Internet of things in the 5G era: Enablers, architecture, and business models MR Palattella, M Dohler, A Grieco, G Rizzo, J Torsner, T Engel, L Ladid IEEE journal on selected areas in communications 34 (3), 510-527, 2016 | 1707 | 2016 |
Website fingerprinting in onion routing based anonymization networks A Panchenko, L Niessen, A Zinnen, T Engel Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011 | 636 | 2011 |
Website Fingerprinting at Internet Scale. A Panchenko, F Lanze, J Pennekamp, T Engel, A Zinnen, M Henze, ... NDSS, 2016 | 562 | 2016 |
Driver behavior profiling using smartphones: A low-cost platform for driver monitoring G Castignani, T Derrmann, R Frank, T Engel IEEE Intelligent transportation systems magazine 7 (1), 91-102, 2015 | 394 | 2015 |
Luxembourg sumo traffic (lust) scenario: 24 hours of mobility for vehicular networking research L Codeca, R Frank, T Engel 2015 ieee vehicular networking conference (vnc), 1-8, 2015 | 344 | 2015 |
On optimal scheduling in duty-cycled industrial IoT applications using IEEE802. 15.4 e TSCH MR Palattella, N Accettura, LA Grieco, G Boggia, M Dohler, T Engel IEEE Sensors Journal 13 (10), 3655-3666, 2013 | 312 | 2013 |
Luxembourg sumo traffic (lust) scenario: Traffic demand evaluation L Codecá, R Frank, S Faye, T Engel IEEE Intelligent Transportation Systems Magazine 9 (2), 52-63, 2017 | 240 | 2017 |
PhishStorm: Detecting phishing with streaming analytics S Marchal, J François, R State, T Engel IEEE Transactions on Network and Service Management 11 (4), 458-471, 2014 | 185 | 2014 |
BotTrack: tracking botnets using NetFlow and PageRank J François, S Wang, R State, T Engel NETWORKING 2011: 10th International IFIP TC 6 Networking Conference …, 2011 | 163 | 2011 |
A big data architecture for large scale security monitoring S Marchal, X Jiang, R State, T Engel 2014 IEEE International Congress on Big Data, 56-63, 2014 | 161 | 2014 |
On-the-fly bandwidth reservation for 6TiSCH wireless industrial networks MR Palattella, T Watteyne, Q Wang, K Muraoka, N Accettura, D Dujovne, ... IEEE Sensors Journal 16 (2), 550-560, 2015 | 155 | 2015 |
Botcloud: Detecting botnets using mapreduce J Francois, S Wang, W Bronzi, R State, T Engel 2011 IEEE international workshop on information forensics and security, 1-6, 2011 | 121 | 2011 |
6TiSCH centralized scheduling: When SDN meet IoT P Thubert, MR Palattella, T Engel 2015 IEEE conference on standards for communications and networking (CSCN …, 2015 | 104 | 2015 |
Bluetooth low energy: An alternative technology for VANET applications R Frank, W Bronzi, G Castignani, T Engel 2014 11th annual conference on wireless on-demand network systems and …, 2014 | 100 | 2014 |
Trafficsliver: Fighting website fingerprinting attacks with traffic splitting W De la Cadena, A Mitseva, J Hiller, J Pennekamp, S Reuter, J Filter, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 96 | 2020 |
Machine learning approach for IP-flow record anomaly detection C Wagner, J François, T Engel NETWORKING 2011, 28-39, 2011 | 95 | 2011 |
Iot device fingerprinting: Machine learning based encrypted traffic analysis N Msadek, R Soua, T Engel 2019 IEEE wireless communications and networking conference (WCNC), 1-8, 2019 | 91 | 2019 |
Towards a taxonomy of autonomous vehicle handover situations R McCall, F McGee, A Meschtscherjakov, N Louveton, T Engel Proceedings of the 8th International Conference on automotive user …, 2016 | 87 | 2016 |
Using opcode-sequences to detect malicious Android applications Q Jerome, K Allix, R State, T Engel 2014 IEEE international conference on communications (ICC), 914-919, 2014 | 87 | 2014 |
A taxonomy of autonomous vehicle handover situations R McCall, F McGee, A Mirnig, A Meschtscherjakov, N Louveton, T Engel, ... Transportation research part A: policy and practice 124, 507-522, 2019 | 85 | 2019 |