Author of the publication

Analyzing and modeling the latency and jitter behavior of mixed industrial TSN and DetNet networks

, , , , , , and . CoNEXT '22 : Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, page 91-109. New York, Association for Computing Machinery, (2022)
DOI: 10.1145/3555050.3569138

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mesh-DHT: A locality-based distributed look-up structure for Wireless Mesh Networks., , , and . ICC, page 653-658. IEEE, (2012)SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services., , , , and . TrustCom, page 525-532. IEEE Computer Society, (2012)SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators., , , , , , , , , and . CoRR, (2013)The Cloud Needs Cross-Layer Data Handling Annotations., , and . IEEE Symposium on Security and Privacy Workshops, page 18-22. IEEE Computer Society, (2013)Security Challenges in the IP-based Internet of Things., , , , , and . Wireless Personal Communications, 61 (3): 527-542 (2011)PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing., , , , , , and . ICCCN, page 1-8. IEEE, (2010)Standards-based end-to-end IP security for the Internet of Things., and . ICNP, page 1-3. IEEE Computer Society, (2013)Tailoring end-to-end IP security protocols to the Internet of Things., , , , and . ICNP, page 1-10. IEEE Computer Society, (2013)6LoWPAN fragmentation attacks and mitigation mechanisms., , , , , and . WISEC, page 55-66. ACM, (2013)Establishing mobile ad-hoc networks in 802.11 infrastructure mode., , , and . WiNTECH@MOBICOM, page 89-90. ACM, (2011)