/ITNG.2008.121</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ITNG.2008.121</ee>
<crossref>conf/itng/2008</crossref>
<url>db/conf/itng/itng2008.html#LimMKGFT08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itng/MessinaLLMK08" mdate="2023-03-24">
<author orcid="0000-0001-7375-8208" pid="65/6118">Marco Messina</author>
<author pid="63/148">Yen Yang Lim</author>
<author pid="04/5405">Elaine Lawrence</author>
<author orcid="0000-0001-5913-2372" pid="43/2877">Don Martin</author>
<author pid="46/306">Frank Kargl</author>
<title>Implementing and Validating an Environmental and Health Monitoring System.</title>
<pages>994-999</pages>
<year>2008</year>
<booktitle>ITNG</booktitle>
<ee>https://doi.org/10.1109/ITNG.2008.119</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ITNG.2008.119</ee>
<crossref>conf/itng/2008</crossref>
<url>db/conf/itng/itng2008.html#MessinaLLMK08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mdm/TraudNKW08" mdate="2023-03-23">
<author pid="43/694">Alexander Traud</author>
<author pid="n/JurgenNagler">J&#252;rgen Nagler-Ihlein</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Cyclic Data Synchronization through Reusing SyncML.</title>
<pages>165-172</pages>
<year>2008</year>
<booktitle>MDM</booktitle>
<ee>https://doi.org/10.1109/MDM.2008.10</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MDM.2008.10</ee>
<crossref>conf/mdm/2008</crossref>
<url>db/conf/mdm/mdm2008.html#TraudNKW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/KarglSWL08" mdate="2018-11-06">
<author pid="46/306">Frank Kargl</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="96/4047">Bj&#246;rn Wiedersheim</author>
<author pid="54/4411">Tim Leinm&#252;ller</author>
<title>Secure and efficient beaconing for vehicular networks.</title>
<pages>82-83</pages>
<year>2008</year>
<booktitle>Vehicular Ad Hoc Networks</booktitle>
<ee>https://doi.org/10.1145/1410043.1410060</ee>
<crossref>conf/mobicom/2008vanet</crossref>
<url>db/conf/mobicom/vanet2008.html#KarglSWL08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ncm/BakoKSW08" mdate="2023-03-24">
<author pid="24/3677">Boto Bako</author>
<author pid="46/306">Frank Kargl</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Evaluation of Position Based Gossiping for VANETs in an Intersection Scenario.</title>
<pages>397-402</pages>
<year>2008</year>
<booktitle>NCM (1)</booktitle>
<ee>https://doi.org/10.1109/NCM.2008.159</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/NCM.2008.159</ee>
<crossref>conf/ncm/2008-1</crossref>
<url>db/conf/ncm/ncm2008-1.html#BakoKSW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/simutools/SchochFKW08" mdate="2018-11-27">
<author pid="27/5992">Elmar Schoch</author>
<author pid="56/2818">Michael Feiri</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Simulation of ad hoc networks: ns-2 compared to JiST/SWANS.</title>
<pages>36</pages>
<year>2008</year>
<booktitle>SimuTools</booktitle>
<ee>https://doi.org/10.4108/ICST.SIMUTOOLS2008.3021</ee>
<ee>https://dl.acm.org/citation.cfm?id=1416263</ee>
<crossref>conf/simutools/2008</crossref>
<url>db/conf/simutools/simutools2008.html#SchochFKW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/BakoSKW08" mdate="2017-05-21">
<author pid="24/3677">Boto Bako</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Optimized Position Based Gossiping in VANETs.</title>
<pages>1-5</pages>
<year>2008</year>
<booktitle>VTC Fall</booktitle>
<ee>https://doi.org/10.1109/VETECF.2008.449</ee>
<crossref>conf/vtc/2008f</crossref>
<url>db/conf/vtc/vtc2008f.html#BakoSKW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/MaKW08" mdate="2017-05-21">
<author pid="44/6134">Zhendong Ma</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications.</title>
<pages>1-5</pages>
<year>2008</year>
<booktitle>VTC Fall</booktitle>
<ee>https://doi.org/10.1109/VETECF.2008.455</ee>
<crossref>conf/vtc/2008f</crossref>
<url>db/conf/vtc/vtc2008f.html#MaKW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vtc/SchochKWW08" mdate="2017-05-21">
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<author pid="23/3308">Fabian Wolf</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>U<sup>2</sup>VAS: A Research Communication Stack for Vehicular Networks.</title>
<pages>1-2</pages>
<year>2008</year>
<booktitle>VTC Fall</booktitle>
<ee>https://doi.org/10.1109/VETECF.2008.466</ee>
<crossref>conf/vtc/2008f</crossref>
<url>db/conf/vtc/vtc2008f.html#SchochKWW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/msn/BakoRKS07" mdate="2017-05-21">
<author pid="24/3677">Boto Bako</author>
<author pid="92/5389">Igor Rikanovic</author>
<author pid="46/306">Frank Kargl</author>
<author pid="27/5992">Elmar Schoch</author>
<title>Adaptive Topology Based Gossiping in VANETs Using Position Information.</title>
<pages>66-78</pages>
<year>2007</year>
<crossref>conf/msn/2007</crossref>
<booktitle>MSN</booktitle>
<ee>https://doi.org/10.1007/978-3-540-77024-4_8</ee>
<url>db/conf/msn/msn2007.html#BakoRKS07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ucs/KarglGF07" mdate="2017-05-23">
<author pid="46/306">Frank Kargl</author>
<author pid="55/6909">Sascha Ge&#223;ler</author>
<author pid="27/1713">Florian Flerlage</author>
<title>The iNAV Indoor Navigation System.</title>
<pages>110-117</pages>
<year>2007</year>
<crossref>conf/ucs/2007</crossref>
<booktitle>UCS</booktitle>
<ee>https://doi.org/10.1007/978-3-540-76772-5_9</ee>
<url>db/conf/ucs/ucs2007.html#KarglGF07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/webist/KlugeKW07" mdate="2012-12-15">
<author pid="120/4865">Jonas Kluge</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>The Effects of the Ajax Technology on Web Application Usability.</title>
<pages>289-294</pages>
<year>2007</year>
<booktitle>WEBIST (2)</booktitle>
<crossref>conf/webist/2007-2</crossref>
<url>db/conf/webist/webist2007-2.html#KlugeKW07</url>
</inproceedings>
</r>
<r><article key="journals/wc/LeinmullerSK06" mdate="2020-03-24">
<author pid="54/4411">Tim Leinm&#252;ller</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<title>Position Verification Approaches for Vehicular Ad Hoc Networks.</title>
<pages>16-21</pages>
<year>2006</year>
<volume>13</volume>
<journal>IEEE Wirel. Commun.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/WC-M.2006.250353</ee>
<url>db/journals/wc/wc13.html#LeinmullerSK06</url>
</article>
</r>
<r><inproceedings key="conf/esas/SchochKLSP06" mdate="2025-03-03">
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<author pid="54/4411">Tim Leinm&#252;ller</author>
<author pid="67/5126">Stefan Schlott</author>
<author orcid="0000-0002-3267-5374" pid="p/PanagiotisPapadimitratos">Panos Papadimitratos</author>
<title>Impact of Pseudonym Changes on Geographic Routing in VANETs.</title>
<pages>43-57</pages>
<year>2006</year>
<crossref>conf/esas/2006</crossref>
<booktitle>ESAS</booktitle>
<ee>https://doi.org/10.1007/11964254_6</ee>
<url>db/conf/esas/esas2006.html#SchochKLSP06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/KarglLZ06" mdate="2023-03-24">
<author pid="46/306">Frank Kargl</author>
<author pid="04/5405">Elaine Lawrence</author>
<author pid="39/3121">Gergely V. Z&#225;ruba</author>
<title>Minitrack Introduction.</title>
<year>2006</year>
<crossref>conf/hicss/2006</crossref>
<booktitle>HICSS</booktitle>
<ee>https://doi.org/10.1109/HICSS.2006.329</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HICSS.2006.329</ee>
<url>db/conf/hicss/hicss2006.html#KarglLZ06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/KarglSW06" mdate="2023-03-24">
<author pid="46/306">Frank Kargl</author>
<author pid="67/5126">Stefan Schlott</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Identification in Ad Hoc Networks.</title>
<year>2006</year>
<crossref>conf/hicss/2006</crossref>
<booktitle>HICSS</booktitle>
<ee>https://doi.org/10.1109/HICSS.2006.208</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HICSS.2006.208</ee>
<url>db/conf/hicss/hicss2006.html#KarglSW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/loca/SchlottKW06" mdate="2017-05-26">
<author pid="67/5126">Stefan Schlott</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Re-identifying Anonymous Nodes.</title>
<pages>103-115</pages>
<year>2006</year>
<crossref>conf/loca/2006</crossref>
<booktitle>LoCA</booktitle>
<ee>https://doi.org/10.1007/11752967_8</ee>
<url>db/conf/loca/loca2006.html#SchlottKW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mass/ChapkinBKS06" mdate="2023-03-24">
<author pid="20/9985">Sergey Chapkin</author>
<author pid="24/3677">Boto Bako</author>
<author pid="46/306">Frank Kargl</author>
<author pid="27/5992">Elmar Schoch</author>
<title>Location Tracking Attack in Ad hoc Networks based on Topology Information.</title>
<pages>870-875</pages>
<year>2006</year>
<booktitle>MASS</booktitle>
<ee>https://doi.org/10.1109/MOBHOC.2006.278667</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MOBHOC.2006.278667</ee>
<crossref>conf/mass/2006</crossref>
<url>db/conf/mass/mass2006.html#ChapkinBKS06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/LeinmullerMSK06" mdate="2018-11-06">
<author pid="54/4411">Tim Leinm&#252;ller</author>
<author pid="05/1911">Christian Maih&#246;fer</author>
<author pid="27/5992">Elmar Schoch</author>
<author pid="46/306">Frank Kargl</author>
<title>Improved security in geographic ad hoc routing through autonomous position verification.</title>
<pages>57-66</pages>
<year>2006</year>
<crossref>conf/mobicom/2006vanet</crossref>
<booktitle>Vehicular Ad Hoc Networks</booktitle>
<ee>https://doi.org/10.1145/1161064.1161075</ee>
<url>db/conf/mobicom/vanet2006.html#LeinmullerMSK06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ph/BaderPSWK06" mdate="2019-06-02">
<author pid="78/7867">Roland Bader</author>
<author pid="160/4339">Michele Pinto</author>
<author pid="129/7315">Felix Spenrath</author>
<author pid="160/4351">Philipp Wollmann</author>
<author pid="46/306">Frank Kargl</author>
<title>BigNurse: A Wireless Ad Hoc Network for Patient Monitoring.</title>
<pages>1-4</pages>
<year>2006</year>
<booktitle>PervasiveHealth</booktitle>
<ee>https://doi.org/10.1109/PCTHEALTH.2006.361691</ee>
<ee>http://eudl.eu/doi/10.1109/PCTHEALTH.2006.361691</ee>
<ee>https://www.wikidata.org/entity/Q60547138</ee>
<crossref>conf/ph/2006</crossref>
<url>db/conf/ph/ph2006.html#BaderPSWK06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ucs/KarglDSN06" mdate="2017-05-23">
<author pid="46/306">Frank Kargl</author>
<author pid="40/4844">G&#252;nter Dannh&#228;user</author>
<author pid="67/5126">Stefan Schlott</author>
<author pid="n/JurgenNagler">J&#252;rgen Nagler-Ihlein</author>
<title>Semantic Information Retrieval in the COMPASS Location System.</title>
<pages>129-143</pages>
<year>2006</year>
<crossref>conf/ucs/2006</crossref>
<booktitle>UCS</booktitle>
<ee>https://doi.org/10.1007/11890348_11</ee>
<url>db/conf/ucs/ucs2006.html#KarglDSN06</url>
</inproceedings>
</r>
<r><article key="journals/pik/KarglSW05" mdate="2021-04-29">
<author pid="46/306">Frank Kargl</author>
<author pid="67/5126">Stefan Schlott</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Sensors for Detection of Misbehaving Nodes in MANETs.</title>
<pages>38-44</pages>
<year>2005</year>
<volume>28</volume>
<journal>Prax. Inf.verarb. Kommun.</journal>
<number>1</number>
<ee>https://doi.org/10.1515/PIKO.2005.38</ee>
<url>db/journals/pik/pik28.html#KarglSW05</url>
</article>
</r>
<r><inproceedings key="conf/gi/KarglSW05" mdate="2023-07-04">
<author pid="46/306">Frank Kargl</author>
<author pid="67/5126">Stefan Schlott</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Identit&#228;ten in mobilen Ad hoc Netzwerken.</title>
<pages>349-353</pages>
<year>2005</year>
<crossref>conf/gi/2005-2</crossref>
<booktitle>GI Jahrestagung (2)</booktitle>
<url>db/conf/gi/gi2005-2.html#KarglSW05</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/28230</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings68/article3960.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/KarglGSW05" mdate="2023-03-24">
<author pid="46/306">Frank Kargl</author>
<author pid="47/863">Alfred Geiss</author>
<author pid="67/5126">Stefan Schlott</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Secure Dynamic Source Routing.</title>
<year>2005</year>
<crossref>conf/hicss/2005</crossref>
<booktitle>HICSS</booktitle>
<ee>https://doi.org/10.1109/HICSS.2005.531</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HICSS.2005.531</ee>
<url>db/conf/hicss/hicss2005.html#KarglGSW05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/ZarubaKL05" mdate="2023-03-24">
<author pid="39/3121">Gergely V. Z&#225;ruba</author>
<author pid="46/306">Frank Kargl</author>
<author pid="04/5405">Elaine Lawrence</author>
<title>Minitrack Chair's Introduction: Wireless Personal Area and Ad-Hoc Networks.</title>
<year>2005</year>
<crossref>conf/hicss/2005</crossref>
<booktitle>HICSS</booktitle>
<ee>https://doi.org/10.1109/HICSS.2005.419</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HICSS.2005.419</ee>
<url>db/conf/hicss/hicss2005.html#ZarubaKL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/loca/KarglB05" mdate="2017-05-26">
<author pid="46/306">Frank Kargl</author>
<author pid="18/1330">Alexander Bernauer</author>
<title>The COMPASS Location System.</title>
<pages>105-112</pages>
<year>2005</year>
<crossref>conf/loca/2005</crossref>
<booktitle>LoCA</booktitle>
<ee>https://doi.org/10.1007/11426646_10</ee>
<url>db/conf/loca/loca2005.html#KarglB05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/securecomm/SchlottKW05" mdate="2023-03-23">
<author pid="67/5126">Stefan Schlott</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Short paper: Random IDs for preserving location privacy.</title>
<pages>415-417</pages>
<year>2005</year>
<booktitle>SecureComm</booktitle>
<ee>https://doi.org/10.1109/SECURECOMM.2005.47</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECURECOMM.2005.47</ee>
<ee>http://eudl.eu/doi/10.1109/SECURECOMM.2005.47</ee>
<crossref>conf/securecomm/2005</crossref>
<url>db/conf/securecomm/securecomm2005.html#SchlottKW05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dimva/KarglKWS04" mdate="2023-07-04">
<author pid="46/306">Frank Kargl</author>
<author pid="27/4830">Andreas Klenk</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<author pid="67/5126">Stefan Schlott</author>
<title>Sensors for Detection of Misbehaving Nodes in MANETs.</title>
<pages>83-97</pages>
<year>2004</year>
<crossref>conf/dimva/2004</crossref>
<booktitle>DIMVA</booktitle>
<url>db/conf/dimva/dimva2004.html#KarglKWS04</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/29208</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings46/article2965.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/esas/KarglKSW04" mdate="2017-05-21">
<author pid="46/306">Frank Kargl</author>
<author pid="27/4830">Andreas Klenk</author>
<author pid="67/5126">Stefan Schlott</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks.</title>
<pages>152-165</pages>
<ee>https://doi.org/10.1007/978-3-540-30496-8_13</ee>
<year>2004</year>
<crossref>conf/esas/2004</crossref>
<booktitle>ESAS</booktitle>
<url>db/conf/esas/esas2004.html#KarglKSW04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/euromicro/KarglSKGW04" mdate="2023-03-24">
<author pid="46/306">Frank Kargl</author>
<author pid="67/5126">Stefan Schlott</author>
<author pid="27/4830">Andreas Klenk</author>
<author pid="47/863">Alfred Geiss</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Securing Ad hoc Routing Protocols.</title>
<pages>514-519</pages>
<year>2004</year>
<crossref>conf/euromicro/2004</crossref>
<booktitle>EUROMICRO</booktitle>
<ee>https://doi.org/10.1109/EURMIC.2004.1333415</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/EURMIC.2004.1333415</ee>
<url>db/conf/euromicro/euromicro2004.html#KarglSKGW04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gi/KarglSW04" mdate="2023-07-04">
<author pid="46/306">Frank Kargl</author>
<author pid="67/5126">Stefan Schlott</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Integrierte Sicherheit f&#252;r Mobile Ad-hoc Netzwerke.</title>
<pages>123-127</pages>
<year>2004</year>
<crossref>conf/gi/2004-1</crossref>
<booktitle>GI Jahrestagung (1)</booktitle>
<url>db/conf/gi/gi2004-1.html#KarglSW04</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/28830</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings50/article3119.html</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/KarglLZ04" mdate="2023-03-24">
<author pid="46/306">Frank Kargl</author>
<author pid="04/5405">Elaine Lawrence</author>
<author pid="39/3121">Gergely V. Z&#225;ruba</author>
<title>Wireless Personal Area Networks: Minitrack Introduction.</title>
<year>2004</year>
<crossref>conf/hicss/2004</crossref>
<booktitle>HICSS</booktitle>
<ee>https://doi.ieeecomputersociety.org/10.1109/HICSS.2004.10043</ee>
<url>db/conf/hicss/hicss2004.html#KarglLZ04</url>
</inproceedings>
</r>
<r><phdthesis key="phd/de/Kargl2004" mdate="2021-07-17">
<author pid="46/306">Frank Kargl</author>
<title>Sicherheit in Mobilen Ad hoc Netzwerken.</title>
<year>2003</year>
<school>University of Ulm, Germany</school>
<pages>1-255</pages>
<ee>http://vts.uni-ulm.de/docs/2004/3704/vts_3704.pdf</ee>
<ee>https://nbn-resolving.org/urn:nbn:de:bsz:289-vts-37046</ee>
<ee>https://d-nb.info/1015470432</ee>
<ee>https://d-nb.info/970085281</ee>
</phdthesis>
</r>
<r><inproceedings key="conf/hicss/KarglRSW03" mdate="2023-03-24">
<author pid="46/306">Frank Kargl</author>
<author pid="68/6109">Stefan Ribhegge</author>
<author pid="67/5126">Stefan Schlott</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Bluetooth-based Ad-Hoc Networks for Voice Transmission.</title>
<pages>314</pages>
<year>2003</year>
<crossref>conf/hicss/2003</crossref>
<booktitle>HICSS</booktitle>
<ee>https://doi.org/10.1109/HICSS.2003.1174874</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HICSS.2003.1174874</ee>
<url>db/conf/hicss/hicss2003.html#KarglRSW03</url>
</inproceedings>
</r>
<r><incollection key="conf/gi/Kargl03" mdate="2023-07-04">
<author pid="46/306">Frank Kargl</author>
<title>Sicherheit in Mobilen Ad hoc Netzwerken.</title>
<pages>79-90</pages>
<year>2003</year>
<booktitle>Ausgezeichnete Informatikdissertationen</booktitle>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/4491</ee>
<ee type="oa">https://subs.emis.de/LNI/Dissertation/Dissertation4/article12.html</ee>
<crossref>conf/gi/2003diss</crossref>
<url>db/conf/gi/diss2003.html#Kargl03</url>
</incollection>
</r>
<r><inproceedings key="conf/wman/NaglerKSW02" mdate="2023-07-04">
<author pid="n/JurgenNagler">J&#252;rgen Nagler</author>
<author pid="46/306">Frank Kargl</author>
<author pid="67/5126">Stefan Schlott</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Ein Framework f&#252;r MANET Routing Protokolle.</title>
<pages>153-165</pages>
<year>2002</year>
<crossref>conf/wman/2002</crossref>
<booktitle>WMAN</booktitle>
<url>db/conf/wman/wman2002.html#NaglerKSW02</url>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/30671</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings11/article221.html</ee>
</inproceedings>
</r>
<r><proceedings key="conf/wman/2002" mdate="2021-01-12">
<editor pid="02/4248-1">Michael Weber 0001</editor>
<editor pid="46/306">Frank Kargl</editor>
<title>Mobile Ad-Hoc Netzwerke, 1. deutscher Workshop &#252;ber Mobile Ad-Hoc Netzwerke WMAN 2002, 25.-26. M&#228;rz 2002 in Ulm</title>
<booktitle>WMAN</booktitle>
<series href="db/series/lni/index.html">LNI</series>
<volume>P-11</volume>
<publisher>GI</publisher>
<year>2002</year>
<isbn>3-88579-341-5</isbn>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/30669</ee>
<url>db/conf/wman/wman2002.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/ma/IllmannKKW01" mdate="2017-05-26">
<author pid="22/3925">Torsten Illmann</author>
<author pid="92/6578">Tilman Krueger</author>
<author pid="46/306">Frank Kargl</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Transparent Migration of Mobile Agents Using the Java Platform Debugger Architecture.</title>
<pages>198-212</pages>
<year>2001</year>
<crossref>conf/ma/2001</crossref>
<booktitle>Mobile Agents</booktitle>
<ee>https://doi.org/10.1007/3-540-45647-3_14</ee>
<url>db/conf/ma/ma2001.html#IllmannKKW01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/www/KarglMW01" mdate="2018-11-06">
<author pid="46/306">Frank Kargl</author>
<author pid="14/2907">J&#246;rn Maier</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Protecting web servers from distributed denial of service attacks.</title>
<pages>514-524</pages>
<year>2001</year>
<crossref>conf/www/2001</crossref>
<booktitle>WWW</booktitle>
<ee>https://doi.org/10.1145/371920.372148</ee>
<url>db/conf/www/www2001.html#KarglMW01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dais/KarglIW99" mdate="2012-12-15">
<author pid="46/306">Frank Kargl</author>
<author pid="22/3925">Torsten Illmann</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>CIA - a collaboration and coordination infrastructure for personal agents (short paper).</title>
<year>1999</year>
<crossref>conf/dais/1999</crossref>
<booktitle>DAIS</booktitle>
<url>db/conf/dais/dais1999.html#KarglIW99</url>
<pages>213-218</pages>
</inproceedings>
</r>
<r><inproceedings key="conf/jit/KarglIW99" mdate="2019-06-25">
<author pid="46/306">Frank Kargl</author>
<author pid="22/3925">Torsten Illmann</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<title>Evaluation of Java Messaging Middleware as a Platform for Software Agent Communication.</title>
<pages>161-170</pages>
<year>1999</year>
<crossref>conf/jit/1999</crossref>
<booktitle>Java-Informations-Tage</booktitle>
<url>db/conf/jit/jit1999.html#KarglIW99</url>
<ee>https://doi.org/10.1007/978-3-642-60247-4_15</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/webnet/KarglIWR99" mdate="2017-02-08">
<author pid="46/306">Frank Kargl</author>
<author pid="22/3925">Torsten Illmann</author>
<author pid="02/4248-1">Michael Weber 0001</author>
<author pid="68/6109">Stefan Ribhegge</author>
<title>Dynamic User Interfaces with Java.</title>
<pages>614-619</pages>
<year>1999</year>
<crossref>conf/webnet/1999</crossref>
<booktitle>WebNet</booktitle>
<url>db/conf/webnet/webnet1999-1.html#KarglIWR99</url>
</inproceedings>
</r>
<coauthors n="263" nc="4">
<co c="0"><na f="a/Abdelhamid:Amr_T=" pid="242/4380">Amr T. Abdelhamid</na></co>
<co c="0"><na f="a/Abu=Sharkh:Osama_M=_F=" pid="39/120">Osama M. F. Abu-Sharkh</na></co>
<co c="0"><na f="a/Al=Momani:Ala=a" pid="174/7724">Ala'a Al-Momani</na></co>
<co c="0"><na f="a/Alsafty:Aysha" pid="262/2052">Aysha Alsafty</na></co>
<co c="0"><na f="a/Altintas:Onur" pid="97/194">Onur Altintas</na></co>
<co c="0"><na f="a/Amann:Johanna" pid="150/8002">Johanna Amann</na></co>
<co c="0"><na f="a/Anacker:Harald" pid="125/5898">Harald Anacker</na></co>
<co c="3"><na f="b/Bader:Roland" pid="78/7867">Roland Bader</na></co>
<co c="0"><na f="b/Bajcsy:Ruzena" pid="b/RuzenaBajcsy">Ruzena Bajcsy</na></co>
<co c="0"><na f="b/Bako:Boto" pid="24/3677">Boto Bako</na></co>
<co c="0"><na f="b/Balanici:Mihail" pid="142/0312">Mihail Balanici</na></co>
<co c="0"><na f="b/Balzarotti:Davide" pid="56/490">Davide Balzarotti</na></co>
<co c="0"><na f="b/Basic:Tobias" pid="217/6916">Tobias Basic</na></co>
<co c="0"><na f="b/Bayarou:Kpatcha_M=" pid="64/6668">Kpatcha M. Bayarou</na></co>
<co c="0"><na f="b/Berlin:Olga" pid="194/3314">Olga Berlin</na></co>
<co c="-1"><na f="b/Bernauer:Alexander" pid="18/1330">Alexander Bernauer</na></co>
<co c="0"><na f="b/Bi=szlig=meyer:Norbert" pid="43/11063">Norbert Bi&#223;meyer</na></co>
<co c="0"><na f="b/Bkakria:Anis" pid="127/3314">Anis Bkakria</na></co>
<co c="0"><na f="b/Boreli:Roksana" pid="62/3483">Roksana Boreli</na></co>
<co c="0"><na f="b/B=ouml=sch_0001:Christoph" pid="58/3065">Christoph B&#246;sch 0001</na></co>
<co c="0"><na f="b/Bottner:Laura" pid="294/6593">Laura Bottner</na></co>
<co c="0"><na f="b/Bradatsch:Leonard" pid="170/1086">Leonard Bradatsch</na></co>
<co c="0"><na f="b/Brakemeier:Achim" pid="45/10194">Achim Brakemeier</na></co>
<co c="0"><na f="b/Buchenscheit:Andreas" pid="154/1762">Andreas Buchenscheit</na></co>
<co c="0"><na f="b/Buchholz:Michael" pid="48/10495">Michael Buchholz</na></co>
<co c="2"><na f="b/Buonarosa:Mary_Lynn" pid="349/4724">Mary Lynn Buonarosa</na></co>
<co c="0"><na f="b/Butty=aacute=n:Levente" pid="84/3267">Levente Butty&#225;n</na></co>
<co c="0"><na f="c/Calandriello:Giorgio" pid="91/1831">Giorgio Calandriello</na></co>
<co c="0"><na f="c/Caselli:Marco" pid="125/3305">Marco Caselli</na></co>
<co c="0"><na f="c/Chapkin:Sergey" pid="20/9985">Sergey Chapkin</na></co>
<co c="0"><na f="c/Chen_0002:Liqun" pid="22/150-2">Liqun Chen 0002</na></co>
<co c="0"><na f="c/Classen:Jiska" pid="155/8567">Jiska Classen</na></co>
<co c="0"><na f="c/Corbett:Christopher" pid="89/7415">Christopher Corbett</na></co>
<co c="0"><na f="c/Cuadrado:F=eacute=lix" pid="41/5008">F&#233;lix Cuadrado</na></co>
<co c="0"><na f="c/Cwalinski:Radoslaw" pid="185/2416">Radoslaw Cwalinski</na></co>
<co c="0"><na f="d/Dacier:Marc" pid="76/5806">Marc Dacier</na></co>
<co c="0"><na f="d/Dannh=auml=user:G=uuml=nter" pid="40/4844">G&#252;nter Dannh&#228;user</na></co>
<co c="0"><na f="d/Decke:Hendrik" pid="157/7936">Hendrik Decke</na></co>
<co c="0"><na f="d/Demirci:H=uuml=seyin" pid="55/1808">H&#252;seyin Demirci</na></co>
<co c="0"><na f="d/Dietmayer:Klaus" pid="65/6193">Klaus Dietmayer</na></co>
<co c="0"><na f="d/Dietrich:Sven" pid="13/1169">Sven Dietrich</na></co>
<co c="0"><na f="d/Dietzel:Stefan" pid="26/8089">Stefan Dietzel</na></co>
<co c="0" n="2"><na f="d/Dimitrakos:Theodosis" pid="99/4618">Theodosis Dimitrakos</na><na>Theo Dimitrakos</na></co>
<co c="0"><na f="d/Domaschka:J=ouml=rg" pid="75/916">J&#246;rg Domaschka</na></co>
<co c="0"><na f="d/Dressler:Falko" pid="d/FalkoDressler">Falko Dressler</na></co>
<co c="2"><na f="d/Drobot:Adam" pid="178/9803">Adam Drobot</na></co>
<co c="0"><na f="d/Duhr:Paul_Lukas" pid="428/0601">Paul Lukas Duhr</na></co>
<co c="0"><na f="d/Dumitrescu:Roman" pid="96/7180">Roman Dumitrescu</na></co>
<co c="0"><na f="e/Eckhoff:David" pid="42/9851">David Eckhoff</na></co>
<co c="0"><na f="e/Eisermann:Dennis" pid="411/3275">Dennis Eisermann</na></co>
<co c="0"><na f="e/El=Zohairy:Mohamed" pid="89/9541">Mohamed El-Zohairy</na></co>
<co c="0"><na f="e/Engelmann:Felix" pid="176/0554">Felix Engelmann</na></co>
<co c="0"><na f="e/Eppler:Jeremias" pid="362/3342">Jeremias Eppler</na></co>
<co c="0"><na f="e/Erb:Benjamin" pid="117/6830">Benjamin Erb</na></co>
<co c="0" n="2"><na f="e/Ergen:Sinem_Coleri" pid="19/6445">Sinem Coleri Ergen</na><na>Sinem Coleri</na></co>
<co c="0"><na f="f/Fazouane:Marouane" pid="159/0705">Marouane Fazouane</na></co>
<co c="0"><na f="f/Feger:Sebastian_S=" pid="237/9961">Sebastian S. Feger</na></co>
<co c="0"><na f="f/Feiri:Michael" pid="56/2818">Michael Feiri</na></co>
<co c="0"><na f="f/Fiedler:Jessika" pid="220/5342">Jessika Fiedler</na></co>
<co c="1"><na f="f/Fischer:Martin" pid="24/3071">Martin Fischer</na></co>
<co c="0"><na f="f/Flerlage:Florian" pid="27/1713">Florian Flerlage</na></co>
<co c="0"><na f="f/F=ouml=rster:David" pid="164/7340">David F&#246;rster</na></co>
<co c="0"><na f="f/Francillon:Aur=eacute=lien" pid="88/3343">Aur&#233;lien Francillon</na></co>
<co c="0"><na f="f/Frank_0001:Matthias" pid="50/6903-1">Matthias Frank 0001</na></co>
<co c="0"><na f="f/Freudiger:Julien" pid="43/5273">Julien Freudiger</na></co>
<co c="0" n="2"><na f="f/Freytag:Johann=Christoph" pid="f/JCFreytag">Johann-Christoph Freytag</na><na>Johann Christoph Freytag</na></co>
<co c="0"><na f="f/Friedman:Arik" pid="41/5132">Arik Friedman</na></co>
<co c="1"><na f="g/Ganguli:Leena" pid="36/6009">Leena Ganguli</na></co>
<co c="0"><na f="g/Garlichs:Keno" pid="216/6760">Keno Garlichs</na></co>
<co c="0"><na f="g/Geiss:Alfred" pid="47/863">Alfred Geiss</na></co>
<co c="0"><na f="g/Gelardi:Gabriele" pid="396/0847">Gabriele Gelardi</na></co>
<co c="0"><na f="g/Ge=szlig=ler:Sascha" pid="55/6909">Sascha Ge&#223;ler</na></co>
<co c="0"><na f="g/Ghosh_0005:Shreya" pid="133/4864-5">Shreya Ghosh 0005</na></co>
<co c="0"><na f="g/Giehl:Alexander" pid="223/3060">Alexander Giehl</na></co>
<co c="0"><na f="g/Gierl:Mona" pid="329/1109">Mona Gierl</na></co>
<co c="0"><na f="g/Glaser:Florian" pid="147/4590">Florian Glaser</na></co>
<co c="0"><na f="g/God:Ralf" pid="132/5749">Ralf God</na></co>
<co c="0"><na f="g/Gomez:Kevin" pid="118/8960">Kevin Gomez</na></co>
<co c="0"><na f="g/Goz=aacute=lvez:Javier" pid="17/1861">Javier Goz&#225;lvez</na></co>
<co c="0"><na f="g/Gratz:Anne" pid="227/6503">Anne Gratz</na></co>
<co c="0"><na f="g/Griebel:Thomas" pid="239/6024">Thomas Griebel</na></co>
<co c="0"><na f="g/Gupta_0002:Akash" pid="142/5277-2">Akash Gupta 0002</na></co>
<co c="0"><na f="g/G=uuml=rtler:Julian" pid="157/2921">Julian G&#252;rtler</na></co>
<co c="0"><na f="h/H=auml=berle:Marco" pid="239/5155">Marco H&#228;berle</na></co>
<co c="0"><na f="h/Habiger:Gerhard" pid="183/5211">Gerhard Habiger</na></co>
<co c="0"><na f="h/Hadziosmanovic:Dina" pid="46/8412">Dina Hadziosmanovic</na></co>
<co c="0"><na f="h/Halter:Maya" pid="257/8253">Maya Halter</na></co>
<co c="0"><na f="h/Hauck:Franz_J=" pid="h/FranzJHauck">Franz J. Hauck</na></co>
<co c="0" n="2"><na f="h/Heijden:Rens_W=_van_der" pid="128/4581">Rens W. van der Heijden</na><na>Rens Wouter van der Heijden</na></co>
<co c="0" n="2"><na f="h/Heijenk:Geert" pid="h/GeertJHeijenk">Geert Heijenk</na><na>Geert J. Heijenk</na></co>
<co c="0"><na f="h/Heinl:Michael_P=" pid="252/4801">Michael P. Heinl</na></co>
<co c="0"><na f="h/Held:Albert" pid="33/3910">Albert Held</na></co>
<co c="0"><na f="h/Herbert:Cornelia" pid="137/4024">Cornelia Herbert</na></co>
<co c="0"><na f="h/Hermann:Artur" pid="348/8380">Artur Hermann</na></co>
<co c="0"><na f="h/Higuchi:Takamasa" pid="36/9583">Takamasa Higuchi</na></co>
<co c="0"><na f="h/Hiller:Matthias" pid="118/1329">Matthias Hiller</na></co>
<co c="0"><na f="h/Hipp:Markus" pid="51/9246">Markus Hipp</na></co>
<co c="0"><na f="h/H=ouml=fer:Christina" pid="140/6383">Christina H&#246;fer</na></co>
<co c="0"><na f="h/Holczer:Tam=aacute=s" pid="00/1005">Tam&#225;s Holczer</na></co>
<co c="0"><na f="h/Hollick:Matthias" pid="95/1816">Matthias Hollick</na></co>
<co c="0"><na f="h/Holtmann:J=ouml=rg" pid="62/8291">J&#246;rg Holtmann</na></co>
<co c="0"><na f="h/H=ouml=rmann:Max" pid="401/5136">Max H&#246;rmann</na></co>
<co c="0"><na f="h/Hubaux:Jean=Pierre" pid="h/JPHubaux">Jean-Pierre Hubaux</na></co>
<co c="0"><na f="h/Hunt:Alexander" pid="202/9544">Alexander Hunt</na></co>
<co c="0"><na f="i/Illmann:Torsten" pid="22/3925">Torsten Illmann</na></co>
<co c="0"><na f="j/Japs:Sergej" pid="276/2203">Sergej Japs</na></co>
<co c="0"><na f="j/Jemaa:In=egrave=s_Ben" pid="61/8276">In&#232;s Ben Jemaa</na></co>
<co c="0"><na f="j/Joosen:Wouter" pid="13/86">Wouter Joosen</na></co>
<co c="0"><na f="k/Kaiser:Arnaud" pid="98/7910">Arnaud Kaiser</na></co>
<co c="0"><na f="k/Kaiser:Lydia" pid="224/5794">Lydia Kaiser</na></co>
<co c="0"><na f="k/Kamel:Joseph" pid="223/8350">Joseph Kamel</na></co>
<co c="0"><na f="k/Karolus:Jakob" pid="161/5379">Jakob Karolus</na></co>
<co c="0"><na f="k/Keppler:Moritz" pid="74/505">Moritz Keppler</na></co>
<co c="0"><na f="k/Kiening:Alexander" pid="131/6225">Alexander Kiening</na></co>
<co c="0"><na f="k/Kleber:Stephan" pid="161/5354">Stephan Kleber</na></co>
<co c="0"><na f="k/Klenk:Andreas" pid="27/4830">Andreas Klenk</na></co>
<co c="0"><na f="k/Klingler:Florian" pid="133/5068">Florian Klingler</na></co>
<co c="0"><na f="k/Kluge:Jonas" pid="120/4865">Jonas Kluge</na></co>
<co c="0"><na f="k/Knapik:Peter" pid="124/7033">Peter Knapik</na></co>
<co c="0"><na f="k/Kocyigit:Emre" pid="290/1098">Emre Kocyigit</na></co>
<co c="0"><na f="k/K=ouml=nig:Hartmut" pid="k/HartmutKonig">Hartmut K&#246;nig</na></co>
<co c="0"><na f="k/K=ouml=nings:Bastian" pid="35/8087">Bastian K&#246;nings</na></co>
<co c="0"><na f="k/Kopp:Henning" pid="159/0709">Henning Kopp</na></co>
<co c="0"><na f="k/Kost:Martin" pid="15/4489">Martin Kost</na></co>
<co c="0"><na f="k/Kraft:Robin" pid="145/8309">Robin Kraft</na></co>
<co c="0"><na f="k/Kravets:Robin" pid="60/3388">Robin Kravets</na></co>
<co c="0"><na f="k/Kriesten:Reiner" pid="167/3305">Reiner Kriesten</na></co>
<co c="0"><na f="k/Kr=ouml=ll:Tobias" pid="302/8998">Tobias Kr&#246;ll</na></co>
<co c="0"><na f="k/Krontiris:Ioannis" pid="32/1264">Ioannis Krontiris</na></co>
<co c="0"><na f="k/Krueger:Tilman" pid="92/6578">Tilman Krueger</na></co>
<co c="0"><na f="k/Kung:Antonio" pid="92/1639">Antonio Kung</na></co>
<co c="0"><na f="l/Labiod:Houda" pid="18/5416">Houda Labiod</na></co>
<co c="0"><na f="l/Lange:Kristin" pid="163/0433">Kristin Lange</na></co>
<co c="0"><na f="l/Laskov:Pavel" pid="63/4310">Pavel Laskov</na></co>
<co c="0"><na f="l/Laugier:Christian" pid="95/5971">Christian Laugier</na></co>
<co c="1"><na f="l/Lawrence:Elaine" pid="04/5405">Elaine Lawrence</na></co>
<co c="0" n="2"><na f="l/Lef=egrave=vre:St=eacute=phanie" pid="36/8116">St&#233;phanie Lef&#232;vre</na><na>St&#233;phanie Lefevre</na></co>
<co c="0"><na f="l/Leinm=uuml=ller:Tim" pid="54/4411">Tim Leinm&#252;ller</na></co>
<co c="0"><na f="l/Lenzini:Gabriele" pid="78/5724">Gabriele Lenzini</na></co>
<co c="1"><na f="l/Lim:Yen_Yang" pid="63/148">Yen Yang Lim</na></co>
<co c="0"><na f="l/L=ouml=hr:Hans" pid="02/2549">Hans L&#246;hr</na></co>
<co c="0"><na f="l/Lucena:Anderson_Ramon_Ferraz_de" pid="355/0336">Anderson Ramon Ferraz de Lucena</na></co>
<co c="0"><na f="l/L=uuml=ders:Stefan" pid="231/4172">Stefan L&#252;ders</na></co>
<co c="0"><na f="l/Lukaseder:Thomas" pid="185/1695">Thomas Lukaseder</na></co>
<co c="0"><na f="m/Ma:Zhendong" pid="44/6134">Zhendong Ma</na></co>
<co c="0"><na f="m/Mahmoud:Omnia" pid="242/4490">Omnia Mahmoud</na></co>
<co c="0"><na f="m/Maier:J=ouml=rn" pid="14/2907">J&#246;rn Maier</na></co>
<co c="0"><na f="m/Maih=ouml=fer:Christian" pid="05/1911">Christian Maih&#246;fer</na></co>
<co c="0"><na f="m/Maile:Lisa" pid="218/5772">Lisa Maile</na></co>
<co c="0"><na f="m/Margan:Domagoj" pid="146/0411">Domagoj Margan</na></co>
<co c="1"><na f="m/Martin:Don" pid="43/2877">Don Martin</na></co>
<co c="0"><na f="m/Marx:Marcus" pid="401/4258">Marcus Marx</na></co>
<co c="0"><na f="m/Matousek:Matthias" pid="165/8342">Matthias Matousek</na></co>
<co c="0"><na f="m/Mauthofer:Sebastian" pid="124/7172">Sebastian Mauthofer</na></co>
<co c="0"><na f="m/Mei=szlig=ner:Echo" pid="392/0539">Echo Mei&#223;ner</na></co>
<co c="0"><na f="m/Menth:Michael" pid="80/2984">Michael Menth</na></co>
<co c="1"><na f="m/Messina:Marco" pid="65/6118">Marco Messina</na></co>
<co c="0"><na f="m/M=eacute=tayer:Daniel_Le" pid="73/4987">Daniel Le M&#233;tayer</na></co>
<co c="0"><na f="m/Millar:Jason" pid="164/1098">Jason Millar</na></co>
<co c="0"><na f="m/Miroshkin:Oleksandr" pid="208/8365">Oleksandr Miroshkin</na></co>
<co c="0"><na f="m/Mittag:Jens" pid="41/6797">Jens Mittag</na></co>
<co c="0"><na f="m/M=ouml=dinger:David" pid="175/1346">David M&#246;dinger</na></co>
<co c="0"><na f="m/Montag:Christian" pid="25/8259">Christian Montag</na></co>
<co c="0"><na f="m/Moser:Steffen" pid="118/0634">Steffen Moser</na></co>
<co c="0"><na f="m/Muench:Marius" pid="185/2352">Marius Muench</na></co>
<co c="0"><na f="m/M=uuml=ller:Johannes=Christian" pid="283/6790">Johannes-Christian M&#252;ller</na></co>
<co c="0"><na f="m/M=uuml=ller:Lukas" pid="169/4738">Lukas M&#252;ller</na></co>
<co c="0"><na f="m/M=uuml=ller:Maik" pid="16/11446">Maik M&#252;ller</na></co>
<co c="0"><na f="m/M=uuml=ter:Michael" pid="66/11147">Michael M&#252;ter</na></co>
<co c="0" n="2"><na f="n/Nagler=Ihlein:J=uuml=rgen" pid="n/JurgenNagler">J&#252;rgen Nagler-Ihlein</na><na>J&#252;rgen Nagler</na></co>
<co c="0"><na f="n/Neubert:Andreas" pid="86/261">Andreas Neubert</na></co>
<co c="0"><na f="n/N=ouml=lscher:Henrik_Ferdinand" pid="205/2063">Henrik Ferdinand N&#246;lscher</na></co>
<co c="0"><na f="o/Ogger:Ferdinand" pid="221/4125">Ferdinand Ogger</na></co>
<co c="0"><na f="o/Oser:Pascal" pid="231/4158">Pascal Oser</na></co>
<co c="0"><na f="o/Ott:J=ouml=rg" pid="57/6706">J&#246;rg Ott</na></co>
<co c="0"><na f="o/Ouattara:Koffi_Ismael" pid="388/6179">Koffi Ismael Ouattara</na></co>
<co c="0"><na f="p/Palm:Tim" pid="411/3258">Tim Palm</na></co>
<co c="0" n="2"><na f="p/Papadimitratos:Panagiotis" pid="p/PanagiotisPapadimitratos">Panagiotis Papadimitratos</na><na>Panos Papadimitratos</na></co>
<co c="0"><na f="p/Paverd:Andrew" pid="30/9784">Andrew Paverd</na></co>
<co c="0"><na f="p/Peter_0001:Andreas" pid="43/8243">Andreas Peter 0001</na></co>
<co c="0"><na f="p/Petit:Jonathan" pid="33/7861">Jonathan Petit</na></co>
<co c="0"><na f="p/Petrovska:Ana" pid="183/8461">Ana Petrovska</na></co>
<co c="0"><na f="p/Pfattheicher:Stefan" pid="189/1772">Stefan Pfattheicher</na></co>
<co c="0"><na f="p/Pielage:Rolf" pid="164/8830">Rolf Pielage</na></co>
<co c="0"><na f="p/Pietron:Jakob" pid="199/2423">Jakob Pietron</na></co>
<co c="0"><na f="p/Pietzuch:Peter_R=" pid="45/4887">Peter R. Pietzuch</na></co>
<co c="3"><na f="p/Pinto:Michele" pid="160/4339">Michele Pinto</na></co>
<co c="0"><na f="p/Plaga:Sven" pid="208/8361">Sven Plaga</na></co>
<co c="0"><na f="p/P=ouml=llny:Oliver" pid="282/9055">Oliver P&#246;llny</na></co>
<co c="0"><na f="p/Preussner:Felix" pid="180/3916">Felix Preussner</na></co>
<co c="0"><na f="r/Raya:Maxim" pid="50/5973">Maxim Raya</na></co>
<co c="0"><na f="r/Ribhegge:Stefan" pid="68/6109">Stefan Ribhegge</na></co>
<co c="0"><na f="r/Rikanovic:Igor" pid="92/5389">Igor Rikanovic</na></co>
<co c="0"><na f="r/Rofail:Mark" pid="262/2113">Mark Rofail</na></co>
<co c="0"><na f="s/Sax:Eric" pid="12/3602">Eric Sax</na></co>
<co c="0"><na f="s/Sch=auml=fer:G=uuml=nter" pid="64/4710">G&#252;nter Sch&#228;fer</na></co>
<co c="0"><na f="s/Schaub:Florian" pid="08/7562">Florian Schaub</na></co>
<co c="0"><na f="s/Scheuermann_0001:Bj=ouml=rn" pid="15/503-1">Bj&#246;rn Scheuermann 0001</na></co>
<co c="0"><na f="s/Schlott:Stefan" pid="67/5126">Stefan Schlott</na></co>
<co c="0"><na f="s/Schmidt_0001:Albrecht" pid="s/AlbrechtSchmidt1">Albrecht Schmidt 0001</na></co>
<co c="0"><na f="s/Schmidt:Robert_Karl" pid="57/9852">Robert Karl Schmidt</na></co>
<co c="0"><na f="s/Schmitt:Helena_S=" pid="288/8012">Helena S. Schmitt</na></co>
<co c="0"><na f="s/Schneider:Matthias" pid="79/2065">Matthias Schneider</na></co>
<co c="0"><na f="s/Schneider:Steve_A=" pid="s/SASchneider">Steve A. Schneider</na></co>
<co c="0"><na f="s/Schoch:Elmar" pid="27/5992">Elmar Schoch</na></co>
<co c="0"><na f="s/Sch=ouml=nig:Franziska" pid="207/8394">Franziska Sch&#246;nig</na></co>
<co c="2"><na f="s/Schwinke:Steve" pid="349/4543">Steve Schwinke</na></co>
<co c="0"><na f="s/Segata:Michele" pid="54/10194">Michele Segata</na></co>
<co c="2"><na f="s/Sikdar_0001:Biplab" pid="s/BiplabSikdar">Biplab Sikdar 0001</na></co>
<co c="0"><na f="s/Sindermann:Cornelia" pid="273/3806">Cornelia Sindermann</na></co>
<co c="0"><na f="s/Sion:Laurens" pid="166/1069">Laurens Sion</na></co>
<co c="0"><na f="s/Slomka:Frank" pid="60/4647">Frank Slomka</na></co>
<co c="0"><na f="s/Sommer_0001:Christoph" pid="07/5352-1">Christoph Sommer 0001</na></co>
<co c="0"><na f="s/Sommer:Florian" pid="176/2333">Florian Sommer</na></co>
<co c="0"><na f="s/Sommer:Robin" pid="s/RobinSommer">Robin Sommer</na></co>
<co c="0"><na f="s/Spagnuelo:Dayana" pid="149/7626">Dayana Spagnuelo</na></co>
<co c="0"><na f="s/Speichert:Jan_Philip" pid="304/2560">Jan Philip Speichert</na></co>
<co c="3"><na f="s/Spenrath:Felix" pid="129/7315">Felix Spenrath</na></co>
<co c="0"><na f="s/Steer:Benjamin_A=" pid="201/4815">Benjamin A. Steer</na></co>
<co c="0"><na f="s/Stehle:Christian" pid="209/2006">Christian Stehle</na></co>
<co c="0"><na f="s/Steinert:Benjamin" pid="325/8765">Benjamin Steinert</na></co>
<co c="0"><na f="s/Stijohann:Jan" pid="224/2488">Jan Stijohann</na></co>
<co c="0"><na f="s/Stiller:Burkhard" pid="00/4292">Burkhard Stiller</na></co>
<co c="0"><na f="s/St=ouml=lzle:Kevin" pid="225/4693">Kevin St&#246;lzle</na></co>
<co c="0"><na f="s/Stute:Milan" pid="183/6724">Milan Stute</na></co>
<co c="0"><na f="t/Thong_0001:Ta_Vinh" pid="79/7661-1">Ta Vinh Thong 0001</na></co>
<co c="0"><na f="t/Th=uuml=m:Thomas" pid="04/7056">Thomas Th&#252;m</na></co>
<co c="0"><na f="t/Tichy:Matthias" pid="52/733">Matthias Tichy</na></co>
<co c="0"><na f="t/Tonguz:Ozan_K=" pid="96/1437">Ozan K. Tonguz</na></co>
<co c="0"><na f="t/Traud:Alexander" pid="43/694">Alexander Traud</na></co>
<co c="0"><na f="t/Treharne:Helen" pid="37/5761">Helen Treharne</na></co>
<co c="0"><na f="t/Trkulja:Natasa" pid="277/5192">Natasa Trkulja</na></co>
<co c="0"><na f="t/Tsai:Michael" pid="127/6641">Michael Tsai</na></co>
<co c="1"><na f="t/Tsang:Tommy_Kwong=Kin" pid="63/6459">Tommy Kwong-Kin Tsang</na></co>
<co c="0"><na f="u/Unterstein:Florian" pid="165/8330">Florian Unterstein</na></co>
<co c="0"><na f="u/Urien:Pascal" pid="66/4100">Pascal Urien</na></co>
<co c="0"><na f="v/Valdes:Alfonso" pid="58/185">Alfonso Valdes</na></co>
<co c="0"><na f="w/Wachter:Patrick" pid="334/2176">Patrick Wachter</na></co>
<co c="0"><na f="w/Wagner:Denis" pid="209/2441">Denis Wagner</na></co>
<co c="0"><na f="w/Waldschmidt:Christian" pid="131/9706">Christian Waldschmidt</na></co>
<co c="0"><na f="w/Weber_0001:Michael" pid="02/4248-1">Michael Weber 0001</na></co>
<co c="0"><na f="w/Weimerskirch:Andr=eacute=" pid="66/788">Andr&#233; Weimerskirch</na></co>
<co c="0"><na f="w/Weinhardt:Christof" pid="24/2155">Christof Weinhardt</na></co>
<co c="0"><na f="w/Wesemeyer:Stephan" pid="18/5892">Stephan Wesemeyer</na></co>
<co c="0"><na f="w/Whitefield:Jorden" pid="177/9145">Jorden Whitefield</na></co>
<co c="0"><na f="w/Wiedermann:Norbert" pid="121/4945">Norbert Wiedermann</na></co>
<co c="0"><na f="w/Wiedersheim:Bj=ouml=rn" pid="96/4047">Bj&#246;rn Wiedersheim</na></co>
<co c="0"><na f="w/Willecke:Alexander" pid="222/8113">Alexander Willecke</na></co>
<co c="0"><na f="w/Williams:Ian" pid="14/2900">Ian Williams</na></co>
<co c="0"><na f="w/Wischhof:Lars" pid="24/641">Lars Wischhof</na></co>
<co c="0"><na f="w/Wolf:Fabian" pid="23/3308">Fabian Wolf</na></co>
<co c="0"><na f="w/Wolf:Lars_C=" pid="w/LarsCWolf">Lars C. Wolf</na></co>
<co c="0"><na f="w/Wolf:Michael" pid="69/1015">Michael Wolf</na></co>
<co c="3"><na f="w/Wollmann:Philipp" pid="160/4351">Philipp Wollmann</na></co>
<co c="0"><na f="w/Wozniak:Pawel_W=" pid="36/11536">Pawel W. Wozniak</na></co>
<co c="0"><na f="w/Wuyts:Kim" pid="23/6789">Kim Wuyts</na></co>
<co c="0"><na f="y/Yassin:Mahmoud" pid="223/8292">Mahmoud Yassin</na></co>
<co c="0"><na f="z/Zambon:Emmanuele" pid="z/EmmanueleZambon">Emmanuele Zambon</na></co>
<co c="0"><na f="z/Zannone:Nicola" pid="93/4627">Nicola Zannone</na></co>
<co c="1"><na f="z/Z=aacute=ruba:Gergely_V=" pid="39/3121">Gergely V. Z&#225;ruba</na></co>
<co c="2"><na f="z/Zhang:Tao" pid="15/4777">Tao Zhang</na></co>
<co c="0"><na f="z/Zibuschka:Jan" pid="68/2288">Jan Zibuschka</na></co>
<co c="0"><na f="z/Zucchelli:Michele" pid="242/1853">Michele Zucchelli</na></co>
</coauthors>
</dblpperson>

