Skip to main content

Secure COnnected Trustable Things

Deliverables

Safety-Critical Sandbox Final Specification

Augmenting Sandbox with improved model checking, plus its evaluation – M26

Safety-critical Sandbox Specification

Initial specifications for formal verification and model checker/big data analytics techniques – M16

Demonstrator Descriptions and Evaluation Report

D13.6 will describe the developed trustable wireless IVN demonstrators (D13.4 and D13.5) and additionally includes the corresponding evaluation results. The report will also include the analysis of the impact of two high impact/high risk security threats on the system behaviour and system performance.

Industrial Use Cases – Specification, Integration, Demonstration and Evaluation Management Methodology

Deliverable D6.1 describes how specification, integration, demonstration and evaluation management will be performed. Proper tools and methods that will be used in order to fulfil WP6 objectives will be delivered and described. Key roles, responsibilities as well as deadlines will be described. This deliverable specifies the structure of D6.2, D6.3, D6.4 documents.

Roadmap towards Services

This document will summarize the experiences from the pilots, and create the roadmap towards market uptake. Drivers like energy efficiency, trust issues such as privacy and security, convenience, as well as market aspects such as societal demands will be analysed to create the expected market uptake of managed wireless.

2nd Report on Standardization/Regulation/Certification Activities

D31.3: 2nd Report on Standardization/Regulation/Certification activities. This deliverable is a comprehensive progress report summarizing the overall progress of SCOTT regarding Standardization/Regulation/Certification activities after the 2nd year of the project. [Month 24]

Service Enabling Software Routing

This deliverable will address software enabled routing as the prerequisite for service slicing in wireless infrastructures. Novel services and their service requirements will be taken up, to address the routing requirements. As an example, Voice over Wifi (VoWifi) requires an uptime of the communication between the wireless and the device, with requirements both to the network and the mobile phone. Ambitious novel concepts as BasicInternet and IoT-network slicing will be introduced and described.

Summary of selected SCOTT reference architecture/reference implementation building blocks

This deliverable summarizes selected building blocks from D26.1 to D26.3 for external publication.

Assessment of technology

This document will perform a high-level assessment of the envisaged technology lines in SP3. The assessment is based on factors like innovation type (technology, product, social, market) and expectations of applicability in the SCOTT use cases.

Summary of selected SCOTT security and safety building blocks

This deliverable summarizes selected security and safety building blocks described in D23.3 – D23.6 for external publication.

Market innovation

This document will bring together the knowledge from task 1 and 2 towards the innovations from SCOTT towards the market, addressing the introduction of more secure and privacy-aware technologies, applications and services.

Secure Cloud Services for Novel Connected Mobility Applications Public Report

This deliverable provides not confidential assessment and evaluation results of the demonstrators in the evaluation environment and contribution assigned for members of the public.

1st Report on Standardization/Regulation/Certification Activities

D31.2: 1st Report on Standardization/Regulation/Certification activities. This deliverable is a comprehensive progress report summarizing the overall progress of SCOTT regarding Standardization/Regulation/Certification activities after the 1st year of the project. [Month 12]

Final Evaluation of Technical Progress & Assessment of Project Objectives

The deliverable “Final Evaluation of Technical Progress & Assessment of Project Objectives” will provide a final summary of the technical progress in SCOTT and thus finally assess the achievement of project objectives, also as input for the final project progress report and project review meeting. M37.

Autonomous Wireless Network Development Progress Report Year 1

This report will include a summary of the status of the work within WP2.12 at the end of the first year of the project, as well as a summary of the main achievements during this period coming from the results of the requirements specification and the early design specification tasks. This deliverable will also include the following detailed technical information: D18.2.IR1: Autonomous Wireless Network High Level Design [INDRA, M10] This document will include the specification at a high level of the Energy Autonomous Wireless Network for Rail Logistics and Maintenance resulting from T2.1.

Critical Area Trustable Warning System Development Progress Report Year 1

This report will include a summary of the status of the work within WP20 at the end of the first year of the project, as well as a summary of the main achievements during this period coming from the results of the requirements specification and the early design specification tasks.

Managed Wireless Framework

This document will provide the framework for managed wireless access. Starting from the state-of-technology, the challenges will be identified. These challenges will be converted into market numbers, e.g. the costs of customer services for Internet Service Providers (ISPs). The report will then focus on the two key aspects, (i) the remote management of wireless to achieve better service quality, and (ii) the expected upcoming/novel services and their service requirements towards trustable Wireless

Foundations for Building Trusted Systems

D28.1: The deliverable “Foundations for Building Trusted Systems” is a public report, which will summarize the relevant trust factors and state of the art of building trusted systems. The deliverable will describe the detailed process framework that will be used within SCOTT to ensure that system trust is actually achieved. M6.

Summary of selected SCOTT building blocks for autonomy of devices / energy efficiency of WSN

This deliverable summarizes selected building blocks from D25.1 to D25.3 for external publication.

Progress Report “Managed Wireless for Smart Infrastructure” Year 2

The main objective of this deliverable is to provide detailed technical description of the use case development level after year 2.

Autonomous Wireless Network Requirements Specification

Requirements will be derived from the use cases identified within this WP. The requirements will be collected, harmonized and documented according to SP1 guidelines. This deliverable will include the identification of requirements for WSN associated modules, GWs associated modules, and the Logistics and Maintenance Cloud Platform and the End-User Application associated modules.

Safety-Critical Sandbox Final Evaluation

Complete report including all results and finding via Safety-Critical Sandbox. Additionally, presenting main conclusions and future directions. – M36

Trust technologies advances

This document will be an update of D22.1, describing the advances of the high-level assessment of the selected technology lines in SP3. The assessment is based on factors like innovation type (technology, product, social, market) and analyses the applicability in the SCOTT use cases, in the segment of the market, and potentially other market segments.

Sandbox Specification

Requirements identification and initial specifications for the sandbox– M7

Safe Freight and Traffic Management Demonstrator Description and Evaluation

This deliverable will include the results of the demonstration activities to be accomplished within this WP. Includes two parts for underground construction and intermodal logistic hub scenarios. This deliverable will include the results of the technical evaluation of the different algorithms and mathematical/statistical methods. This document reports the functional results obtained once real data is available.

Market roadmap

This document will establish the roadmap for selected technologies, applied in segments of the market. It will address how the market is structures, who the main actors are, and which advances the technologies will bring to the the market segment. The document will recommend on how to approach the selected segments.

Second Evaluation of Technical Progress & Assessment of Project Objectives

The deliverable “Second Evaluation of Technical Progress & Assessment of Project Objectives” will provide a summary of the technical progress and thus assess the achievement of project objectives as input for the overall year 2 progress report. M23.

Critical Area Trustable Warning System Requirements Specification

Requirements will be derived from the use cases identified within this WP. The requirements will be collected, harmonized and documented according to SP1 guidelines. Requirements to be collected will include WSN requirements for hardware/software elements, communications and sensing; I2V/V2I communication technology requirements; and CATWS GW requirements among others.

Final Framework for Building Trusted Systems

D28.6: The deliverable “Final framework for building trusted systems” will contain the final framework to build trusted system as it is derived from the conclusions from the SCOTT project. M36

"Use Case Specification ""Secure Car Access"""

A document shall be written covering the detailed description of the use case scenario “secure car access” including typical application scenarios as well as typical state-of-the-art passive keyless entry solutions.

First Evaluation of Technical Progress & Assessment of Project Objectives

The deliverable “First Evaluation of Technical Progress & Assessment of Project Objectives” will provide a summary of the technical progress and thus assess achievement of project objectives as input for the overall year 1 progress report. M11.

SCOTT Requirements Management Guidelines

The deliverable “SCOTT Requirements Management Guidelines” is a public report, which will be made available very early in the project (M2) to ensure an efficient and harmonized requirements management process in SCOTT, enabling optional iterations, cross use-case/domain synergies and efficient progress tracking. M2.

Progress Report “Managed Wireless for Smart Infrastructure” Year 1

The main objective of this deliverable is to provide detailed technical description of the use case development level after year 1.

Summary of selected SCOTT building blocks for distributed cloud computing

This deliverables summarizes selected building blocks from D24.1 to D24.3 for external publication.

Final Report on Standardization/Regulation/Certification Activities

D31.4: Final Report on Standardization/Regulation/Certification activities. This deliverable is a comprehensive progress report summarizing the overall progress of SCOTT regarding Standardization/Regulation/Certification activities after the 3rd and final year of the project. [Month 36]

Standardization/Regulation/Certification Approach of SCOTT

D31.1: Standardization/Regulation/Certification approach of SCOTT. This deliverable will describe the generic methodologies and processes to facilitate standardization, regulation and certification of the out coming solutions developed in SCOTT. [Month 4]

Pilot Managed Wireless

This Pilot will bring managed wireless into real-life environments, with ISPs providing the infrastructures to their customers, EyeSaaS establishing the cloud monitoring and configuration, and partners like Telenor addressing novel services. The results of the pilot will be summarised in D8.6

Critical Area Trustable Warning System Demonstrator

This will be the End-to-end Demonstrator itself of Critical Area Trustable Warning System.

Sandbox (Alpha)

Initial implementation of the Sandbox and its evaluation and deployment (without model checker) – M14

Smart Train Composition Coupling demonstrator

This will be the Demonstrator itself of the Smart Train Composition Coupling.

Safety-critical Sandbox (Beta)

Implementation and evaluation of formal model using model checker/big data analytics techniques – M24

Demonstrator Generation 3

The final demonstration of the combined results of 3 iterations, including a full verification of the developed technologies, and validation in its use case. This demonstration shall be also subject to an extensive security and privacy evaluation

Demonstrator Generation 1

Goal is to demonstrate the applicability of Use Cases and Building Blocks (Iteration 1), integrated in an industry automotive test environment, specifically a powertrain test bed and a mobile test vehicle.

Secure Car Access Demonstrator

A demonstrator car shall be modified to include the secure car access technology proposed in this work package and based on building blocks developed in SP3 along with a classical passive keyless entry system.

Applicability of Use Case and Building Blocks for Assisted Living Demonstrated (Iteration 3)

Update of D21.4. Note: validation report to be part of final report D21.7 instead. This final iteration will be publicly shown at a dissemination event.

Safety-Critical Sandbox (Release Candidate)

Evaluating, analysing and demonstrating KPIs in the Sandbox thus releasing the final version on Sandbox – M34

Use Case Demonstrator

The main objective of this deliverable is to present obtained results of the WP in real (or close to real) environment according to dedicated scenarios. This deliverable will be based on outcomes from D15.1. In order to fulfill collected requirements and deliver systems’ functionalities identified in D15.1, proper system’s architecture will be proposed together with demonstration scenarios. HW and SW components utilized in UC will be demonstrated.

"Applicability of Use Case and Building Blocks for ""Air Quality Monitoring"" Demonstrated"

The main objective of this deliverable is to present obtained results of the WP in real (or close to real) environments. The HW and SW components utilized in the UC will be demonstrated featuring technology from the linked technology lines.

Autonomous Wireless Network for Rail Logistics and Maintenance Demonstrator

This will be the End-to-end Demonstrator itself of the Logistics and Maintenance Application in the Autonomous Wireless Network.

"Applicability of Use Case and Building Blocks ""Secure Connected Facilities Management"" Demonstrated"

The main objective of this deliverable is to present the obtained results of the WP in a real (or close to real) environment according to dedicated scenarios. This deliverable will be based on the outcomes from D9.1. In order to fulfil collected requirements and deliver systems’ functionalities identified in D9.1, a proper system architecture will be proposed together with demonstration scenarios. HW and SW components utilized in UC will be demonstrated.

Searching for OpenAIRE data...

Publications

Demo: Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices

Author(s): Hannah Brunner, Rainer Hofmann, Markus Schuß, Jakob Link, Matthias Hollick, Carlo Alberto Boano, and Kay Roemer
Published in: 2020

On the Interference Management Between Non-Stationary Wireless Networks

Author(s): Tomas Nordstrom, Kristina Kunert
Published in: 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, Page(s) 1764-1767
DOI: 10.1109/etfa.2019.8868998

The DEWI high-level architecture: Wireless sensor networks in industrial applications

Author(s): Ramiro Samano-Robles, Tomas Nordstrom, Salvador Santonja, Werner Rom, Eduardo Tovar
Published in: 2016 Eleventh International Conference on Digital Information Management (ICDIM), 2016, Page(s) 274-280
DOI: 10.1109/icdim.2016.7829797

Scalable Distributed Ecosystems of Sensors; Can we Handle so Many IoT-devices?

Author(s): Nikolaos Kouvelas and Ranga Rao Venkatesha Prasad
Published in: 2018

Technical Challenges in Designing Systems-of-Systems Supporting Vehicle Fleets

Author(s): Emmanuel Frécon and Efi Papatheocharous
Published in: 2018

DUAL PERSPECTIVES ON MULTI-CONTEXTUALITY OF DATA IN DIGITAL PLATFORM ESTABLISHMENT

Author(s): Andersson, Magnus Lindlöf, Ludvig
Published in: 2020

What do we know about software security evaluation? A preliminary study

Author(s): Severine Sentilles , Efi Papatheocharous, Federico Ciccozzi
Published in: 2018

Safety vs. Efficiency: AI-Based Risk Mitigation in Collaborative Robotics

Author(s): Ahmad Terra, Hassam Riaz, Klaus Raizer, Alberto Hata, Rafia Inam
Published in: 2020 6th International Conference on Control, Automation and Robotics (ICCAR), 2020, Page(s) 151-160
DOI: 10.1109/iccar49639.2020.9108037

Quantified Cars: Digital services and business implications based on vehicle data

Author(s): Dr. Alexander Stockerand DI Christian Kaiser (Virtual VehicleResearch Center)Dr.Eric Armengaudand DI Peter Priller (AVL List GmbH)
Published in: 2018

Adaptive Period Estimation For Sparse Point Processes

Author(s): Hans-Peter Bernhard, Andreas Springer
Published in: 2018 IEEE Statistical Signal Processing Workshop (SSP), 2018, Page(s) 593-597
DOI: 10.1109/ssp.2018.8450856

A Contextual Bandit Approach to the Interface Selection Problem

Author(s): Georgi Nikolov, Michael Kuhn, Bernd-Ludwig Wenning
Published in: 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, Page(s) 1707-1714
DOI: 10.1109/etfa.2019.8869285

A Scalable Mobile Multi-Node Channel Sounder

Author(s): Stefan Zelenbaba, David Loschenbrand, Markus Hofer, Anja Dakic, Benjamin Rainer, Gerhard Humer, Thomas Zemen
Published in: 2020 IEEE Wireless Communications and Networking Conference (WCNC), 2020, Page(s) 1-6
DOI: 10.1109/wcnc45663.2020.9120769

Location-based Trustworthiness of Wireless Sensor Nodes using Optical Localization

Author(s): Leander B. Hörmann, Markus Pichler-Scheder, Christian Kastl, Hans-Peter Bernhard, Peter Priller and Andreas Springer
Published in: 2020

A Vehicle Telematics Service for Driving Style Detection: Implementation and Privacy Challenges

Author(s): Christian Kaiser, Alexander Stocker, Andreas Festl, Marija Petrovic, Efi Papatheocharous, Anders Wallberg, Gonzalo Ezquerro, Jordi Orbe, Tom Szilagyi, Michael Fellmann
Published in: Proceedings of the 6th International Conference on Vehicle Technology and Intelligent Transport Systems, 2020, Page(s) 29-36
DOI: 10.5220/0009329400290036

Design of a micro-service based Data Pool for device integration to speed up digitalization

Author(s): J.C. Garcia-Ortiz, D. Todoli-Ferrandis, J. Vera-Perez, S. Santonja-Climent, V. Sempere-Paya
Published in: 2019 27th Telecommunications Forum (TELFOR), 2019, Page(s) 1-4
DOI: 10.1109/telfor48224.2019.8971346

Model Adaptation and Personalization for Physiological Stress Detection

Author(s): Aaqib Saeed, Tanir Ozcelebi, Johan Lukkien, Jan B.F. van Erp, Stojan Trajanovski
Published in: 2018 IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA), 2018, Page(s) 209-216
DOI: 10.1109/dsaa.2018.00031

Demo: Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices

Author(s): Classen, Jiska ; Spörk, Michael ; Boano, Carlo Alberto ; Römer, Kay ; Hollick, Matthias
Published in: 2020

A Scalable and Fast Model for Performance Analysis of IEEE 802.15.4 TSCH Networks

Author(s): Hamideh Hajizadeh, Majid Nabi, Rasool Tavakoli, Kees Goossens
Published in: 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2019, Page(s) 1-7
DOI: 10.1109/pimrc.2019.8904420

X-Burst: Enabling Multi-Platform Cross-Technology Communication between Constrained IoT Devices

Author(s): Rainer Hofmann, Carlo Alberto Boano, Kay Romer
Published in: 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 2019, Page(s) 1-9
DOI: 10.1109/sahcn.2019.8824880

Safety and Security oriented design for reliable Industrial IoT applications based on WSNs

Author(s): Jose Vera-Perez, David Todoli-Ferrandis, Victor Sempere-Paya, Ruben Ponce-Tortajada, Gabriel Mujica, Jorge Portilla
Published in: 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, Page(s) 1774-1781
DOI: 10.1109/etfa.2019.8869204

Hybrid Timeslot Design for IEEE 802.15.4 TSCH to Support Heterogeneous WSNs

Author(s): Rasool Tavakoli, Majid Nabi, Twan Basten, Kees Goossens
Published in: 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2018, Page(s) 1-7
DOI: 10.1109/pimrc.2018.8580990

Improving System Trustworthyness by Combining Remote Attestation and Root Cause Analysis

Author(s): Ian Oliver, Gabreila Limonta, Borger Vigmostad
Published in: 2018 11th International Conference on the Quality of Information and Communications Technology (QUATIC), 2018, Page(s) 293-294
DOI: 10.1109/quatic.2018.00052

A Multi-Ray Analysis of LOS V2V Links for Multiple Antennas with Ground Reflection

Author(s): Amir Hossein Farzamiyan, Miguel Gutierrez Gaitan, Ramiro Samano-Robles
Published in: 2020 AEIT International Annual Conference (AEIT), 2020, Page(s) 1-6
DOI: 10.23919/aeit50178.2020.9241147

CESAR - A Testbed Infrastructure to Evaluate the Efficiency of Wireless Automotive Software Updates

Author(s): Marco Steger, Carlo A. Boano, Kay Römer, Michael Karner, Joachim Hillebrand, Werner Rom
Published in: Proceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems, 2017, Page(s) 311-315
DOI: 10.1145/3127540.3127580

Characterizing and Optimizing Piezo Harvesters for Train Interiors

Author(s): Milan Saliya (TUD), Nikolaos Kouvelas (TUD), R. Venkatesha Prasad (TUD), Niels Hokke (TUD)
Published in: 2020

Stability and Delay of Network-Diversity Multiple Access with Backlog Retransmission Control

Author(s): Ramiro Robles
Published in: 2017

System Software Reliability

Author(s): Willem D. Van Driel, J.W. Bikker, M. Tijink
Published in: 2020 21st International Conference on Thermal, Mechanical and Multi-Physics Simulation and Experiments in Microelectronics and Microsystems (EuroSimE), 2020, Page(s) 1-5
DOI: 10.1109/eurosime48426.2020.9152686

A Model for Metricising Privacy and Legal Compliance

Author(s): Ian Oliver, Yoan Miche, Wei Ren
Published in: 2018 11th International Conference on the Quality of Information and Communications Technology (QUATIC), 2018, Page(s) 229-237
DOI: 10.1109/quatic.2018.00041

Poster: Accurate Cross-Technology Clock Synchronization Among Off-the-Shelf Wireless Devices

Author(s): David Grubmair, Rainer Hofmann, Carlo Alberto Boano, and Kay Roemer
Published in: 2020

Evaluating the Performance of eMTC and NB-IoT for Smart City Applications

Author(s): Mohieddine El Soussi, Pouria Zand, Frank Pasveer, Guido Dolmans
Published in: 2018 IEEE International Conference on Communications (ICC), 2018, Page(s) 1-7
DOI: 10.1109/icc.2018.8422799

Performance Analysis of ITS-G5 for Smart Train Composition Coupling

Author(s): Arrate Alonso Gomez, Erislandy Mozo, Laura Bernado, Stefan Zelenbaba, Thomas Zemen, Francisco Parrilla, Adrian Alberdi
Published in: 2018 16th International Conference on Intelligent Transportation Systems Telecommunications (ITST), 2018, Page(s) 1-7
DOI: 10.1109/itst.2018.8566840

Improving the Timeliness of Bluetooth Low Energy in Noisy RF Environments

Author(s): Michael Spoerk, Carlo Alberto Boano, and Kay Roemer
Published in: 2019

Improving the Reliability of Bluetooth Low Energy Connections

Author(s): Michael Spoerk, Jiska Classen, Carlo Alberto Boano, Matthias Hollick, and Kay Roemer
Published in: 2020

MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications

Author(s): Ramiro Samano-Robles
Published in: 2019 Eighth International Conference on Emerging Security Technologies (EST), 2019, Page(s) 1-7
DOI: 10.1109/est.2019.8806208

Wireless avionics intra-communications: Current trends and design issues

Author(s): Ramiro Samano-Robles, Eduardo Tovar, Joao Cintra, Andre Rocha
Published in: 2016 Eleventh International Conference on Digital Information Management (ICDIM), 2016, Page(s) 266-273
DOI: 10.1109/icdim.2016.7829798

Cross-Federation Identities for IoT Devices in Cellular Networks

Author(s): Bernardo Santos, Bruno Dzogovic, Boning Feng, Van Thuan Do, Niels Jacot, Thanh Van Do
Published in: 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, Page(s) 1745-1751
DOI: 10.1109/etfa.2019.8868982

Towards federated unsupervised representation learning

Author(s): Bram van Berlo, Aaqib Saeed, Tanir Ozcelebi
Published in: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, 2020, Page(s) 31-36
DOI: 10.1145/3378679.3394530

Efficient Power Sharing at the Edge by Building a Tangible Micro-Grid – the Texas Case

Author(s): Nikos Kouvelas, R. Venkatesha Prasad, Akshay U Nambi
Published in: ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 2020, Page(s) 1-6
DOI: 10.1109/icc40277.2020.9148918

Scene Understanding for Safety Analysis in Human-Robot Collaborative Operations

Author(s): Hassam Riaz, Ahmad Terra, Klaus Raizer, Rafia Inam, Alberto Hata
Published in: 2020 6th International Conference on Control, Automation and Robotics (ICCAR), 2020, Page(s) 722-731
DOI: 10.1109/iccar49639.2020.9108083

Guard-Time Design for Symmetric Synchronization in IEEE 802.15.4 Time-Slotted Channel Hopping

Author(s): Rasool Tavakoli, Majid Nabi, Twan Basten, Kees Goossens
Published in: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 2018, Page(s) 1-5
DOI: 10.1109/VTCSpring.2018.8417667

PEAT, how much am i burning?

Author(s): Akshay Uttama Nambi S. N., Venkatesha Prasad R, Antonio Reyes Lua, Luis Gonzalez
Published in: Proceedings of the 9th ACM Multimedia Systems Conference on - MMSys '18, 2018, Page(s) 316-327
DOI: 10.1145/3204949.3204951

Testbed for security orchestration in a network function virtualization environment

Author(s): Aapo Kalliola, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, Silke Holtmanns
Published in: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2017, Page(s) 1-4
DOI: 10.1109/NFV-SDN.2017.8169857

A Language-Based Approach to Prevent DDoS Attacks in Distributed Object Systems

Author(s): Ramezanifarkhani, Toktam; Fazeldehkordi, Elahe & Owe, Olaf
Published in: The 29th Nordic Workshop on Programming Theory (NWPT'17), 2017, Page(s) 19 - 21

Joint Beamforming, Terminal Scheduling, and Adaptive Modulation with Imperfect CSIT in Rayleigh Fading Correlated Channels with Co-channel Interference

Author(s): Ramiro Samano-Robles
Published in: The Second International Conference on Advances in Signal, Image and Video Processing - from Sensing to Applications, 2017

BLEach - Exploiting the Full Potential of IPv6 over BLE in Constrained Embedded IoT Devices

Author(s): Michael Spörk, Carlo Alberto Boano, Marco Zimmerling, Kay Römer
Published in: Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems - SenSys '17, 2017, Page(s) 1-14
DOI: 10.1145/3131672.3131687

Data Visualization Support for Complex Logistics Operations and Cyber-Physical Systems

Author(s): Didem Gürdür, Klaus Raizer, Jad El-Khoury
Published in: Proceedings of the 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 2018, Page(s) 200-211
DOI: 10.5220/0006569402000211

Improving the efficiency and responsiveness of smart objects using adaptive BLE device discovery

Author(s): Tobias Renzler, Michael Spörk, Carlo Alberto Boano, Kay Römer
Published in: Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects - SMARTOBJECTS '18, 2018, Page(s) 1-10
DOI: 10.1145/3213299.3213306

A unified architecture for integrating energy harvesting IoT devices with the Mobile Edge Cloud

Author(s): V. Balasubramanian, N. Kouvelas, K. Chandra, R. V. Prasad, A. G. Voyiatzis, W. Liu
Published in: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 2018, Page(s) 13-18
DOI: 10.1109/WF-IoT.2018.8355198

Period estimation with linear complexity of sparse time varying point processes

Author(s): Hans-Peter Bernhard, Bernhard Etzlinger, Andreas Springer
Published in: 2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017, Page(s) 767-771
DOI: 10.1109/ACSSC.2017.8335449

5G micro-operator networks — A key enabler for new verticals and markets

Author(s): Athul Prasad, Zexian Li, Silke Holtmanns, Mikko A. Uusitalo
Published in: 2017 25th Telecommunication Forum (TELFOR), 2017, Page(s) 1-4
DOI: 10.1109/telfor.2017.8249272

A research agenda for vehicle information systems

Author(s): Kaiser, C., Stocker, A., Festl, A., Lechner, G. C., & Fellmann, M.
Published in: European Conference on Information Systems (ECIS), 2018

On inferring how resources are shared in IoT ecosystems; a graph theoretic approach

Author(s): N. Kouvelas, V. Balasubramanian, A. G. Voyiatzis, R. R. Prasad, D. Pesch
Published in: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 2018, Page(s) 760-766
DOI: 10.1109/WF-IoT.2018.8355137

Energy balanced routing for latency minimized wireless sensor networks

Author(s): Hans-Peter Bernhard, Andreas Springer, Peter Priller, Leander B. Hormann
Published in: 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), 2018, Page(s) 1-9
DOI: 10.1109/WFCS.2018.8402350

Securing the Internet of Things with Recursive InterNetwork Architecture (RINA)

Author(s): Toktam Ramezanifarkhani, Peyman Teymoori
Published in: 2018 International Conference on Computing, Networking and Communications (ICNC), 2018, Page(s) 188-194
DOI: 10.1109/ICCNC.2018.8390263

Improving lifecycle query in integrated toolchains using linked data and MQTT-based data warehousing

Author(s): Andrii Berezovskyi, Jad El-khoury, Omar Kacimi, Frédéric Loiret
Published in: IoT Connected World & Semantic Interoperability Workshop 2017, 2017

SALMA - UWB-based Single-Anchor Localization System using Multipath Assistance

Author(s): Bernhard Großwindhager, Michael Rath, Josef Kulmer, Mustafa S. Bakr, Carlo Alberto Boano, Klaus Witrisal, Kay Römer
Published in: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems - SenSys '18, 2018, Page(s) 132-144
DOI: 10.1145/3274783.3274844

Optimum Sampling for Packet Assisted Round Trip Time Measurement

Author(s): Hans-Peter Bernhard, Bernhard Etzlinger, Andreas Springer
Published in: ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019, Page(s) 4629-4633
DOI: 10.1109/icassp.2019.8683884

Cooperative Coexistence of BLE and Time Slotted Channel Hopping Networks

Author(s): Onur Carhacioglu, Pouria Zand, Majid Nabi
Published in: 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2018, Page(s) 1-7
DOI: 10.1109/pimrc.2018.8580918

Pushing the Boundaries of IoT: Building and Testing Self-powered Batteryless Switch

Author(s): Nikolaos Kouvelas, Ajay Keshava K, Sujay Narayana, R. Venkatesha Prasad
Published in: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 2019, Page(s) 231-236
DOI: 10.1109/wf-iot.2019.8767185

Internet of Things: Over-the-Air (OTA) firmware update in Lightweight mesh network protocol for smart urban development

Author(s): Hans Chandra, Erwin Anggadjaja, Pranata Setya Wijaya, Edy Gunawan
Published in: 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016, Page(s) 115-118
DOI: 10.1109/apcc.2016.7581459

Identity Federation for Cellular Internet of Things

Author(s): Bernardo Santos, Van Thuan Do, Boning Feng, Thanh van Do
Published in: Proceedings of the 2018 7th International Conference on Software and Computer Applications - ICSCA 2018, 2018, Page(s) 223-228
DOI: 10.1145/3185089.3185132

Building Trustable Remote Monitoring and Management Systems

Author(s): Maghsoud Morshedi, Josef Noll, Raheleh Kari
Published in: 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion), 2018, Page(s) 213-219
DOI: 10.1109/ucc-companion.2018.00059

Reducing Inequalities with 5G Internet Light Network Slice

Author(s): Thanh van Do, Josef Noll, Sudhir Dixit, Bruno Dzogovic, Van Thuan Do, Boning Feng
Published in: 2018 IEEE 5G World Forum (5GWF), 2018, Page(s) 38-43
DOI: 10.1109/5gwf.2018.8516713

Building virtualized 5G networks using open source software

Author(s): Bruno Dzogovic, Van Thuan Do, Boning Feng, Thanh van Do
Published in: 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), 2018, Page(s) 360-366
DOI: 10.1109/iscaie.2018.8405499

Towards a Standardized Identity Federation for Internet of Things in 5G Networks

Author(s): Bernardo Santos, Van Thuan Do, Boning Feng, Thanh van Do
Published in: 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 2018, Page(s) 2082-2088
DOI: 10.1109/smartworld.2018.00349

UE-Based Estimation of Available Uplink Data Rates in Cellular Networks

Author(s): Georgi Nikolov, Michael Kuhn, Bernd-Ludwig Wenning
Published in: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2018, Page(s) 169-174
DOI: 10.1109/wimob.2018.8589097

Towards a Generic IoT Platform for Data-driven Vehicle Services

Author(s): Efi Papatheocharous, Emmanuel Frecon, Christian Kaiser, Andreas Festl, Alexander Stocker
Published in: 2018 IEEE International Conference on Vehicular Electronics and Safety (ICVES), 2018, Page(s) 1-6
DOI: 10.1109/icves.2018.8519505

Influence of ESPAR antenna radiation patterns shape on PPCC-based DoA estimation accuracy

Author(s): M. Rzymowski, L. Kulas
Published in: 2018 22nd International Microwave and Radar Conference (MIKON), 2018, Page(s) 69-72
DOI: 10.23919/mikon.2018.8405327

Hummingbird - energy efficient GPS receiver for small satellites

Author(s): S. Narayana, R. V. Prasad, V. Rao, L. Mottola, T. V. Prabhakar
Published in: Proceedings of the 26th Annual International Conference on Mobile Computing and Networking, 2020, Page(s) 1-13
DOI: 10.1145/3372224.3380886

AI-based Safety Analysis for Collaborative Mobile Robots

Author(s): Alberto Hata, Rafia Inam, Klaus Raizer, Shaolei Wang, Enyu Cao
Published in: 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, Page(s) 1722-1729
DOI: 10.1109/etfa.2019.8869263

PADL: a Language for the Operationalization of Distributed Analytical Pipelines over Edge/Fog Computing Environments

Author(s): Josu Diaz-de-Arcaya, Raul Minon, Ana I. Torre-Bastida, Javier Del Ser, Aitor Almeida
Published in: 2020 5th International Conference on Smart and Sustainable Technologies (SpliTech), 2020, Page(s) 1-6
DOI: 10.23919/splitech49282.2020.9243735

Estimating Crowd Distribution Using Smart Bulbs

Author(s): R. Manjappa, V. Rao, R. V. Prasad, A. Sinitsyn
Published in: 2019 IEEE Global Communications Conference (GLOBECOM), 2019, Page(s) 1-6
DOI: 10.1109/globecom38437.2019.9013155

Reduced Complexity Approach for Uplink Rate Trajectory Prediction in Mobile Networks

Author(s): Georgi Nikolov, Michael Kuhn, Alan McGibney, Bernd-Ludwig Wenning
Published in: 2020 31st Irish Signals and Systems Conference (ISSC), 2020, Page(s) 1-6
DOI: 10.1109/issc49989.2020.9180156

A Distributed Framework Towards Local and Online Service Access

Author(s): Alexander Rech, Maximilian Kammerer, Markus Pistauer, Christian Steger
Published in: 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, Page(s) 1715-1721
DOI: 10.1109/etfa.2019.8869305

Approximated Pareto Analysis for Fast Optimization of Large IEEE 802.15.4 TSCH Networks

Author(s): Hamideh Hajizadeh, Rasool Tavakoli, Majid Nabi, Kees Goossens
Published in: 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, 2020, Page(s) 1-7
DOI: 10.1109/pimrc48278.2020.9217251

End-to-End Multi-Modal Behavioral Context Recognition in a Real-Life Setting

Author(s): Aaqib Saeed ; Tanir Ozcelebi; Stojan Trajanovski; Johan J. Lukkien
Published in: 2019

Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach

Author(s): Michal Tarkowski, Mateusz Burtowy, Mateusz Rzymowski, Krzysztof Nyka, Mateusz Groth, Lukasz Kulas
Published in: 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, Page(s) 1759-1763
DOI: 10.1109/etfa.2019.8868967

An Experimental Performance Evaluation of Bluetooth Mesh Technology for Monitoring Applications

Author(s): Eduardo De Leon, Majid Nabi
Published in: 2020 IEEE Wireless Communications and Networking Conference (WCNC), 2020, Page(s) 1-6
DOI: 10.1109/wcnc45663.2020.9120762

Investigation of continuous wave jamming in an IEEE 802.15.4 network

Author(s): J. Rewienski, M. Groth, L. Kulas, K. Nyka
Published in: 2018 22nd International Microwave and Radar Conference (MIKON), 2018, Page(s) 242-246
DOI: 10.23919/mikon.2018.8405189

AT-MFCGA: An Adaptive Transfer-guided Multifactorial Cellular Genetic Algorithm for Evolutionary Multitasking

Author(s): Eneko Osabaa, Javier Del Sera,b,c, Aritz D. Martineza, Jesus L. Loboa, Francisco Herrera
Published in: 2021

A Methodology for Security Classification applied to Smart Grid Infrastructures

Author(s): Manish Shrestha, Christian Johansen, Josef Noll, Davide Roverso
Published in: International Journal of Critical Infrastructure Protection, Issue 28, 2020, Page(s) 100342, ISSN 1874-5482
DOI: 10.1016/j.ijcip.2020.100342

Simple 60 GHz Switched Beam Antenna for 5G Millimeter-Wave Applications

Author(s): Kamil Trzebiatowski, Mateusz Rzymowski, Lukasz Kulas, Krzysztof Nyka
Published in: IEEE Antennas and Wireless Propagation Letters, 2020, Page(s) 1-1, ISSN 1536-1225
DOI: 10.1109/lawp.2020.3038260

Mobile Subscriber Profile DataPrivacy Breach via 4GDiameter Interconnection

Author(s): Silke Holtmanns, Ian Oliver, Yoan Miche
Published in: Journal of ICT Standardization, Issue 6/3, 2018, Page(s) 245-262, ISSN 2245-800X
DOI: 10.13052/jicts2245-800x.634

Coexistence Analysis of Multiple Asynchronous IEEE 802.15.4 TSCH-Based Networks

Author(s): Farzad Veisi, Majid Nabi, Hossein Saidi
Published in: IEEE Access, Issue 8, 2020, Page(s) 150573-150585, ISSN 2169-3536
DOI: 10.1109/access.2020.3016770

Analyzing the Tradeoffs in Using Millimeter Wave Directional Links for High Data-Rate Tactile Internet Applications

Author(s): Kishor Chandra Joshi, Solmaz Niknam, R. Venkatesha Prasad, Balasubramaniam Natarajan
Published in: IEEE Transactions on Industrial Informatics, Issue 16/3, 2020, Page(s) 1924-1932, ISSN 1551-3203
DOI: 10.1109/tii.2019.2931703

ASR - Adaptive Similarity-Based Regressor for Uplink Data Rate Estimation in Mobile Networks

Author(s): Georgi Nikolov, Michael Kuhn, Alan McGibney, Bernd-Ludwig Wenning
Published in: IEEE Journal on Selected Areas in Communications, Issue 38/10, 2020, Page(s) 2284-2294, ISSN 0733-8716
DOI: 10.1109/jsac.2020.3000414

Assessment of perceived indoor environmental quality, stress and productivity based on environmental sensor data and personality categorization

Author(s): Johanna Kallio, Elena Vildjiounaite, Jani Koivusaari, Pauli Räsänen, Heidi Similä, Vesa Kyllönen, Salla Muuraiskangas, Jussi Ronkainen, Jari Rehu, Kaisa Vehmas
Published in: Building and Environment, Issue 175, 2020, Page(s) 106787, ISSN 0360-1323
DOI: 10.1016/j.buildenv.2020.106787

Sensor selection and fusion using subjective logic

Author(s): E. El Mahassni
Published in: International Journal of Intelligent Defence Support Systems, Issue 5/2, 2014, Page(s) 95, ISSN 1755-1587
DOI: 10.1504/ijidss.2014.059960

Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space

Author(s): Buse Gul Atli, Yoan Miche, Aapo Kalliola, Ian Oliver, Silke Holtmanns, Amaury Lendasse
Published in: Cognitive Computation, Issue June 2018, 2018, ISSN 1866-9956
DOI: 10.1007/s12559-018-9564-y

Opportunities and challenges in using energy-harvesting for NB-IoT

Author(s): A. Haridas, V. S. Rao, R. V. Prasad, C. Sarkar
Published in: ACM SIGBED Review, Issue 15/5, 2018, Page(s) 7-13, ISSN 1551-3688
DOI: 10.1145/3292384.3292386

Stability and Delay of NDMA-MPR Protocol in Rice-Correlated Channels with Co-Channel Interference

Author(s): Ramiro Sámano-Robles
Published in: Technologies, Issue 7/1, 2019, Page(s) 22, ISSN 2227-7080
DOI: 10.3390/technologies7010022

A Framework for Privacy Quantification: Measuring the Impact of Privacy Techniques Through Mutual Information, Distance Mapping, and Machine Learning

Author(s): Yoan Miche, Wei Ren, Ian Oliver, Silke Holtmanns, Amaury Lendasse
Published in: Cognitive Computation, Issue 11/2, 2019, Page(s) 241-261, ISSN 1866-9956
DOI: 10.1007/s12559-018-9604-7

Knowledge Representation of Cyber-physical Systems for Monitoring Purpose

Author(s): Didem Gürdür, Aneta Vulgarakis Feljan, Jad El-khoury, Swarup Kumar Mohalik, Ramamurthy Badrinath, Anusha Pradeep Mujumdar, Elena Fersman
Published in: Procedia CIRP, Issue 72, 2018, Page(s) 468-473, ISSN 2212-8271
DOI: 10.1016/j.procir.2018.03.018

Active flow control using dense wireless sensor and actuator networks

Author(s): Ramiro Sámano, Julio Viana, Nelson Ferreira, João Loureiro, João Cintra, André Rocha, Eduardo Tovar
Published in: Microprocessors and Microsystems, Issue 61, 2018, Page(s) 279-295, ISSN 0141-9331
DOI: 10.1016/j.micpro.2018.05.012

Multi-task Self-Supervised Learning for Human Activity Detection

Author(s): Aaqib Saeed, Tanir Ozcelebi, Johan Lukkien
Published in: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Issue 3/2, 2019, Page(s) 1-30, ISSN 2474-9567
DOI: 10.1145/3328932

Synthesizing and Reconstructing Missing Sensory Modalities in Behavioral Context Recognition

Author(s): Aaqib Saeed, Tanir Ozcelebi, Johan Lukkien
Published in: Sensors, Issue 18/9, 2018, Page(s) 2967, ISSN 1424-8220
DOI: 10.3390/s18092967

Understanding and Improving the Performance of Constructive Interference Using Destructive Interference in WSNs

Author(s): Vijay S. Rao, R. Venkatesha Prasad, T. V. Prabhakar, Chayan Sarkar, Madhusudan Koppal, Ignas Niemegeers
Published in: IEEE/ACM Transactions on Networking, Issue 27/2, 2019, Page(s) 505-517, ISSN 1063-6692
DOI: 10.1109/tnet.2019.2893597

Low-Profile ESPAR Antenna for RSS-Based DoA Estimation in IoT Applications

Author(s): Mateusz Burtowy, Mateusz Rzymowski, Lukasz Kulas
Published in: IEEE Access, Issue 7, 2019, Page(s) 17403-17411, ISSN 2169-3536
DOI: 10.1109/access.2019.2895740

RSS-Based DoA Estimation for ESPAR Antennas Using Support Vector Machine

Author(s): M. Tarkowski, L. Kulas
Published in: IEEE Antennas and Wireless Propagation Letters, Issue 18/4, 2019, Page(s) 561-565, ISSN 1536-1225
DOI: 10.1109/lawp.2019.2891021

Dependable Interference-Aware Time-Slotted Channel Hopping for Wireless Sensor Networks

Author(s): Rasool Tavakoli, Majid Nabi, Twan Basten, Kees Goossens
Published in: ACM Transactions on Sensor Networks, Issue 14/1, 2018, Page(s) 1-35, ISSN 1550-4859
DOI: 10.1145/3158231

Topology Management and TSCH Scheduling for Low-Latency Convergecast in In-Vehicle WSNs

Author(s): Rasool Tavakoli, Majid Nabi, Twan Basten, Kees Goossens
Published in: IEEE Transactions on Industrial Informatics, Issue 15/2, 2019, Page(s) 1082-1093, ISSN 1551-3203
DOI: 10.1109/tii.2018.2853986

Cooperative Multi-Agent Planning

Author(s): Alejandro Torreño, Eva Onaindia, Antonín Komenda, Michal Štolba
Published in: ACM Computing Surveys, Issue 50/6, 2018, Page(s) 1-32, ISSN 0360-0300
DOI: 10.1145/3128584

Forecasting office indoor CO2 concentration using machine learning with a one-year dataset

Author(s): Johanna Kallio, Jaakko Tervonen, Pauli Räsänen, Riku Mäkynen, Jani Koivusaari, Johannes Peltola
Published in: Building and Environment, Issue 187, 2021, Page(s) 107409, ISSN 0360-1323
DOI: 10.1016/j.buildenv.2020.107409

A Modular IoT Hardware Platform for Distributed and Secured Extreme Edge Computing

Author(s): Pablo Merino, Gabriel Mujica, Jaime Señor, Jorge Portilla
Published in: Electronics, Issue 9/3, 2020, Page(s) 538, ISSN 2079-9292
DOI: 10.3390/electronics9030538

FLEET: When Time-Bounded Communication Meets High Energy-Efficiency

Author(s): Chayan Sarkar, R. Venkatesha Prasad, Koen Langendoen
Published in: IEEE Access, Issue 7, 2019, Page(s) 77555-77568, ISSN 2169-3536
DOI: 10.1109/access.2019.2920937

Radar with rotary head

Author(s): Kacper Zubiel
Published in: 2019

A system for Direction-Of-Arrival estimation in ISM 2.4 GHz frequency band based on ESPAR antenna and SDR technology

Author(s): Przemyslaw Kwapisiewicz
Published in: 2018

Carbon dioxide level prediction for indoor air using neural networks

Author(s): Riku Mäkynen
Published in: 2020

Applications of NFC 13.56 MHz technology for distribution and verification of authorization in access control systems

Author(s): Patryk Kaczmarek
Published in: 2017

Visualizing Autonomous Warehouse Data Streams Through User-Centered Design

Author(s): Raghu Nayyar, Didem Gürdür Broo, Aneta Vulgarakis Feljan
Published in: 2019
DOI: 10.13140/rg.2.2.24334.61760

RD Velho IoT Security model : secure technology, process and tools

Author(s): Tarmo Kellomäki
Published in: 2019

Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept

Author(s): Marco Steger, Ali Dorri, Salil S. Kanhere, Kay Römer, Raja Jurdak, Michael Karner
Published in: Advanced Microsystems for Automotive Applications 2017, 2018, Page(s) 137-149
DOI: 10.1007/978-3-319-66972-4_12

Behavioural modelling of attackers’ choices

Author(s): S. Panda, I. Oliver, S. Holtmanns
Published in: Safety and Reliability – Safe Societies in a Changing World, 2018, Page(s) 119-126
DOI: 10.1201/9781351174664-15

Towards a Privacy-Preserving Way of Vehicle Data Sharing – A Case for Blockchain Technology?

Author(s): Christian Kaiser, Marco Steger, Ali Dorri, Andreas Festl, Alexander Stocker, Michael Fellmann, Salil Kanhere
Published in: Advanced Microsystems for Automotive Applications 2018 - Smart Systems for Clean, Safe and Shared Road Vehicles, 2019, Page(s) 111-122
DOI: 10.1007/978-3-319-99762-9_10

Classifying Teachers’ Self-reported Productivity, Stress and Indoor Environmental Quality Using Environmental Sensors

Author(s): Johanna Kallio, Elena Vildjiounaite, Vesa Kyllönen, Jussi Ronkainen, Jani Koivusaari, Salla Muuraiskangas, Pauli Räsänen, Heidi Similä, Kaisa Vehmas
Published in: Ambient Intelligence - 15th European Conference, AmI 2019, Rome, Italy, November 13–15, 2019, Proceedings, Issue 11912, 2019, Page(s) 27-40
DOI: 10.1007/978-3-030-34255-5_3

A secrecy-preserving language for distributed and object-oriented systems

Author(s): Toktam Ramezanifarkhani, Olaf Owe, Shukun Tokas
Published in: Journal of Logical and Algebraic Methods in Programming, Issue 99, 2018, Page(s) 1-25, ISSN 2352-2208
DOI: 10.1016/j.jlamp.2018.04.001

Electronic Components and Systems for Automotive Applications - Proceedings of the 5th CESA Automotive Electronics Congress, Paris, 2018

Author(s): Eric Armengaud , Bernhard Peischl , Peter Priller , Omar Veledar
Published in: 2019
DOI: 10.1007/978-3-030-14156-1