Short paper: Reactive jamming in wireless networks: How realistic is the threat? M Wilhelm, I Martinovic, JB Schmitt, V Lenders Proceedings of the fourth ACM conference on Wireless network security, 47-52, 2011 | 337 | 2011 |
Sensor network calculus–a framework for worst case analysis JB Schmitt, U Roedig International Conference on Distributed Computing in Sensor Systems, 141-154, 2005 | 206 | 2005 |
Node deployment in large wireless sensor networks: coverage, energy consumption, and worst-case delay WY Poe, JB Schmitt Proceedings of the 4th Asian Internet Engineering Conference, 77-84, 2009 | 180 | 2009 |
Who do you sync you are? smartphone fingerprinting via application behaviour T Stöber, M Frank, J Schmitt, I Martinovic Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 173 | 2013 |
Subjective impression of variations in layer encoded videos M Zink, O Künzel, J Schmitt, R Steinmetz Quality of Service—IWQoS 2003: 11th International Workshop Berkeley, CA …, 2003 | 172 | 2003 |
Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks K Jansen, M Schäfer, D Moser, V Lenders, C Pöpper, J Schmitt 2018 IEEE Symposium on Security and Privacy (SP), 1018-1031, 2018 | 152 | 2018 |
Delay bounds under arbitrary multiplexing: When network calculus leaves you in the lurch... JB Schmitt, FA Zdarsky, M Fidler IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1669-1677, 2008 | 152 | 2008 |
On realistic network topologies for simulation O Heckmann, M Piringer, J Schmitt, R Steinmetz Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for …, 2003 | 122 | 2003 |
The disco network calculator: a toolbox for worst case analysis JB Schmitt, FA Zdarsky Proceedings of the 1st international conference on Performance evaluation …, 2006 | 119 | 2006 |
Detection of reactive jamming in DSSS-based wireless communications M Spuhler, D Giustiniano, V Lenders, M Wilhelm, JB Schmitt IEEE Transactions on Wireless Communications 13 (3), 1593-1603, 2014 | 117 | 2014 |
Layer-encoded video in scalable adaptive streaming M Zink, J Schmitt, R Steinmetz IEEE Transactions on Multimedia 7 (1), 75-84, 2005 | 109 | 2005 |
Perspectives on network calculus: no free lunch, but still good value F Ciucu, J Schmitt Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies …, 2012 | 105 | 2012 |
Secure key generation in sensor networks based on frequency-selective channels M Wilhelm, I Martinovic, JB Schmitt IEEE Journal on Selected Areas in Communications 31 (9), 1779-1790, 2013 | 95 | 2013 |
The DiscoDNC v2: A comprehensive tool for deterministic network calculus S Bondorf, JB Schmitt Proceedings of the 8th International Conference on Performance Evaluation …, 2014 | 87 | 2014 |
A comprehensive worst-case calculus for wireless sensor networks with in-network processing JB Schmitt, FA Zdarsky, L Thiele 28th IEEE International Real-Time Systems Symposium (RTSS 2007), 193-202, 2007 | 86 | 2007 |
On the effect of node misbehavior in ad hoc networks M Hollick, J Schmitt, C Seipl, R Steinmetz 2004 IEEE International Conference on Communications (IEEE Cat. No …, 2004 | 82 | 2004 |
Improving performance bounds in feed-forward networks by paying multiplexing only once JB Schmitt, FA Zdarsky, I Martinovic 14th GI/ITG Conference-Measurement, Modelling and Evalutation of Computer …, 2008 | 81 | 2008 |
Handover in mobile communication networks: who is in control anyway? FA Zdarsky, JB Schmitt Proceedings. 30th Euromicro Conference, 2004., 205-212, 2004 | 81 | 2004 |
Jamming for good: a fresh approach to authentic communication in WSNs I Martinovic, P Pichota, JB Schmitt Proceedings of the second ACM conference on Wireless network security, 161-168, 2009 | 78 | 2009 |
Secret keys from entangled sensor motes: implementation and analysis M Wilhelm, I Martinovic, JB Schmitt Proceedings of the third ACM conference on Wireless network security, 139-144, 2010 | 74 | 2010 |