Author of the publication

Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping.

, , , , and . SIGSIM-PADS, page 161-172. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending MUD to Smartphones., , and . LCN, page 353-356. IEEE, (2020)PowerDuck: A GOOSE Data Set of Cyberattacks in Substations., , , , , and . CSET @ USENIX Security Symposium, page 49-53. ACM, (2022)On the benefits of cooperation for dependable wireless communications.. RWTH Aachen University, Germany, (2021)Comprehensively Analyzing the Impact of Cyberattacks on Power Grids., , , , , , , , and . EuroS&P, page 1065-1081. IEEE, (2023)DEMONS: Extended Manufacturer Usage Description to Restrain Malicious Smartphone Apps., , and . LCN, page 463-470. IEEE, (2021)QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation., , , and . Networking, page 386-394. IEEE, (2020)An Interdisciplinary Survey on Information Flows in Supply Chains., , , , , , , , , and 5 other author(s). ACM Comput. Surv., 56 (2): 32:1-32:38 (February 2024)BP-MAC: Fast Authentication for Short Messages., , , and . WISEC, page 201-206. ACM, (2022)Finite Blocklength Performance of Multi-Terminal Wireless Industrial Networks., , , and . CoRR, (2016)Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication., , , , , and . CoRR, (2023)