Georg Carle
Cited by
Cited by
DTLS based security and two-way authentication for the Internet of Things
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
Ad Hoc Networks 11 (8), 2710-2723, 2013
Traffic anomaly detection using k-means clustering
G Münz, S Li, G Carle
GI/ITG Workshop MMBnet, 13-14, 2007
Moongen: A scriptable high-speed packet generator
P Emmerich, S Gallenmüller, D Raumer, F Wohlfart, G Carle
Proceedings of the 2015 Internet Measurement Conference, 275-287, 2015
Survey of error recovery techniques for IP-based audio-visual multicast applications
G Carle, EW Biersack
IEEE Network 11 (6), 24-36, 1997
Framework model for packet loss metrics based on loss runlengths
HA Sanneck, G Carle
Multimedia Computing and Networking 2000 3969, 177-187, 1999
The SSL landscape: a thorough analysis of the x. 509 PKI using active and passive measurements
R Holz, L Braun, N Kammenhuber, G Carle
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
37th Annual IEEE Conference on Local Computer Networks-Workshops, 956-963, 2012
Comparison of frameworks for high-performance packet IO
S Gallenmüller, P Emmerich, F Wohlfart, D Raumer, G Carle
2015 ACM/IEEE Symposium on Architectures for Networking and Communications …, 2015
How bad is reliable multicast without local recovery?
J Nonnenmacher, M Lacher, M Jung, EW Biersack, G Carle
Proceedings. IEEE INFOCOM'98, the Conference on Computer Communications …, 1998
Performance characteristics of virtual switching
P Emmerich, D Raumer, F Wohlfart, G Carle
2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), 120-125, 2014
Comparing and improving current packet capturing solutions based on commodity hardware
L Braun, A Didebulidze, N Kammenhuber, G Carle
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 206-217, 2010
Mission accomplished? HTTPS security after DigiNotar
J Amann, O Gasser, Q Scheitle, L Brent, G Carle, R Holz
Proceedings of the 2017 Internet Measurement Conference, 325-340, 2017
Real-time analysis of flow data for network attack detection
G Munz, G Carle
2007 10th IFIP/IEEE International Symposium on Integrated Network Management …, 2007
Policy-based accounting
T Zseby, S Zander, G Carle
Internet RFCs, ISSN 2070-1721, 2002
X. 509 forensics: Detecting and localising the SSL/TLS men-in-the-middle
R Holz, T Riedmaier, N Kammenhuber, G Carle
european symposium on research in computer security, 217-234, 2012
Cloud computing for the masses
M Fouquet, H Niedermayer, G Carle
Proceedings of the 1st ACM workshop on User-provided networking: challenges …, 2009
Requirements for {IP} Flow Information Export
J Quitteck, T Zseby, S Zander, G Carle, B Claise
Towards a deeper understanding of TCP BBR congestion control
D Scholz, B Jaeger, L Schwaighofer, D Raumer, F Geyer, G Carle
2018 IFIP networking conference (IFIP networking) and workshops, 1-9, 2018
Graph coloring based physical-cell-ID assignment for LTE networks
T Bandh, G Carle, H Sanneck
Proceedings of the 2009 international conference on wireless communications …, 2009
Indoor positioning via three different RF technologies
P Vorst, J Sommer, C Hoene, P Schneider, C Weiss, T Schairer, ...
4th European Workshop on RFID Systems and Technologies, 1-10, 2008
The system can't perform the operation now. Try again later.
Articles 1–20