Thomas Engel
Thomas Engel
Verified email at uni.lu
TitleCited byYear
Internet of things in the 5G era: Enablers, architecture, and business models
MR Palattella, M Dohler, A Grieco, G Rizzo, J Torsner, T Engel, L Ladid
IEEE Journal on Selected Areas in Communications 34 (3), 510-527, 2016
2592016
Website fingerprinting in onion routing based anonymization networks
A Panchenko, L Niessen, A Zinnen, T Engel
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
2402011
On optimal scheduling in duty-cycled industrial IoT applications using IEEE802. 15.4 e TSCH
MR Palattella, N Accettura, LA Grieco, G Boggia, M Dohler, T Engel
IEEE Sensors Journal 13 (10), 3655-3666, 2013
1252013
BotTrack: tracking botnets using NetFlow and PageRank
J François, S Wang, T Engel
International Conference on Research in Networking, 1-14, 2011
1062011
Botcloud: Detecting botnets using mapreduce
J Francois, S Wang, W Bronzi, T Engel
Information Forensics and Security (WIFS), 2011 IEEE International Workshop …, 2011
782011
Driver behavior profiling using smartphones: A low-cost platform for driver monitoring
G Castignani, T Derrmann, R Frank, T Engel
IEEE Intelligent Transportation Systems Magazine 7 (1), 91-102, 2015
752015
Website Fingerprinting at Internet Scale.
A Panchenko, F Lanze, J Pennekamp, T Engel, A Zinnen, M Henze, ...
NDSS, 2016
642016
Luxembourg sumo traffic (lust) scenario: 24 hours of mobility for vehicular networking research
L Codeca, R Frank, T Engel
Proceedings of the 7th IEEE Vehicular Networking Conference, 1-8, 2015
622015
A big data architecture for large scale security monitoring
S Marchal, X Jiang, T Engel
Proceedings of the 3rd IEEE Congress on Big Data, 56-63, 2014
522014
Bluetooth Low Energy: An alternative technology for VANET applications
R Frank, W Bronzi, G Castignani, T Engel
Wireless On-demand Network Systems and Services (WONS), 2014 11th Annual …, 2014
402014
Phishstorm: Detecting phishing with streaming analytics
S Marchal, J François, T Engel
IEEE Transactions on Network and Service Management 11 (4), 458-471, 2014
362014
CCN traffic optimization for IoT
J François, T Cholez, T Engel
Network of the Future (NOF), 2013 Fourth International Conference on the, 1-5, 2013
362013
Self adaptive high interaction honeypots driven by game theory
G Wagener, A Dulaunoy, T Engel
Symposium on Self-Stabilizing Systems, 741-755, 2009
352009
On-the-fly bandwidth reservation for 6TiSCH wireless industrial networks
MR Palattella, T Watteyne, Q Wang, K Muraoka, N Accettura, D Dujovne, ...
IEEE Sensors Journal 16 (2), 550-560, 2016
342016
Model synchronization based on triple graph grammars: correctness, completeness and invertibility
F Hermann, H Ehrig, F Orejas, K Czarnecki, Z Diskin, Y Xiong, ...
Software & Systems Modeling 14 (1), 241-269, 2015
342015
Collusion detection for grid computing
E Staab, T Engel
Cluster Computing and the Grid, 2009. CCGRID'09. 9th IEEE/ACM International …, 2009
342009
6tisch wireless industrial networks: Determinism meets ipv6
MR Palattella, P Thubert, X Vilajosana, T Watteyne, Q Wang, T Engel
Internet of Things, 111-141, 2014
332014
Proactive discovery of phishing related domain names
S Marchal, J François, T Engel
International Workshop on Recent Advances in Intrusion Detection, 190-209, 2012
322012
Runtime monitoring and dynamic reconfiguration for intrusion detection systems
M Rehák, E Staab, V Fusenig, M Pěchouček, M Grill, J Stiborek, K Bartoš, ...
International Workshop on Recent Advances in Intrusion Detection, 61-80, 2009
322009
Topology dynamics and routing for predictable mobile networks
D Fischer, D Basin, T Engel
Network Protocols, 2008. ICNP 2008. IEEE International Conference on, 207-217, 2008
302008
The system can't perform the operation now. Try again later.
Articles 1–20