F. Dressler, Kargl, F. , Ott, J. , Tonguz, O. K. , and Wischof, L. ,
“Research Challenges in Intervehicular Communication: Lessons of the 2010 Dagstuhl Seminar”,
IEEE Communications Magazine, vol. 49, pp. 158 - 164, 2011.
F. Dressler and Kargl, F. ,
“Towards security in nano-communication: Challenges and opportunities”,
Nano Communication Networks, vol. 3, pp. 151 - 160, 2012.
S. Dietzel, Schoch, E. , Bako, B. , and Kargl, F. ,
“A Structure-free Aggregation Framework for Vehicular Ad Hoc Networks”, in
6th International Workshop on Intelligent Transportation (WIT 2009), Hamburg, Germany, 2009.
S. Dietzel, Petit, J. , Kargl, F. , and Scheuermann, B. ,
“In-Network Aggregation for Vehicular Ad Hoc Networks”,
IEEE Communications Surveys and Tutorials, vol. 16, pp. 1909–1932, 2014.
S. Dietzel, Kargl, F. , Heijenk, G. J. , and Schaub, F. ,
“On the Potential of Generic Modeling for VANET Data Aggregation Protocols”, in
2nd IEEE Vehicular Networking Conference (IEEE VNC 2011), Jersey City, New Jersey, USA, 2010, pp. 78-85.
S. Dietzel, Gürtler, J. , van der Heijden, R. , and Kargl, F. ,
“Redundancy-based Statistical Analysis for Insider Attack Detection in VANET Aggregation Schemes”, in
Proceedings of the IEEE Vehicular Networking Conference 2014 (VNC 2014), Paderborn, Germany, 2014.
S. Dietzel, Gürtler, J. , and Kargl, F. ,
“A resilient in-network aggregation mechanism for \VANETs\ based on dissemination redundancy”,
Ad Hoc Networks, vol. 37, Part 1, pp. 101 - 109, 2016.
S. Dietzel, Petit, J. , Kargl, F. , and Heijenk, G. ,
“Analyzing Dissemination Redundancy to Achieve Data Consistency in VANETs”, in
Ninth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2012), Low Wood Bay, Lake District, United Kingdom, 2012.
M. Dacier, Kargl, F. , König, H. , and Valdes, A. ,
“Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)”,
Dagstuhl Reports, vol. 4, pp. 62–79, 2014.
M. Dacier, Kargl, F. , and Valdes, A. ,
“Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502)”,
Dagstuhl Reports, vol. 2, pp. 49–63, 2013.