default search action
Joachim Fabini
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Bernhard Brenner, Joachim Fabini, Magnus Offermanns, Sabrina Semper, Tanja Zseby:
Malware communication in smart factories: A network traffic data set. Comput. Networks 255: 110804 (2024) - 2023
- [j21]Friederich Kupzog, Joachim Fabini, Tanja Zseby:
Communications for Energy Systems. Elektrotech. Informationstechnik 140(5): 417-418 (2023) - 2022
- [c32]Alexander Hartl, Joachim Fabini, Tanja Zseby:
Separating Flows in Encrypted Tunnel Traffic. ICMLA 2022: 609-616 - [i13]J. Alvarez-Hamelin, Al Morton, Joachim Fabini, Carlos Pignataro, Rüdiger Geib:
Advanced Unidirectional Route Assessment (AURA). RFC 9198: 1-23 (2022) - 2021
- [c31]Alexander Hartl, Joachim Fabini, Christoph Roschger, Peter Eder-Neuhauser, Marco Petrovic, Roman Tobler, Tanja Zseby:
Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures. ARES 2021: 78:1-78:11 - [c30]Joachim Fabini, Alexander Hartl, Fares Meghdouri, Claudia Breitenfellner, Tanja Zseby:
SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories. ARES 2021: 148:1-148:11 - [i12]Maximilian Bachl, Joachim Fabini, Tanja Zseby:
A flow-based IDS using Machine Learning in eBPF. CoRR abs/2102.09980 (2021) - 2020
- [j20]Gernot Vormayr, Joachim Fabini, Tanja Zseby:
Why are My Flows Different? A Tutorial on Flow Exporters. IEEE Commun. Surv. Tutorials 22(3): 2064-2103 (2020) - [j19]Florian Skopik, Max Landauer, Markus Wurzenberger, Gernot Vormayr, Jelena Milosevic, Joachim Fabini, Wolfgang Prüggler, Oskar Kruschitz, Benjamin Widmann, Kevin Truckenthanner, Stefan Rass, Michael Simmer, Christoph Zauner:
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems. J. Inf. Secur. Appl. 54: 102544 (2020) - [c29]Alexander Hartl, Maximilian Bachl, Joachim Fabini, Tanja Zseby:
Explainability and Adversarial Robustness for RNNs. BigDataService 2020: 148-156 - [c28]Maximilian Bachl, Fares Meghdouri, Joachim Fabini, Tanja Zseby:
SparseIDS: Learning Packet Sampling with Reinforcement Learning. CNS 2020: 1-9 - [c27]Maximilian Bachl, Joachim Fabini, Tanja Zseby:
LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning. LCN 2020: 417-420 - [i11]Maximilian Bachl, Fares Meghdouri, Joachim Fabini, Tanja Zseby:
SparseIDS: Learning Packet Sampling with Reinforcement Learning. CoRR abs/2002.03872 (2020) - [i10]Maximilian Bachl, Joachim Fabini, Tanja Zseby:
LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning. CoRR abs/2007.02735 (2020) - [i9]Maximilian Bachl, Joachim Fabini, Tanja Zseby:
Optimizing Congestion Control Through Fair Queuing Detection. CoRR abs/2010.08362 (2020) - [i8]Tal Mizrahi, Joachim Fabini, Al Morton:
Guidelines for Defining Packet Timestamps. RFC 8877: 1-17 (2020)
2010 – 2019
- 2019
- [j18]Peter Eder-Neuhauser, Tanja Zseby, Joachim Fabini:
Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types. J. Comput. Virol. Hacking Tech. 15(2): 109-125 (2019) - [c26]Alexander Hartl, Tanja Zseby, Joachim Fabini:
BeaconBlocks: Augmenting Proof-of-Stake with On-Chain Time Synchronization. Blockchain 2019: 353-360 - [c25]Maximilian Bachl, Joachim Fabini, Tanja Zseby:
Cocoa: Congestion Control Aware Queuing. BS 2019: 1:1-1:7 - [c24]Maximilian Bachl, Alexander Hartl, Joachim Fabini, Tanja Zseby:
Walling up Backdoors in Intrusion Detection Systems. Big-DAMA@CoNEXT 2019: 8-13 - [c23]Maximilian Bachl, Tanja Zseby, Joachim Fabini:
Rax: Deep Reinforcement Learning for Congestion Control. ICC 2019: 1-6 - [i7]Maximilian Bachl, Alexander Hartl, Joachim Fabini, Tanja Zseby:
Walling up Backdoors in Intrusion Detection Systems. CoRR abs/1909.07866 (2019) - [i6]Maximilian Bachl, Joachim Fabini, Tanja Zseby:
Cocoa: Congestion Control Aware Queuing. CoRR abs/1910.10604 (2019) - [i5]Alexander Hartl, Maximilian Bachl, Joachim Fabini, Tanja Zseby:
Explainability and Adversarial Robustness for RNNs. CoRR abs/1912.09855 (2019) - 2018
- [j17]Peter Eder-Neuhauser, Tanja Zseby, Joachim Fabini:
Malware propagation in smart grid monocultures. Elektrotech. Informationstechnik 135(3): 264-269 (2018) - [c22]Robert Annessi, Joachim Fabini, Tanja Zseby:
To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G Networks. ARES 2018: 43:1-43:7 - [i4]Robert Annessi, Joachim Fabini, Félix Iglesias, Tanja Zseby:
Encryption is Futile: Delay Attacks on High-Precision Clock Synchronization. CoRR abs/1811.08569 (2018) - [i3]Al Morton, Joachim Fabini, Nalini J. Elkins, Michael S. Ackermann, Vinayak Hegde:
IPv4, IPv6, and IPv4-IPv6 Coexistence: Updates for the IP Performance Metrics (IPPM) Framework. RFC 8468: 1-15 (2018) - 2017
- [j16]Johanna Ullrich, Tanja Zseby, Joachim Fabini, Edgar R. Weippl:
Network-Based Secret Communication in Clouds: A Survey. IEEE Commun. Surv. Tutorials 19(2): 1112-1144 (2017) - [j15]Gernot Vormayr, Tanja Zseby, Joachim Fabini:
Botnet Communication Patterns. IEEE Commun. Surv. Tutorials 19(4): 2768-2796 (2017) - [j14]Evangelia Xypolytou, Joachim Fabini, Wolfgang Gawlik, Tanja Zseby:
The FUSE testbed: establishing a microgrid for smart grid security experiments. Elektrotech. Informationstechnik 134(1): 30-35 (2017) - [c21]Robert Annessi, Tanja Zseby, Joachim Fabini:
A New Direction for Research on Data Origin Authentication in Group Communication. CANS 2017: 515-525 - [c20]Robert Annessi, Joachim Fabini, Tanja Zseby:
It's about Time: Securing Broadcast Time Synchronization with Data Origin Authentication. ICCCN 2017: 1-11 - [c19]Evangelia Xypolytou, Tanja Zseby, Joachim Fabini, Wolfgang Gawlik:
Detection and mitigation of cascading failures in interconnected power systems. ISGT Europe 2017: 1-6 - [i2]Robert Annessi, Joachim Fabini, Tanja Zseby:
SecureTime: Secure Multicast Time Synchronization. CoRR abs/1705.10669 (2017) - 2016
- [j13]Peter Eder-Neuhauser, Tanja Zseby, Joachim Fabini:
Resilience and Security: A Qualitative Survey of Urban Smart Grid Architectures. IEEE Access 4: 839-848 (2016) - [j12]Joachim Fabini, Tanja Zseby:
The Right Time: Reducing Effective End-to-End Delay in Time-Slotted Packet-Switched Networks. IEEE/ACM Trans. Netw. 24(4): 2251-2263 (2016) - 2015
- [j11]Joachim Fabini, Tanja Zseby, Michael Hirschbichler:
Representative Delay Measurements (RDM): Facing the Challenge of Modern Networks. EAI Endorsed Trans. Energy Web 2(6): e5 (2015) - [c18]Joachim Fabini, Tanja Zseby:
M2M communication delay challenges: Application and measurement perspectives. I2MTC 2015: 1859-1864 - 2014
- [j10]Tanja Zseby, Joachim Fabini, Dipika Rani:
Synchrophasor communication. Elektrotech. Informationstechnik 131(1): 8-13 (2014) - [j9]Tanja Zseby, Joachim Fabini:
Security Challenges for Wide Area Monitoring in Smart Grids. Elektrotech. Informationstechnik 131(3): 105-111 (2014) - [c17]Joachim Fabini, Tanja Zseby, Michael Hirschbichler:
Representative Delay Measurements (RDM): Facing the Challenge of Modern Networks. VALUETOOLS 2014 - [i1]Joachim Fabini, Al Morton:
Advanced Stream and Sampling Framework for IP Performance Metrics (IPPM). RFC 7312: 1-17 (2014) - 2013
- [j8]Joachim Fabini, Michael Abmayer:
Delay Measurement Methodology Revisited: Time-Slotted Randomness Cancellation. IEEE Trans. Instrum. Meas. 62(10): 2839-2848 (2013) - [c16]Joachim Fabini, Michael Hirschbichler, Jiri Kuthan, Werner Wiedermann:
Mobile SIP: An Empirical Study on SIP Retransmission Timers in HSPA 3G Networks. EUNICE 2013: 78-89 - [c15]Markus Laner, Joachim Fabini, Philipp Svoboda, Markus Rupp:
End-to-end Delay in Mobile Networks: Does the Traffic Pattern Matter? ISWCS 2013: 1-5 - 2012
- [j7]Philipp Svoboda, Markus Laner, Joachim Fabini, Markus Rupp, Fabio Ricciato:
Packet delay measurements in reactive IP networks. IEEE Instrum. Meas. Mag. 15(6): 36-44 (2012) - [j6]Christoph Egger, Marco Happenhofer, Joachim Fabini, Peter Reichl:
Collapse Detection and Avoidance for SIP Architectures. Prax. Inf.verarb. Kommun. 35(2): 91-99 (2012) - [c14]Michael Hirschbichler, Joachim Fabini, Bernhard Seifert, Christoph Egger:
Stop the Flood - Perimeter Security- and Overload- Pre-evaluation in Carrier Grade VoIP Infrastructures. NEW2AN 2012: 359-370 - 2011
- [j5]Marco Happenhofer, Joachim Fabini, Christoph Egger, Michael Hirschbichler:
An Architectural and Evaluative Review of Implicit and Explicit SIP Overload Handling. Int. J. Meas. Technol. Instrum. Eng. 1(4): 12-27 (2011) - 2010
- [j4]Lukas Wallentin, Marco Happenhofer, Christoph Egger, Joachim Fabini:
XML Meets Simulation: Concepts and Architecture of the IBKSim Network Simulator. Simul. Notes Eur. 20(1): 16-20 (2010) - [c13]Lukas Wallentin, Joachim Fabini, Christoph Egger, Marco Happenhofer:
Cashflow: A Channel-Oriented, Credit-Based Virtual Currency System for Establishing Fairness in Ad-Hoc Networks with Selfish Nodes. ADHOCNETS 2010: 48-63 - [c12]Christoph Egger, Marco Happenhofer, Joachim Fabini, Peter Reichl:
BIQINI - A Flow-Based QoS Enforcement Architecture for NGN Services. TRIDENTCOM 2010: 653-667
2000 – 2009
- 2009
- [c11]Joachim Fabini, Lukas Wallentin, Peter Reichl:
The Importance of Being Really Random: Methodological Aspects of IP-Layer 2G and 3G Network Delay Assessment. ICC 2009: 1-6 - [c10]Joachim Fabini, Wolfgang Karner, Lukas Wallentin, Thomas Baumgartner:
The Illusion of Being Deterministic - Application-Level Considerations on Delay in 3G HSPA Networks. Networking 2009: 301-312 - 2008
- [j3]Joachim Fabini, Rudolf Pailer, Peter Reichl:
Location-based assisted handover for the IP Multimedia Subsystem. Comput. Commun. 31(10): 2367-2380 (2008) - [c9]Joachim Fabini, Peter Reichl, Alexander Poropatich:
A Generic Approach to Access Network Modeling for Next Generation Network Applications. ICNS 2008: 254-260 - [c8]Joachim Fabini, Peter Reichl, Alexander Poropatich:
Measurement-Based Modeling of NGN Access Networks from an Application Perspective. MMB 2008: 45-60 - [c7]Joachim Fabini, Peter Reichl, Christoph Egger, Marco Happenhofer, Michael Hirschbichler, Lukas Wallentin:
Generic access network emulation for NGN testbeds. TRIDENTCOM 2008: 43 - 2007
- [p1]Rudolf Pailer, Florian Wegscheider, Joachim Fabini:
Terminal-Centric Location Services in the IP Multimedia Subsystem. Location Based Services and TeleCartography 2007: 131-142 - 2006
- [j2]Peter Reichl, Joachim Fabini, Norbert Jordan, Rainer Huber, Alexander Poropatich, Christoph Brandner, Hannes Weisgrab:
Quo vadis, IMS? Das Projekt CAMPARI als Mobilnetz-orientierte Standortbestimmung für das IP Multimedia Subsystem. Elektrotech. Informationstechnik 123(7-8): 315-322 (2006) - [j1]Peter Reichl, Sandford Bessler, Joachim Fabini, Rudolf Pailer, Alexander Poropatich, Norbert Jordan, Rainer Huber, Hannes Weisgrab, Christoph Brandner, Ivan Gojmerac, Michael Ries, Florian Wegscheider:
Practical Experiences with an IMS-aware Location Service Enabler on Top of an Experimental Open Source IMS Core Implementation. J. Mobile Multimedia 2(3): 189-224 (2006) - [c6]Joachim Fabini, Norbert Jordan, Peter Reichl, Alexander Poropatich, Rainer Huber:
"IMS in a Bottle": Initial Experiences from an OpenSER-based Prototype Implementation of the 3GPP IP Multimedia Subsystem. ICMB 2006: 13 - [c5]Joachim Fabini, Marco Happenhofer, Rudolf Pailer:
Terminal-Centric Location Services for the IP Multimedia Subsystem. VTC Spring 2006: 881-885 - [c4]Peter Reichl, Sandford Bessler, Joachim Fabini, Rudolf Pailer, Joachim Zeiss:
Implementing a Native IMS Location Service Enabler over a Prototypical IMS Core Network Testbed. CEC/EEE 2006: 80 - 2005
- [c3]Norbert Jordan, Rainer Huber, Joachim Fabini:
A Simulative Study on the Performance of Fast Signaling in a Mobile IPv6-Wireless LAN Based Network Environment. ICMB 2005: 610-615 - [c2]Norbert Jordan, Alexander Poropatich, Joachim Fabini:
Mobility Adaptation Layer Framework for Heterogeneous Wireless Networks Based on Mobile IPv6. ICN (2) 2005: 496-503 - [c1]Peter Reichl, Norbert Jordan, Joachim Fabini, Reinhard Lauster, Martina Umlauft, Werner Jäger, Thomas Ziegler, Peter Eichinger, Günther Pospischil, Werner Wiedermann:
Wireless Inter-System Quality-of-Service: A Practical Network Performance Analysis of 3G and Beyond. KiVS 2005: 230-241
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint