default search action
Lothar Braun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j5]Corinna Schmitt, Thomas Kothmayr, Benjamin Ertl, Wen Hu, Lothar Braun, Georg Carle:
TinyIPFIX: An efficient application protocol for data exchange in cyber physical systems. Comput. Commun. 74: 63-76 (2016) - [i3]Lothar Braun, Cornelius Diekmann, Nils Kammenhuber, Georg Carle:
Adaptive Load-Aware Sampling for Network Monitoring on Multicore Commodity Hardware. CoRR abs/1604.02322 (2016) - 2015
- [c14]Timm Böttger, Lothar Braun, Oliver Gasser, Felix von Eye, Helmut Reiser, Georg Carle:
DoS Amplification Attacks - Protocol-Agnostic Detection of Service Abuse in Amplifier Networks. TMA 2015: 205-218 - 2014
- [b1]Lothar Braun:
Traffic Analysis on High-Speed Internet Links. Technical University Munich, 2014, pp. 1-198 - [j4]Lothar Braun, Mario Volke, Johann Schlamp, Alexander von Bodisco, Georg Carle:
Flow-inspector: a framework for visualizing network flow data using current web technologies. Computing 96(1): 15-26 (2014) - [j3]Alexander von Bodisco, Lothar Braun, Georg Carle:
A preamble-based approach for providing quality of service support in wireless sensor networks. Telecommun. Syst. 56(2): 257-268 (2014) - 2013
- [c13]Lothar Braun, Cornelius Diekmann, Nils Kammenhuber, Georg Carle:
Adaptive load-aware sampling for network monitoring on multicore commodity hardware. Networking 2013: 1-9 - 2012
- [c12]Lothar Braun, Alexander Klein, Georg Carle, Helmut Reiser, Jochen Eisl:
Analyzing caching benefits for YouTube traffic in edge networks - A measurement-based evaluation. NOMS 2012: 311-318 - [c11]Alexander Klein, Lothar Braun, Fabian Oehlmann:
Performance study of the Better Approach to Mobile Adhoc Networking (B.A.T.M.A.N.) protocol in the context of asymmetric links. WOWMOM 2012: 1-7 - 2011
- [c10]Lothar Braun, Alexander Klein, Leon Aaron Kaplan, Georg Carle:
Detecting incidents in wireless mesh networks using flow and routing information. GI-Jahrestagung 2011: 111 - [c9]Ralph Holz, Lothar Braun, Nils Kammenhuber, Georg Carle:
The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements. Internet Measurement Conference 2011: 427-444 - [c8]Gerhard Münz, Stephan Heckmüller, Lothar Braun, Georg Carle:
Improving Markov-based TCP Traffic Classification. KiVS 2011: 61-72 - [c7]Alexander Klein, Lothar Braun:
A Preamble-Based Approach for Providing Quality of Service Support in Wireless Sensor Networks. MACOM 2011: 144-155 - 2010
- [j2]Stephan Heckmüller, Gerhard Münz, Lothar Braun, Aaron Kunde, Bernd E. Wolfinger, Georg Carle:
Lasttransformation durch Rekonstruktion von Auftragslängen anhand von Paketdaten. Prax. Inf.verarb. Kommun. 33(2): 113-120 (2010) - [j1]Gerhard Münz, Lothar Braun, Hui Dai, Georg Carle:
TCP-Verkehrsklassifizierung mit Markov-Modellen. Prax. Inf.verarb. Kommun. 33(2): 121-129 (2010) - [c6]Thomas Kothmayr, Corinna Schmitt, Lothar Braun, Georg Carle:
Gathering Sensor Data in Home Networks with IPFIX. EWSN 2010: 131-146 - [c5]Lothar Braun, Alexander Didebulidze, Nils Kammenhuber, Georg Carle:
Comparing and improving current packet capturing solutions based on commodity hardware. Internet Measurement Conference 2010: 206-217 - [c4]Corinna Schmitt, Lothar Braun, Thomas Kothmayr, Georg Carle:
Collecting sensor data using compressed IPFIX. IPSN 2010: 390-391 - [c3]Lothar Braun, Gerhard Münz, Georg Carle:
Packet sampling for worm and botnet detection in TCP connections. NOMS 2010: 264-271 - [c2]Gerhard Münz, Hui Dai, Lothar Braun, Georg Carle:
TCP Traffic Classification Using Markov Models. TMA 2010: 127-140
2000 – 2009
- 2009
- [c1]Corinna Schmitt, Lothar Braun, Georg Carle:
IPFIX for wireless sensors in home networks. Wireless Days 2009: 1-5 - 2008
- [i2]Lothar Braun, Torsten Braun, Georg Carle, Falko Dressler, Anja Feldmann, Dirk Haage, Tobias Limmer, Tanja Zseby:
08102 Working Group -- Measurement Requirements. Network Attack Detection and Defense 2008 - [i1]Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, James P. G. Sterbenz:
08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. Network Attack Detection and Defense 2008
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint