default search action
Utz Roedig
Person information
- affiliation: Lancaster University, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c98]Prathyusha Sagi, Arun Sankar, Utz Roedig:
Detection of Wake Word Jamming. CPSIOTSEC@CCS 2024: 134-141 - [c97]Prathyusha Sagi, Arun Sankar, Utz Roedig:
Adversarial Training to Prevent Wake Word Jamming in Personal Voice Assistants. DCOSS-IoT 2024: 50-57 - [c96]Linh-An Phan, Dirk Pesch, Utz Roedig, Cormac J. Sreenan:
Building a 5G Core Network Testbed: Open-Source Solutions, Lessons Learned, and Research Directions. ICOIN 2024: 641-646 - [c95]Ita Ryan, Utz Roedig, Klaas-Jan Stol:
Training Developers to Code Securely: Theory and Practice. EnCyCriS/SVM 2024: 37-44 - [c94]Gabriela Morillo, Utz Roedig, John Stankovic:
Technology Independent Targeted Interference Detection for Wireless IoT. MeditCom 2024: 44-50 - [c93]Ahmed Khalid, Sean Ahearne, Hemant Kumar Mehta, Utz Roedig, Cormac J. Sreenan:
CATER: A Policy-Based Data Placement Framework for Edge Storage. PDP 2024: 26-34 - [c92]Prathyusha Sagi, Arun Sankar, Utz Roedig:
Personal Voice Assistant Wake Word Jamming. PerCom Workshops 2024: 19-24 - [c91]Piotr Sobonski, Utz Roedig:
Comparison of Industrial Control System Anomaly Detection Methods. RICSS@CCS 2024: 79-85 - 2023
- [c90]Ita Ryan, Utz Roedig, Klaas-Jan Stol:
Unhelpful Assumptions in Software Security Research. CCS 2023: 3460-3474 - [c89]Gabriela Morillo, Utz Roedig, Dirk Pesch:
Detecting Targeted Interference in NB-IoT. DCOSS-IoT 2023: 475-482 - [c88]Vlad Ionescu, Ian J. Wassell, Utz Roedig:
EDT+: Energy Consumption Optimization of NB-IoT. ENSsys@SenSys 2023: 37-43 - [c87]Seán Óg Murphy, Utz Roedig, Cormac J. Sreenan, Ahmed Khalid:
Towards Trust-Based Data Weighting in Machine Learning. ICNP 2023: 1-6 - [c86]Ita Ryan, Utz Roedig, Klaas-Jan Stol:
Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon. ICSE 2023: 1622-1634 - [c85]Ita Ryan, Klaas-Jan Stol, Utz Roedig:
Studying Secure Coding in the Laboratory: Why, What, Where, How, and Who? EnCyCriS@ICSE 2023: 23-30 - [c84]Ita Ryan, Klaas-Jan Stol, Utz Roedig:
The State of Secure Coding Practice: Small Organisations and "Lone, Rogue Coders". EnCyCriS@ICSE 2023: 37-44 - [c83]Linh-An Phan, Dirk Pesch, Utz Roedig, Cormac J. Sreenan:
Demonstration of LAN-type Communication for an Industrial 5G Network. INFOCOM Workshops 2023: 1-2 - [c82]Markus Gallacher, Carlo Alberto Boano, M. S. Arun Sankar, Utz Roedig, Willian T. Lunardi, Michael Baddeley:
Poster Abstract: Towards Speaker Identification on Resource-Constrained Embedded Devices. SenSys 2023: 518-519 - 2022
- [j21]Peng Cheng, Utz Roedig:
Personal Voice Assistant Security and Privacy - A Survey. Proc. IEEE 110(4): 476-507 (2022) - [c81]Vlad Ionescu, Utz Roedig:
NB-IoT Battery Depletion via Malicious Interference. EWSN 2022: 244-249 - [c80]Mohammadreza Azimi, Utz Roedig:
Wake Word Based Room Identification with Personal Voice Assistants. EWSN 2022: 262-267 - [c79]M. S. Arun Sankar, Phillip L. De Leon, Steven Sandoval, Utz Roedig:
Low-Complexity Speech Spoofing Detection using Instantaneous Spectral Features. IWSSIP 2022: 1-4 - [c78]Arun Sankar Muttathu Sivasankara Pillai, Phillip L. De Leon, Utz Roedig:
Detection of Voice Conversion Spoofing Attacks Using Voiced Speech. NordSec 2022: 159-175 - [i3]Arash Shahmansoori, Utz Roedig:
Dynamic Recognition of Speakers for Consent Management by Contrastive Embedding Replay. CoRR abs/2205.08459 (2022) - 2021
- [j20]Ahlam Althobaiti, Anish Jindal, Angelos K. Marnerides, Utz Roedig:
Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods. IEEE Access 9: 159291-159312 (2021) - [j19]Ibrahim Ethem Bagci, Thomas McGrath, Christine Barthelmes, Scott Dean, RamÓn Bernardo Gavito, Robert J. Young, Utz Roedig:
Resonant-Tunnelling Diodes as PUF Building Blocks. IEEE Trans. Emerg. Top. Comput. 9(2): 878-885 (2021) - [c77]Peng Cheng, M. S. Arun Sankar, Ibrahim Ethem Bagci, Utz Roedig:
Adversarial Command Detection Using Parallel Speech Recognition Systems. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 238-255 - [c76]Vlad Ionescu, Utz Roedig:
Battery Depletion Attacks on NB-IoT Devices Using Interference. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 276-295 - [c75]Mohammadreza Azimi, Utz Roedig:
Room Identification with Personal Voice Assistants (Extended Abstract). CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 317-327 - [c74]Ita Ryan, Utz Roedig, Klaas-Jan Stol:
Understanding Developer Security Archetypes. EnCyCriS@ICSE 2021: 37-40 - 2020
- [j18]Peng Cheng, Ibrahim Ethem Bagci, Utz Roedig, Jeff Yan:
SonarSnoop: active acoustic side-channel attacks. Int. J. Inf. Sec. 19(2): 213-228 (2020) - [c73]Pierre Ciholas, Jose Miguel Such, Angelos K. Marnerides, Benjamin Green, Jiajie Zhang, Utz Roedig:
Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode. DIMVA 2020: 67-88 - [c72]Filip Holík, Utz Roedig, Nicholas J. P. Race:
LoRa-SDN: Providing Wireless IoT Edge Network Functions via SDN. MIPRO 2020: 1795-1800
2010 – 2019
- 2019
- [c71]Povilas Marcinkevicius, Ibrahim Ethem Bagci, Nema M. Abdelazim, Christopher S. Woodhead, Robert J. Young, Utz Roedig:
Optically Interrogated Unique Object with Simulation Attack Prevention. DATE 2019: 198-203 - [c70]Martin C. Bor, Angelos K. Marnerides, Andy Molineux, Steve Wattam, Utz Rödig:
Adversarial Machine Learning in Smart Energy Systems. e-Energy 2019: 413-415 - [c69]Jason J. Quinlan, Utz Roedig:
The benefits of Deceit: a Malicious client in a 5G Cellular Network. LANMAN 2019: 1-2 - [c68]Peng Cheng, Ibrahim Ethem Bagci, Jeff Yan, Utz Roedig:
Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants. IEEE Symposium on Security and Privacy Workshops 2019: 144-149 - 2018
- [j17]Alex King, Utz Roedig:
Differentiating Clear Channel Assessment Using Transmit Power Variation. ACM Trans. Sens. Networks 14(2): 15:1-15:28 (2018) - [c67]Peng Cheng, Ibrahim Ethem Bagci, Jeff Yan, Utz Roedig:
Towards Reactive Acoustic Jamming for Personal Voice Assistants. MPS@CCS 2018: 12-17 - [i2]Peng Cheng, Ibrahim Ethem Bagci, Utz Roedig, Jeff Yan:
SonarSnoop: Active Acoustic Side-Channel Attacks. CoRR abs/1808.10250 (2018) - 2017
- [c66]Martin C. Bor, Utz Roedig:
LoRa Transmission Parameter Selection. DCOSS 2017: 27-34 - [c65]Anhtuan Le, Utz Roedig, Awais Rashid:
LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems. ESSoS 2017: 36-52 - [c64]Thiemo Voigt, Martin C. Bor, Utz Roedig, Juan M. Alonso:
Mitigating Inter-network Interference in LoRa Networks. EWSN 2017: 323-328 - [c63]Benjamin Green, Anhtuan Le, Rob Antrobus, Utz Roedig, David Hutchison, Awais Rashid:
Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research. CSET @ USENIX Security Symposium 2017 - 2016
- [j16]Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig, Thiemo Voigt:
Fusion: coalesced confidential storage and communication framework for the IoT. Secur. Commun. Networks 9(15): 2656-2673 (2016) - [c62]Alex King, Utz Roedig:
Poster: RI-MAC Enhancements for Interference Resilience. EWSN 2016: 283-284 - [c61]Alex King, James Hadley, Utz Roedig:
Competition: ContikiMAC with Differentiating Clear Channel Assessment. EWSN 2016: 301-302 - [c60]Martin C. Bor, John Edward Vidler, Utz Roedig:
LoRa for the Internet of Things. EWSN 2016: 361-366 - [c59]James Hadley, Utz Roedig, Yehia Elkhatib:
Using context switches for VM scaling. IPCCC 2016: 1-2 - [c58]Martin C. Bor, Utz Roedig, Thiemo Voigt, Juan M. Alonso:
Do LoRa Low-Power Wide-Area Networks Scale? MSWiM 2016: 59-67 - [i1]Thiemo Voigt, Martin C. Bor, Utz Roedig, Juan M. Alonso:
Mitigating Inter-network Interference in LoRa Networks. CoRR abs/1611.00688 (2016) - 2015
- [c57]Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, Matthias Hollick:
Using Channel State Information for Tamper Detection in the Internet of Things. ACSAC 2015: 131-140 - [c56]Martin C. Bor, Alex King, Utz Roedig:
Lifetime Bounds of Wi-Fi Enabled Sensor Nodes. ANT/SEIT 2015: 1108-1113 - [c55]James Hadley, Yehia El-khatib, Gordon S. Blair, Utz Roedig:
MultiBox: Lightweight Containers for Vendor-Independent Multi-cloud Deployments. EGC 2015: 79-90 - [c54]Alex King, James Brown, John Edward Vidler, Utz Roedig:
Estimating node lifetime in interference environments. LCN Workshops 2015: 796-803 - 2014
- [j15]Mohammad Ghamari, Behzad Momahed Heravi, Utz Roedig, Bahram Honary:
Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols. IET Networks 3(4): 284-292 (2014) - [j14]Shahid Raza, Simon Duquennoy, Joel Höglund, Utz Roedig, Thiemo Voigt:
Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN. Secur. Commun. Networks 7(12): 2654-2668 (2014) - [j13]Wolf-Bastian Pöttner, Hans Seidel, James Brown, Utz Roedig, Lars C. Wolf:
Constructing Schedules for Time-Critical Data Delivery in Wireless Sensor Networks. ACM Trans. Sens. Networks 10(3): 44:1-44:31 (2014) - [c53]Benjamin Green, Daniel Prince, Utz Roedig, Jerry S. Busby, David Hutchison:
Socio-Technical Security Analysis of Industrial Control Systems (ICS). ICS-CSR 2014 - [c52]Carlo Alberto Boano, Marco Zuniga, James Brown, Utz Roedig, Chamath Keppitiyagama, Kay Römer:
TempLab: a testbed infrastructure to study the impact of temperature on wireless sensor networks. IPSN 2014: 95-106 - [c51]James Brown, Utz Roedig, Carlo Alberto Boano, Kay Römer:
Estimating packet reception rate in noisy environments. LCN Workshops 2014: 583-591 - [c50]Carlo Alberto Boano, Kay Römer, James Brown, Utz Roedig, Marco Zuniga:
Demo abstract: A testbed infrastructure to study the impact of temperature on WSN. PerCom Workshops 2014: 154-156 - [c49]Utz Roedig:
Security Mechanisms for Wireless Sensor Networks. SENSORNETS 2014: IS-13 - [c48]Alex King, James Brown, Utz Roedig:
DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence. WiMob 2014: 45-50 - [c47]Ibrahim Ethem Bagci, Utz Roedig, Matthias Schulz, Matthias Hollick:
Short paper: gathering tamper evidence in wi-fi networks based on channel state information. WISEC 2014: 183-188 - 2013
- [j12]Barry Porter, Geoff Coulson, Utz Roedig:
Managing software evolution in large-scale wireless sensor and actuator networks. ACM Trans. Sens. Networks 9(4): 54:1-54:28 (2013) - [j11]Tony O'Donovan, James Brown, Felix Büsching, Alberto Cardoso, José Cecílio, Jose Manuel do Ó, Pedro Furtado, Paulo Gil, Anja Jugel, Wolf-Bastian Pöttner, Utz Roedig, Jorge Sá Silva, Ricardo M. Silva, Cormac J. Sreenan, Vasos Vassiliou, Thiemo Voigt, Lars C. Wolf, Zinon Zinonos:
The GINSENG system for wireless monitoring and control: Design and deployment experiences. ACM Trans. Sens. Networks 10(1): 4:1-4:40 (2013) - [c46]Martin Strohmeier, Ivan Martinovic, Utz Roedig, Karim El Defrawy, Jens B. Schmitt:
Neighborhood watch: On network coding throughput and key sharing. GLOBECOM 2013: 849-854 - [c45]Ibrahim Ethem Bagci, Utz Roedig:
Node Identification Using Clock Skew. REALWSN 2013: 111-123 - [c44]Ibrahim Ethem Bagci, Shahid Raza, T. tony Chung, Utz Roedig, Thiemo Voigt:
Combined secure storage and communication for the Internet of Things. SECON 2013: 523-531 - 2012
- [j10]Petcharat Suriyachai, Utz Roedig, Andrew Scott:
A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks. IEEE Commun. Surv. Tutorials 14(2): 240-264 (2012) - [j9]Mohammad Ghamari, Behzad Momahed Heravi, Utz Roedig, Bahram Honary, Carl A. Pickering:
Improving transmission reliability of low-power medium access control protocols using average diversity combining. IET Wirel. Sens. Syst. 2(4): 377-384 (2012) - [j8]Thiemo Voigt, Utz Roedig, Olaf Landsiedel, Kasun Samarasinghe, Mahesh Bogadi Shankar Prasad:
On the applicability of network coding in wireless sensor networks. SIGBED Rev. 9(3): 46-48 (2012) - [c43]Ibrahim Ethem Bagci, Mohammad Reza Pourmirza, Shahid Raza, Utz Roedig, Thiemo Voigt:
Codo: confidential data storage for wireless sensor networks. MASS Workshops 2012: 1-6 - 2011
- [j7]Tony O'Donovan, Utz Roedig, Jonathan P. Benson, Cormac J. Sreenan:
Self-adaptive framelet-based communication for wireless sensor networks. Comput. Networks 55(11): 2558-2575 (2011) - [j6]Petcharat Suriyachai, Utz Roedig, Andrew Scott, Nicos Gollan, Jens B. Schmitt:
Dimensioning of Time-Critical WSNs - Theory, Implementation and Evaluation. J. Commun. 6(5): 360-369 (2011) - [c42]Barry Porter, Utz Roedig, Geoff Coulson:
Type-safe updating for modular WSN software. DCOSS 2011: 1-8 - [c41]Wolf-Bastian Pöttner, Lars C. Wolf, José Cecílio, Pedro Furtado, Ricardo M. Silva, Jorge Sá Silva, Amâncio Santos, Paulo Gil, Alberto Cardoso, Zinon Zinonos, Jose Manuel do Ó, Ben McCarthy, James Brown, Utz Roedig, Tony O'Donovan, Cormac J. Sreenan, Zhitao He, Thiemo Voigt, Anja Jugel:
WSN evaluation in industrial environments first results and lessons learned. DCOSS 2011: 1-8 - [c40]Shahid Raza, Simon Duquennoy, Antony Chung, Dogan Yazar, Thiemo Voigt, Utz Roedig:
Securing communication in 6LoWPAN with compressed IPsec. DCOSS 2011: 1-8 - [c39]Shahid Raza, Simon Duquennoy, Thiemo Voigt, Utz Roedig:
Demo abstract: Securing communication in 6LoWPAN with compressed IPsec. DCOSS 2011: 1-2 - [c38]James Brown, Ben McCarthy, Utz Roedig, Thiemo Voigt, Cormac J. Sreenan:
BurstProbe: Debugging Time-Critical Data Delivery in Wireless Sensor Networks. EWSN 2011: 195-210 - 2010
- [j5]Carlo Alberto Boano, James Brown, Nicolas Tsiftes, Utz Roedig, Thiemo Voigt:
The Impact of Temperature on Outdoor Industrial WSN Applications. IEEE Trans. Ind. Informatics 6(3): 451-459 (2010) - [c37]Petcharat Suriyachai, James Brown, Utz Roedig:
Time-Critical Data Delivery in Wireless Sensor Networks. DCOSS 2010: 216-229 - [c36]Utz Roedig, Sarah Rutlidge, James Brown, Andrew Scott:
Towards multiprocessor sensor nodes. HotEmNets 2010: 16:1-16:5 - [c35]Antony Chung, Utz Roedig:
Implementation and evaluation of distance-based message authentication. MASS 2010: 519-524 - [c34]Ben McCarthy, Socrates Varakliotis, Christopher Edwards, Utz Roedig:
Deploying Wireless Sensor Networking Technology in a Rescue Team Context. REALWSN 2010: 37-48 - [c33]Paul Alcock, James Brown, Utz Roedig:
Implementation and Evaluation of Combined Positioning and Communication. REALWSN 2010: 126-137 - [c32]Tony O'Donovan, James Brown, Utz Roedig, Cormac J. Sreenan, J. do O, Adam Dunkels, Anja Klein, Jorge Sá Silva, Vasos Vassiliou, Lars C. Wolf:
GINSENG: Performance Control in Wireless Sensor Networks. SECON 2010: 1-3 - [c31]Barry Porter, Utz Roedig, François Taïani, Geoff Coulson:
The Lorien dynamic component based OS. SenSys 2010: 355-356 - [c30]Mohammad Ghamari, Antony Chung, Utz Roedig, Bahram Honary, Carl A. Pickering:
Vehicle-Driver Communication Using Off-the-Shelf Transceivers. VTC Fall 2010: 1-2
2000 – 2009
- 2009
- [c29]Paul Alcock, Utz Roedig, Mike Hazas:
Combining Positioning and Communication Using UWB Transceivers. DCOSS 2009: 329-342 - [c28]Petcharat Suriyachai, Utz Roedig, Andrew Scott:
Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks. PerCom Workshops 2009: 1-6 - [c27]Carlo Alberto Boano, James Brown, Zhitao He, Utz Roedig, Thiemo Voigt:
Low-Power Radio Communication in Industrial Outdoor Deployments: The Impact of Weather Conditions and ATEX-Compliance. SENSAPPEAL 2009: 159-176 - [e1]Utz Roedig, Cormac J. Sreenan:
Wireless Sensor Networks, 6th European Conference, EWSN 2009, Cork, Ireland, February 11-13, 2009. Proceedings. Lecture Notes in Computer Science 5432, Springer 2009, ISBN 978-3-642-00223-6 [contents] - 2008
- [j4]Cormac Duffy, Utz Roedig, John Herbert, Cormac J. Sreenan:
A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems. J. Networks 3(3): 57-70 (2008) - [c26]Jonathan P. Benson, Tony O'Donovan, Utz Roedig, Cormac J. Sreenan:
Opportunistic Aggregation over Duty Cycled Communications in Wireless Sensor Networks. IPSN 2008: 307-318 - [c25]Tony O'Donovan, Jonathan P. Benson, Utz Roedig, Cormac J. Sreenan:
Priority interrupts of Duty Cycled communications in wireless sensor networks. LCN 2008: 732-739 - [c24]Antony Chung, Utz Roedig:
DHB-KEY: An efficient key distribution scheme for wireless sensor networks. MASS 2008: 840-846 - 2007
- [c23]Cormac Duffy, Utz Roedig, John Herbert, Cormac J. Sreenan:
Adding preemption to TinyOS. EmNets 2007: 88-92 - [c22]Cormac Duffy, Utz Roedig, John Herbert, Cormac J. Sreenan:
Improving the Energy Efficiency of the MANTIS Kernel. EWSN 2007: 261-276 - [c21]Jonathan P. Benson, Tony O'Donovan, Cormac J. Sreenan, Utz Roedig:
Reliability Control for Aggregation in Wireless Sensor Networks. LCN 2007: 833-840 - [c20]Cormac Duffy, Utz Roedig, John Herbert, Cormac J. Sreenan:
An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems. PerCom Workshops 2007: 267-271 - [c19]Jonathan P. Benson, Utz Roedig, André M. Barroso, Cormac J. Sreenan:
On the Effects of Aggregation on Reliability in Sensor Networks. VTC Spring 2007: 145-149 - [c18]John Barton, John L. Buckley, Brendan O'Flynn, S. Cian O'Mathuna, Jonathan P. Benson, Tony O'Donovan, Utz Roedig, Cormac J. Sreenan:
The D-Systems Project - Wireless Sensor Networks for Car-Park Management. VTC Spring 2007: 170-173 - [c17]Utz Roedig, Nicos Gollan, Jens B. Schmitt:
Validating the sensor network calculus by simulations. WICON 2007: 34 - 2006
- [c16]Utz Roedig, André M. Barroso, Cormac J. Sreenan:
f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization. EWSN 2006: 276-291 - [c15]Jonathan P. Benson, Tony O'Donovan, Padraig O'Sullivan, Utz Roedig, Cormac J. Sreenan, John Barton, Aoife Murphy, Brendan O'Flynn:
Car-Park Management using Wireless Sensor Networks. LCN 2006: 588-595 - 2005
- [j3]Utz Roedig, Jens B. Schmitt:
Multimedia and firewalls: a performance perspective. Multim. Syst. 11(1): 19-33 (2005) - [c14]Jens B. Schmitt, Utz Roedig:
Sensor Network Calculus - A Framework for Worst Case Analysis. DCOSS 2005: 141-154 - [c13]André M. Barroso, Utz Roedig, Cormac J. Sreenan:
µ-MAC: an energy-efficient medium access control for wireless sensor networks. EWSN 2005: 70-80 - [c12]Brendan O'Flynn, Stephen J. Bellis, Kieran Delaney, John Barton, S. Cian O'Mathuna, André M. Barroso, Jonathan P. Benson, Utz Roedig, Cormac J. Sreenan:
The development of a novel minaturized modular platform for wireless sensor networks. IPSN 2005: 370-375 - [c11]André M. Barroso, Utz Roedig, Cormac J. Sreenan:
Use of Framelets for Efficient Transmitter-Receiviver rendezvous in Wireless Sensor Networks. LCN 2005: 664-671 - 2004
- [c10]Utz Roedig:
Session Introduction: Wireless Sensor Networks. EUROMICRO 2004: 494-494 - [c9]Utz Roedig, André M. Barroso, Cormac J. Sreenan:
Determination of Aggregation Points in Wireless Sensor Networks. EUROMICRO 2004: 503-510 - [c8]Utz Roedig, Jens B. Schmitt:
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications. NETWORKING 2004: 38-51 - [c7]André M. Barroso, Jonathan P. Benson, Tina Murphy, Utz Roedig, Cormac J. Sreenan, John Barton, Stephen J. Bellis, Brendan O'Flynn, Kieran Delaney:
The DSYS25 sensor platform. SenSys 2004: 314 - 2003
- [b3]Markus Schumacher, Utz Rödig, Marie-Luise Moschgath:
Hacker Contest - Sicherheitsprobleme, Lösungen, Beispiele. Xpert.press, Springer 2003, ISBN 978-3-642-62506-0, pp. I-XI, 1-301 - [c6]Utz Roedig:
Introduction from Session Chair - Multimedia and Telecommunications Track Session: Content Caching. EUROMICRO 2003: 232 - 2002
- [b2]Utz Rödig:
Firewall-Architekturen für Multimedia-Applikationen. Darmstadt University of Technology, Germany, 2002, pp. 1-188 - 2001
- [j2]Utz Roedig, Ralf Ackermann, Ralf Steinmetz:
IP-Telefonie und Firewalls, Probleme und Lösungen. Prax. Inf.verarb. Kommun. 24(1): 32-40 (2001) - [c5]Ralf Ackermann, Markus Schumacher, Utz Roedig, Ralf Steinmetz:
Vulnerabilities and Security Limitations of current IP Telephony Systems. Communications and Multimedia Security 2001 - [c4]Utz Roedig, Manuel Görtz, Martin Karsten, Ralf Steinmetz:
RSVP as Firewall Signalling Protocol. ISCC 2001: 57-62 - 2000
- [b1]Stephan Fischer, Christoph Rensing, Utz Rödig:
Open Internet Security - Von den Grundlagen zu den Anwendungen. Xpert.press, Springer 2000, ISBN 978-3-540-66814-5, pp. I-XII, 1-366 - [j1]Markus Schumacher, Marie-Luise Moschgath, Utz Roedig:
Angewandte Informationssicherheit Ein Hacker-Praktikum an Universitäten. Inform. Spektrum 23(3): 202-211 (2000) - [c3]Ralf Ackermann, Vasilios Darlagiannis, Utz Roedig, Ralf Steinmetz:
Using DMIF for Abstracting from IP-Telephony Signaling Protocols. IDMS 2000: 104-115 - [c2]Ralf Ackermann, Utz Roedig, Michael Zink, Carsten Griwodz, Ralf Steinmetz:
Associating network flows with user and application information. ACM Multimedia Workshops 2000: 149-152
1990 – 1999
- 1999
- [c1]Christoph Rensing, Utz Roedig, Ralf Ackermann, Lars C. Wolf, Ralf Steinmetz:
VDMFA, eine verteilte dynamische Firewallarchitektur für Multimedia-Dienste. Kommunikation in Verteilten Systemen 1999: 144-157
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint