


Остановите войну!
for scientists:


default search action
Utz Roedig
Utz Rödig
Person information

- affiliation: Lancaster University, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c85]Ita Ryan, Utz Roedig, Klaas-Jan Stol:
Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon. ICSE 2023: 1622-1634 - [c84]Ita Ryan, Klaas-Jan Stol, Utz Roedig:
Studying Secure Coding in the Laboratory: Why, What, Where, How, and Who? EnCyCriS@ICSE 2023: 23-30 - [c83]Ita Ryan, Klaas-Jan Stol, Utz Roedig:
The State of Secure Coding Practice: Small Organisations and "Lone, Rogue Coders". EnCyCriS@ICSE 2023: 37-44 - [c82]Linh-An Phan, Dirk Pesch, Utz Roedig, Cormac J. Sreenan:
Demonstration of LAN-type Communication for an Industrial 5G Network. INFOCOM Workshops 2023: 1-2 - 2022
- [j21]Peng Cheng
, Utz Roedig
:
Personal Voice Assistant Security and Privacy - A Survey. Proc. IEEE 110(4): 476-507 (2022) - [c81]Vlad Ionescu, Utz Roedig:
NB-IoT Battery Depletion via Malicious Interference. EWSN 2022: 244-249 - [c80]Mohammadreza Azimi, Utz Roedig:
Wake Word Based Room Identification with Personal Voice Assistants. EWSN 2022: 262-267 - [c79]M. S. Arun Sankar, Phillip L. De Leon, Steven Sandoval, Utz Roedig:
Low-Complexity Speech Spoofing Detection using Instantaneous Spectral Features. IWSSIP 2022: 1-4 - [c78]Arun Sankar Muttathu Sivasankara Pillai, Phillip L. De Leon, Utz Roedig:
Detection of Voice Conversion Spoofing Attacks Using Voiced Speech. NordSec 2022: 159-175 - [i3]Arash Shahmansoori, Utz Roedig:
Dynamic Recognition of Speakers for Consent Management by Contrastive Embedding Replay. CoRR abs/2205.08459 (2022) - 2021
- [j20]Ahlam Althobaiti
, Anish Jindal
, Angelos K. Marnerides
, Utz Roedig
:
Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods. IEEE Access 9: 159291-159312 (2021) - [j19]Ibrahim Ethem Bagci
, Thomas McGrath, Christine Barthelmes, Scott Dean
, RamÓn Bernardo Gavito
, Robert J. Young
, Utz Roedig
:
Resonant-Tunnelling Diodes as PUF Building Blocks. IEEE Trans. Emerg. Top. Comput. 9(2): 878-885 (2021) - [c77]Peng Cheng, M. S. Arun Sankar, Ibrahim Ethem Bagci, Utz Roedig:
Adversarial Command Detection Using Parallel Speech Recognition Systems. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 238-255 - [c76]Vlad Ionescu, Utz Roedig:
Battery Depletion Attacks on NB-IoT Devices Using Interference. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 276-295 - [c75]Mohammadreza Azimi, Utz Roedig:
Room Identification with Personal Voice Assistants (Extended Abstract). CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 317-327 - [c74]Ita Ryan, Utz Roedig, Klaas-Jan Stol:
Understanding Developer Security Archetypes. EnCyCriS@ICSE 2021: 37-40 - 2020
- [j18]Peng Cheng, Ibrahim Ethem Bagci
, Utz Roedig
, Jeff Yan:
SonarSnoop: active acoustic side-channel attacks. Int. J. Inf. Sec. 19(2): 213-228 (2020) - [c73]Pierre Ciholas, Jose Miguel Such
, Angelos K. Marnerides
, Benjamin Green, Jiajie Zhang, Utz Roedig:
Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode. DIMVA 2020: 67-88 - [c72]Filip Holík, Utz Roedig, Nicholas J. P. Race:
LoRa-SDN: Providing Wireless IoT Edge Network Functions via SDN. MIPRO 2020: 1795-1800
2010 – 2019
- 2019
- [c71]Povilas Marcinkevicius, Ibrahim Ethem Bagci
, Nema M. Abdelazim, Christopher S. Woodhead
, Robert J. Young
, Utz Roedig
:
Optically Interrogated Unique Object with Simulation Attack Prevention. DATE 2019: 198-203 - [c70]Martin C. Bor
, Angelos K. Marnerides
, Andy Molineux, Steve Wattam, Utz Rödig
:
Adversarial Machine Learning in Smart Energy Systems. e-Energy 2019: 413-415 - [c69]Jason J. Quinlan
, Utz Roedig:
The benefits of Deceit: a Malicious client in a 5G Cellular Network. LANMAN 2019: 1-2 - [c68]Peng Cheng, Ibrahim Ethem Bagci, Jeff Yan, Utz Roedig:
Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants. IEEE Symposium on Security and Privacy Workshops 2019: 144-149 - 2018
- [j17]Alex King, Utz Roedig
:
Differentiating Clear Channel Assessment Using Transmit Power Variation. ACM Trans. Sens. Networks 14(2): 15:1-15:28 (2018) - [c67]Peng Cheng, Ibrahim Ethem Bagci, Jeff Yan, Utz Roedig
:
Towards Reactive Acoustic Jamming for Personal Voice Assistants. MPS@CCS 2018: 12-17 - [i2]Peng Cheng, Ibrahim Ethem Bagci, Utz Roedig, Jeff Yan:
SonarSnoop: Active Acoustic Side-Channel Attacks. CoRR abs/1808.10250 (2018) - 2017
- [c66]Martin C. Bor
, Utz Roedig
:
LoRa Transmission Parameter Selection. DCOSS 2017: 27-34 - [c65]Anhtuan Le, Utz Roedig
, Awais Rashid
:
LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems. ESSoS 2017: 36-52 - [c64]Thiemo Voigt, Martin C. Bor, Utz Roedig, Juan M. Alonso:
Mitigating Inter-network Interference in LoRa Networks. EWSN 2017: 323-328 - [c63]Benjamin Green, Anhtuan Le, Rob Antrobus, Utz Roedig, David Hutchison, Awais Rashid:
Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research. CSET @ USENIX Security Symposium 2017 - 2016
- [j16]Ibrahim Ethem Bagci
, Shahid Raza
, Utz Roedig
, Thiemo Voigt:
Fusion: coalesced confidential storage and communication framework for the IoT. Secur. Commun. Networks 9(15): 2656-2673 (2016) - [c62]Alex King, Utz Roedig:
Poster: RI-MAC Enhancements for Interference Resilience. EWSN 2016: 283-284 - [c61]Alex King, James Hadley, Utz Roedig:
Competition: ContikiMAC with Differentiating Clear Channel Assessment. EWSN 2016: 301-302 - [c60]Martin C. Bor, John Vidler, Utz Roedig:
LoRa for the Internet of Things. EWSN 2016: 361-366 - [c59]James Hadley, Utz Roedig
, Yehia Elkhatib
:
Using context switches for VM scaling. IPCCC 2016: 1-2 - [c58]Martin C. Bor
, Utz Roedig
, Thiemo Voigt, Juan M. Alonso:
Do LoRa Low-Power Wide-Area Networks Scale? MSWiM 2016: 59-67 - [i1]Thiemo Voigt, Martin C. Bor, Utz Roedig, Juan M. Alonso:
Mitigating Inter-network Interference in LoRa Networks. CoRR abs/1611.00688 (2016) - 2015
- [c57]Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, Matthias Hollick:
Using Channel State Information for Tamper Detection in the Internet of Things. ACSAC 2015: 131-140 - [c56]Martin C. Bor
, Alex King, Utz Roedig
:
Lifetime Bounds of Wi-Fi Enabled Sensor Nodes. ANT/SEIT 2015: 1108-1113 - [c55]James Hadley, Yehia El-khatib
, Gordon S. Blair
, Utz Roedig:
MultiBox: Lightweight Containers for Vendor-Independent Multi-cloud Deployments. EGC 2015: 79-90 - [c54]Alex King, James Brown, John Vidler, Utz Roedig:
Estimating node lifetime in interference environments. LCN Workshops 2015: 796-803 - 2014
- [j15]Mohammad Ghamari
, Behzad Momahed Heravi, Utz Roedig
, Bahram Honary:
Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols. IET Networks 3(4): 284-292 (2014) - [j14]Shahid Raza
, Simon Duquennoy, Joel Höglund, Utz Roedig
, Thiemo Voigt:
Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN. Secur. Commun. Networks 7(12): 2654-2668 (2014) - [j13]Wolf-Bastian Pöttner, Hans Seidel, James Brown, Utz Roedig
, Lars C. Wolf:
Constructing Schedules for Time-Critical Data Delivery in Wireless Sensor Networks. ACM Trans. Sens. Networks 10(3): 44:1-44:31 (2014) - [c53]Benjamin Green, Daniel Prince, Utz Roedig, Jerry S. Busby, David Hutchison:
Socio-Technical Security Analysis of Industrial Control Systems (ICS). ICS-CSR 2014 - [c52]Carlo Alberto Boano, Marco Zuniga, James Brown, Utz Roedig, Chamath Keppitiyagama, Kay Römer:
TempLab: a testbed infrastructure to study the impact of temperature on wireless sensor networks. IPSN 2014: 95-106 - [c51]James Brown, Utz Roedig
, Carlo Alberto Boano, Kay Römer:
Estimating packet reception rate in noisy environments. LCN Workshops 2014: 583-591 - [c50]Carlo Alberto Boano, Kay Römer, James Brown, Utz Roedig
, Marco Zuniga
:
Demo abstract: A testbed infrastructure to study the impact of temperature on WSN. PerCom Workshops 2014: 154-156 - [c49]Utz Roedig:
Security Mechanisms for Wireless Sensor Networks. SENSORNETS 2014: IS-13 - [c48]Alex King, James Brown, Utz Roedig
:
DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence. WiMob 2014: 45-50 - [c47]Ibrahim Ethem Bagci
, Utz Roedig
, Matthias Schulz, Matthias Hollick:
Short paper: gathering tamper evidence in wi-fi networks based on channel state information. WISEC 2014: 183-188 - 2013
- [j12]Barry Porter
, Geoff Coulson, Utz Roedig
:
Managing software evolution in large-scale wireless sensor and actuator networks. ACM Trans. Sens. Networks 9(4): 54:1-54:28 (2013) - [j11]Tony O'Donovan, James Brown, Felix Büsching
, Alberto Cardoso
, José Cecílio
, Jose Manuel do Ó, Pedro Furtado
, Paulo Gil
, Anja Jugel, Wolf-Bastian Pöttner, Utz Roedig
, Jorge Sá Silva
, Ricardo M. Silva, Cormac J. Sreenan, Vasos Vassiliou
, Thiemo Voigt, Lars C. Wolf, Zinon Zinonos
:
The GINSENG system for wireless monitoring and control: Design and deployment experiences. ACM Trans. Sens. Networks 10(1): 4:1-4:40 (2013) - [c46]Martin Strohmeier
, Ivan Martinovic, Utz Roedig
, Karim El Defrawy, Jens B. Schmitt:
Neighborhood watch: On network coding throughput and key sharing. GLOBECOM 2013: 849-854 - [c45]Ibrahim Ethem Bagci
, Utz Roedig
:
Node Identification Using Clock Skew. REALWSN 2013: 111-123 - [c44]Ibrahim Ethem Bagci
, Shahid Raza
, T. tony Chung, Utz Roedig
, Thiemo Voigt:
Combined secure storage and communication for the Internet of Things. SECON 2013: 523-531 - 2012
- [j10]Petcharat Suriyachai, Utz Roedig
, Andrew Scott:
A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks. IEEE Commun. Surv. Tutorials 14(2): 240-264 (2012) - [j9]Mohammad Ghamari
, Behzad Momahed Heravi, Utz Roedig
, Bahram Honary, Carl A. Pickering:
Improving transmission reliability of low-power medium access control protocols using average diversity combining. IET Wirel. Sens. Syst. 2(4): 377-384 (2012) - [j8]Thiemo Voigt, Utz Roedig
, Olaf Landsiedel, Kasun Samarasinghe, Mahesh Bogadi Shankar Prasad:
On the applicability of network coding in wireless sensor networks. SIGBED Rev. 9(3): 46-48 (2012) - [c43]Ibrahim Ethem Bagci, Mohammad Reza Pourmirza, Shahid Raza, Utz Roedig, Thiemo Voigt:
Codo: confidential data storage for wireless sensor networks. MASS Workshops 2012: 1-6 - 2011
- [j7]Tony O'Donovan, Utz Roedig
, Jonathan P. Benson, Cormac J. Sreenan:
Self-adaptive framelet-based communication for wireless sensor networks. Comput. Networks 55(11): 2558-2575 (2011) - [j6]Petcharat Suriyachai, Utz Roedig
, Andrew Scott, Nicos Gollan, Jens B. Schmitt:
Dimensioning of Time-Critical WSNs - Theory, Implementation and Evaluation. J. Commun. 6(5): 360-369 (2011) - [c42]Barry Porter
, Utz Roedig, Geoff Coulson:
Type-safe updating for modular WSN software. DCOSS 2011: 1-8 - [c41]Wolf-Bastian Pöttner, Lars C. Wolf, José Cecílio
, Pedro Furtado
, Ricardo M. Silva, Jorge Sá Silva
, Amâncio Santos
, Paulo Gil
, Alberto Cardoso
, Zinon Zinonos
, Jose Manuel do Ó, Ben McCarthy, James Brown, Utz Roedig, Tony O'Donovan, Cormac J. Sreenan, Zhitao He, Thiemo Voigt, Anja Jugel:
WSN evaluation in industrial environments first results and lessons learned. DCOSS 2011: 1-8 - [c40]Shahid Raza
, Simon Duquennoy, Antony Chung, Dogan Yazar, Thiemo Voigt, Utz Roedig:
Securing communication in 6LoWPAN with compressed IPsec. DCOSS 2011: 1-8 - [c39]Shahid Raza
, Simon Duquennoy, Thiemo Voigt, Utz Roedig:
Demo abstract: Securing communication in 6LoWPAN with compressed IPsec. DCOSS 2011: 1-2 - [c38]James Brown, Ben McCarthy, Utz Roedig, Thiemo Voigt, Cormac J. Sreenan:
BurstProbe: Debugging Time-Critical Data Delivery in Wireless Sensor Networks. EWSN 2011: 195-210 - 2010
- [j5]Carlo Alberto Boano, James Brown, Nicolas Tsiftes, Utz Roedig
, Thiemo Voigt:
The Impact of Temperature on Outdoor Industrial WSN Applications. IEEE Trans. Ind. Informatics 6(3): 451-459 (2010) - [c37]Petcharat Suriyachai, James Brown, Utz Roedig:
Time-Critical Data Delivery in Wireless Sensor Networks. DCOSS 2010: 216-229 - [c36]Utz Roedig, Sarah Rutlidge, James Brown, Andrew Scott:
Towards multiprocessor sensor nodes. HotEmNets 2010: 16:1-16:5 - [c35]Antony Chung, Utz Roedig:
Implementation and evaluation of distance-based message authentication. MASS 2010: 519-524 - [c34]Ben McCarthy, Socrates Varakliotis, Christopher Edwards, Utz Roedig:
Deploying Wireless Sensor Networking Technology in a Rescue Team Context. REALWSN 2010: 37-48 - [c33]Paul Alcock, James Brown, Utz Roedig:
Implementation and Evaluation of Combined Positioning and Communication. REALWSN 2010: 126-137 - [c32]Tony O'Donovan, James Brown, Utz Roedig
, Cormac J. Sreenan, J. do O, Adam Dunkels, Anja Klein, Jorge Sá Silva
, Vasos Vassiliou
, Lars C. Wolf:
GINSENG: Performance Control in Wireless Sensor Networks. SECON 2010: 1-3 - [c31]Barry Porter
, Utz Roedig, François Taïani
, Geoff Coulson:
The Lorien dynamic component based OS. SenSys 2010: 355-356 - [c30]Mohammad Ghamari
, Antony Chung, Utz Roedig, Bahram Honary, Carl A. Pickering:
Vehicle-Driver Communication Using Off-the-Shelf Transceivers. VTC Fall 2010: 1-2
2000 – 2009
- 2009
- [c29]Paul Alcock, Utz Roedig, Mike Hazas
:
Combining Positioning and Communication Using UWB Transceivers. DCOSS 2009: 329-342 - [c28]Petcharat Suriyachai, Utz Roedig, Andrew Scott:
Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks. PerCom Workshops 2009: 1-6 - [c27]Carlo Alberto Boano, James Brown, Zhitao He, Utz Roedig, Thiemo Voigt:
Low-Power Radio Communication in Industrial Outdoor Deployments: The Impact of Weather Conditions and ATEX-Compliance. SENSAPPEAL 2009: 159-176 - [e1]Utz Roedig, Cormac J. Sreenan:
Wireless Sensor Networks, 6th European Conference, EWSN 2009, Cork, Ireland, February 11-13, 2009. Proceedings. Lecture Notes in Computer Science 5432, Springer 2009, ISBN 978-3-642-00223-6 [contents] - 2008
- [j4]Cormac Duffy, Utz Roedig, John Herbert, Cormac J. Sreenan:
A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems. J. Networks 3(3): 57-70 (2008) - [c26]Jonathan P. Benson, Tony O'Donovan, Utz Roedig, Cormac J. Sreenan:
Opportunistic Aggregation over Duty Cycled Communications in Wireless Sensor Networks. IPSN 2008: 307-318 - [c25]Tony O'Donovan, Jonathan P. Benson, Utz Roedig, Cormac J. Sreenan:
Priority interrupts of Duty Cycled communications in wireless sensor networks. LCN 2008: 732-739 - [c24]Antony Chung, Utz Roedig:
DHB-KEY: An efficient key distribution scheme for wireless sensor networks. MASS 2008: 840-846 - 2007
- [c23]Cormac Duffy, Utz Roedig, John Herbert, Cormac J. Sreenan:
Adding preemption to TinyOS. EmNets 2007: 88-92 - [c22]Cormac Duffy, Utz Roedig, John Herbert, Cormac J. Sreenan:
Improving the Energy Efficiency of the MANTIS Kernel. EWSN 2007: 261-276 - [c21]Jonathan P. Benson, Tony O'Donovan, Cormac J. Sreenan, Utz Roedig:
Reliability Control for Aggregation in Wireless Sensor Networks. LCN 2007: 833-840 - [c20]Cormac Duffy, Utz Roedig, John Herbert, Cormac J. Sreenan:
An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems. PerCom Workshops 2007: 267-271 - [c19]Jonathan P. Benson, Utz Roedig, André M. Barroso, Cormac J. Sreenan:
On the Effects of Aggregation on Reliability in Sensor Networks. VTC Spring 2007: 145-149 - [c18]John Barton, John L. Buckley, Brendan O'Flynn, S. Cian O'Mathuna, Jonathan P. Benson, Tony O'Donovan, Utz Roedig, Cormac J. Sreenan:
The D-Systems Project - Wireless Sensor Networks for Car-Park Management. VTC Spring 2007: 170-173 - [c17]Utz Roedig, Nicos Gollan, Jens B. Schmitt:
Validating the sensor network calculus by simulations. WICON 2007: 34 - 2006
- [c16]Utz Roedig, André M. Barroso, Cormac J. Sreenan:
f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization. EWSN 2006: 276-291 - [c15]Jonathan P. Benson, Tony O'Donovan, Padraig O'Sullivan, Utz Roedig, Cormac J. Sreenan, John Barton, Aoife Murphy, Brendan O'Flynn:
Car-Park Management using Wireless Sensor Networks. LCN 2006: 588-595 - 2005
- [j3]Utz Roedig
, Jens B. Schmitt:
Multimedia and firewalls: a performance perspective. Multim. Syst. 11(1): 19-33 (2005) - [c14]Jens B. Schmitt, Utz Roedig:
Sensor Network Calculus - A Framework for Worst Case Analysis. DCOSS 2005: 141-154 - [c13]André M. Barroso, Utz Roedig, Cormac J. Sreenan:
µ-MAC: an energy-efficient medium access control for wireless sensor networks. EWSN 2005: 70-80 - [c12]Brendan O'Flynn, Stephen J. Bellis, Kieran Delaney, John Barton, S. Cian O'Mathuna, André M. Barroso, Jonathan P. Benson, Utz Roedig, Cormac J. Sreenan:
The development of a novel minaturized modular platform for wireless sensor networks. IPSN 2005: 370-375 - [c11]André M. Barroso, Utz Roedig, Cormac J. Sreenan:
Use of Framelets for Efficient Transmitter-Receiviver rendezvous in Wireless Sensor Networks. LCN 2005: 664-671 - 2004
- [c10]Utz Roedig:
Session Introduction: Wireless Sensor Networks. EUROMICRO 2004: 494-494 - [c9]Utz Roedig, André M. Barroso, Cormac J. Sreenan:
Determination of Aggregation Points in Wireless Sensor Networks. EUROMICRO 2004: 503-510 - [c8]Utz Roedig, Jens B. Schmitt:
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications. NETWORKING 2004: 38-51 - [c7]André M. Barroso, Jonathan P. Benson, Tina Murphy, Utz Roedig, Cormac J. Sreenan, John Barton, Stephen J. Bellis, Brendan O'Flynn, Kieran Delaney:
The DSYS25 sensor platform. SenSys 2004: 314 - 2003
- [b3]Markus Schumacher, Utz Rödig
, Marie-Luise Moschgath:
Hacker Contest - Sicherheitsprobleme, Lösungen, Beispiele. Xpert.press, Springer 2003, ISBN 978-3-642-62506-0, pp. I-XI, 1-301 - [c6]Utz Roedig:
Introduction from Session Chair - Multimedia and Telecommunications Track Session: Content Caching. EUROMICRO 2003: 232 - 2002
- [b2]Utz Rödig:
Firewall-Architekturen für Multimedia-Applikationen. Darmstadt University of Technology, Germany, 2002, pp. 1-188 - 2001
- [j2]Utz Roedig, Ralf Ackermann, Ralf Steinmetz:
IP-Telefonie und Firewalls, Probleme und Lösungen. Prax. Inf.verarb. Kommun. 24(1): 32-40 (2001) - [c5]Ralf Ackermann, Markus Schumacher, Utz Roedig, Ralf Steinmetz:
Vulnerabilities and Security Limitations of current IP Telephony Systems. Communications and Multimedia Security 2001 - [c4]Utz Roedig, Manuel Görtz, Martin Karsten, Ralf Steinmetz:
RSVP as Firewall Signalling Protocol. ISCC 2001: 57-62 - 2000
- [b1]Stephan Fischer, Christoph Rensing
, Utz Rödig
:
Open Internet Security - Von den Grundlagen zu den Anwendungen. Xpert.press, Springer 2000, ISBN 978-3-540-66814-5, pp. I-XII, 1-366 - [j1]Markus Schumacher, Marie-Luise Moschgath, Utz Roedig
:
Angewandte Informationssicherheit Ein Hacker-Praktikum an Universitäten. Inform. Spektrum 23(3): 202-211 (2000) - [c3]Ralf Ackermann, Vasilios Darlagiannis, Utz Roedig
, Ralf Steinmetz:
Using DMIF for Abstracting from IP-Telephony Signaling Protocols. IDMS 2000: 104-115 - [c2]Ralf Ackermann, Utz Roedig, Michael Zink
, Carsten Griwodz, Ralf Steinmetz:
Associating network flows with user and application information. ACM Multimedia Workshops 2000: 149-152
1990 – 1999
- 1999
- [c1]Christoph Rensing, Utz Roedig, Ralf Ackermann, Lars C. Wolf, Ralf Steinmetz:
VDMFA, eine verteilte dynamische Firewallarchitektur für Multimedia-Dienste. Kommunikation in Verteilten Systemen 1999: 144-157