@INPROCEEDINGS{SigComm:2020:iLab-Home, author = {Pahl, Marc-Oliver}, title = {iLab@Home: Hands-On Networking Classes without Lab Access}, booktitle = {Sigcomm 2020 Education}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_SigComm_iLab_at_home.pdf}}

@INPROCEEDINGS{SigComm:2020:iLab-Home, author = {Pahl, Marc-Oliver}, title = {iLab@Home: Hands-On Networking Classes without Lab Access}, booktitle = {Sigcomm 2020 Education}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_SigComm_iLab_at_home.pdf}}

@INPROCEEDINGS{ETFA:2020:OpenSource_OPC-UA, author = {Mühlbauer, Nikolas and Kirdan, Erkin and Pahl, Marc-Oliver and Carle, Georg}, title = {Open-Source OPC UA Security and Scalability}, booktitle = {ETFA 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ETFA_Open-Source_OPC-UA.pdf}}

@INPROCEEDINGS{ETFA:2020:OpenSource_OPC-UA, author = {Mühlbauer, Nikolas and Kirdan, Erkin and Pahl, Marc-Oliver and Carle, Georg}, title = {Open-Source OPC UA Security and Scalability}, booktitle = {ETFA 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ETFA_Open-Source_OPC-UA.pdf}}

@INPROCEEDINGS{ISCC:2020:Group-Key, author = {Piccoli, Alessandro and Pahl, Marc-Oliver and Wüstrich, Lars}, title = {Group Key Management in Constraint IoT Settings}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Group-Key.pdf}}

@INPROCEEDINGS{ISCC:2020:Group-Key, author = {Piccoli, Alessandro and Pahl, Marc-Oliver and Wüstrich, Lars}, title = {Group Key Management in Constraint IoT Settings}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Group-Key.pdf}}

@INPROCEEDINGS{ISCC:2020:Deep_Replace_Domain, author = {Lübben, Christian and Pahl, Marc-Oliver and Khan, Mohammad Irfan}, title = {Using Deep Learning to Replace Domain Knowledge}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Deep_Domain_Knowledge.pdf}}

@INPROCEEDINGS{ISCC:2020:Deep_Replace_Domain, author = {Lübben, Christian and Pahl, Marc-Oliver and Khan, Mohammad Irfan}, title = {Using Deep Learning to Replace Domain Knowledge}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Deep_Domain_Knowledge.pdf}}

@INPROCEEDINGS{ISCC:2020:Security_Taxonomy, author = {Wüstrich, Lars and Pahl, Marc-Oliver and Liebald, Stefan}, title = {An extensible IoT Security Taxonomy}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Security_Taxonomy.pdf}}

@INPROCEEDINGS{ISCC:2020:Security_Taxonomy, author = {Wüstrich, Lars and Pahl, Marc-Oliver and Liebald, Stefan}, title = {An extensible IoT Security Taxonomy}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Security_Taxonomy.pdf}}

@article{pahl:2019:Commag, author = {Pahl, Marc-Oliver}, title = {Learning by Teaching: Professional Skills and New Technologies for University Education}, journal = {{IEEE} Communications Magazine}, volume = {57}, number = {11}, pages = {74--80}, year = {2019}, url = {https://doi.org/10.1109/MCOM.001.1900248}, doi = {10.1109/MCOM.001.1900248}, timestamp = {Wed, 27 Nov 2019 08:28:22 +0100}, biburl = {https://dblp.org/rec/bib/journals/cm/Pahl19}, bibsource = {dblp computer science bibliography, https://dblp.org}, webpdf = {https://s2labs.org/download/publications/2019_Commag_LearningByTeaching.pdf}}

@article{pahl:2019:Commag, author = {Pahl, Marc-Oliver}, title = {Learning by Teaching: Professional Skills and New Technologies for University Education}, journal = {{IEEE} Communications Magazine}, volume = {57}, number = {11}, pages = {74--80}, year = {2019}, url = {https://doi.org/10.1109/MCOM.001.1900248}, doi = {10.1109/MCOM.001.1900248}, timestamp = {Wed, 27 Nov 2019 08:28:22 +0100}, biburl = {https://dblp.org/rec/bib/journals/cm/Pahl19}, bibsource = {dblp computer science bibliography, https://dblp.org}, webpdf = {https://s2labs.org/download/publications/2019_Commag_LearningByTeaching.pdf}}

@MISC{pahl:2019GIRegioPrivacy-video, author = {Pahl, Marc-Oliver}, title = {[Video] Über die Vereinbarkeit von Digitaler Transformation und Privatsphäre im Internet der Dinge}, howpublished = {Invited talk at the German Informatics (GI) society regional group meeting, Jun 3, 2019}, month = {Jun}, year = {2019}, webpdf = {https://youtu.be/qRhzDXwnt-c}, abstract={Die Digitale Transformation ist unumkehrbar, überall und betrifft jeden von uns. Mit den neuen Diensten geht unzertrennbar ein neues Sammeln von Daten einher. Ein smarter Lautsprecher in Ihrem Zuhause kann beispielsweise aktuell nur funktionieren, indem er Ihre Sprache zu einem Anbieter ins Internet hochlädt. Was dann mit Ihren Daten geschieht liegt außerhalb Ihrer Entscheidung.Ausgehend von aktuellen Beispielen aus den Bereichen autonomes Fahren und Industrielles Internet der Dinge (IIoT) werde ich zunächst beispielhaft aufzeigen, wo Gefahren für die Wahrung unserer Privatsphäre lauern. Anschließend werde ich auf die Verantwortung von Informatikern eingehen, ethische Grundsätze zu beachten und zu verinnerlichen wenn sie Anwendungen bereitstellen. Schließlich werde ich Möglichkeiten aufzeigen, wie zukünftige IT Systeme aus verteilten vernetzen Dingen in Zukunft sicherer werden könnten.Ich hoffe auf eine rege Diskussion während und insbesondere nach dem Vortrag zu diesem für uns alle wichtigen Thema.?}}

@MISC{pahl:2019GIRegioPrivacy-video, author = {Pahl, Marc-Oliver}, title = {[Video] Über die Vereinbarkeit von Digitaler Transformation und Privatsphäre im Internet der Dinge}, howpublished = {Invited talk at the German Informatics (GI) society regional group meeting, Jun 3, 2019}, month = {Jun}, year = {2019}, webpdf = {https://youtu.be/qRhzDXwnt-c}, abstract={Die Digitale Transformation ist unumkehrbar, überall und betrifft jeden von uns. Mit den neuen Diensten geht unzertrennbar ein neues Sammeln von Daten einher. Ein smarter Lautsprecher in Ihrem Zuhause kann beispielsweise aktuell nur funktionieren, indem er Ihre Sprache zu einem Anbieter ins Internet hochlädt. Was dann mit Ihren Daten geschieht liegt außerhalb Ihrer Entscheidung.Ausgehend von aktuellen Beispielen aus den Bereichen autonomes Fahren und Industrielles Internet der Dinge (IIoT) werde ich zunächst beispielhaft aufzeigen, wo Gefahren für die Wahrung unserer Privatsphäre lauern. Anschließend werde ich auf die Verantwortung von Informatikern eingehen, ethische Grundsätze zu beachten und zu verinnerlichen wenn sie Anwendungen bereitstellen. Schließlich werde ich Möglichkeiten aufzeigen, wie zukünftige IT Systeme aus verteilten vernetzen Dingen in Zukunft sicherer werden könnten.Ich hoffe auf eine rege Diskussion während und insbesondere nach dem Vortrag zu diesem für uns alle wichtigen Thema.?}}

@MISC{pahl:2019GIRegioPrivacy-slides, author = {Pahl, Marc-Oliver}, title = {[Slides] Über die Vereinbarkeit von Digitaler Transformation und Privatsphäre im Internet der Dinge}, howpublished = {Invited talk at the German Informatics (GI) society regional group meeting, Jun 3, 2019}, month = {Jun}, year = {2019}, webpdf = {https://s2labs.org/download/slides/2019/2019-06-03_GI_Regionalgruppe_ZiemlichBesteFreunde_pahl.pdf}, abstract={Die Digitale Transformation ist unumkehrbar, überall und betrifft jeden von uns. Mit den neuen Diensten geht unzertrennbar ein neues Sammeln von Daten einher. Ein smarter Lautsprecher in Ihrem Zuhause kann beispielsweise aktuell nur funktionieren, indem er Ihre Sprache zu einem Anbieter ins Internet hochlädt. Was dann mit Ihren Daten geschieht liegt außerhalb Ihrer Entscheidung.Ausgehend von aktuellen Beispielen aus den Bereichen autonomes Fahren und Industrielles Internet der Dinge (IIoT) werde ich zunächst beispielhaft aufzeigen, wo Gefahren für die Wahrung unserer Privatsphäre lauern. Anschließend werde ich auf die Verantwortung von Informatikern eingehen, ethische Grundsätze zu beachten und zu verinnerlichen wenn sie Anwendungen bereitstellen. Schließlich werde ich Möglichkeiten aufzeigen, wie zukünftige IT Systeme aus verteilten vernetzen Dingen in Zukunft sicherer werden könnten.Ich hoffe auf eine rege Diskussion während und insbesondere nach dem Vortrag zu diesem für uns alle wichtigen Thema.}}

@MISC{pahl:2019GIRegioPrivacy-slides, author = {Pahl, Marc-Oliver}, title = {[Slides] Über die Vereinbarkeit von Digitaler Transformation und Privatsphäre im Internet der Dinge}, howpublished = {Invited talk at the German Informatics (GI) society regional group meeting, Jun 3, 2019}, month = {Jun}, year = {2019}, webpdf = {https://s2labs.org/download/slides/2019/2019-06-03_GI_Regionalgruppe_ZiemlichBesteFreunde_pahl.pdf}, abstract={Die Digitale Transformation ist unumkehrbar, überall und betrifft jeden von uns. Mit den neuen Diensten geht unzertrennbar ein neues Sammeln von Daten einher. Ein smarter Lautsprecher in Ihrem Zuhause kann beispielsweise aktuell nur funktionieren, indem er Ihre Sprache zu einem Anbieter ins Internet hochlädt. Was dann mit Ihren Daten geschieht liegt außerhalb Ihrer Entscheidung.Ausgehend von aktuellen Beispielen aus den Bereichen autonomes Fahren und Industrielles Internet der Dinge (IIoT) werde ich zunächst beispielhaft aufzeigen, wo Gefahren für die Wahrung unserer Privatsphäre lauern. Anschließend werde ich auf die Verantwortung von Informatikern eingehen, ethische Grundsätze zu beachten und zu verinnerlichen wenn sie Anwendungen bereitstellen. Schließlich werde ich Möglichkeiten aufzeigen, wie zukünftige IT Systeme aus verteilten vernetzen Dingen in Zukunft sicherer werden könnten.Ich hoffe auf eine rege Diskussion während und insbesondere nach dem Vortrag zu diesem für uns alle wichtigen Thema.}}

@INPROCEEDINGS{Seeg1906:Rule,AUTHOR={Jan Seeger and Arne {Br{\"o}ring} and Marc-Oliver Pahl and Ermin Sakic},TITLE="{Rule-Based} Translation of {Application-Level} {QoS} Constraints into{SDN} Configurations for the {IoT}",BOOKTITLE="2019 European Conference on Networks and Communications (EuCNC): NetworkSoftwarisation (NET) (EuCNC2019 - NET)",ADDRESS="Valencia, Spain",DAYS=17,MONTH=jun,YEAR=2019,KEYWORDS="SDN; IoT; Semantics; QoS",ABSTRACT="In this paper, we propose an approach for the automated translation ofapplication-level requirements regarding the logical workflow and its QoSinto a configuration of the underlying network substrate. Our goal is tofacilitate the integration of QoS constraints in the development ofindustrial IoT applications to make them more reliable. We follow anapproach based on two semantic models: The first model allows to design theworkflow of an IoT application and to express application-level QoSrequirements on its interactions. The second model captures theconfiguration of a network and can be used as input to a north-boundinterface of an SDN controller. Finally, we make use of rule-based semanticreasoning to automatically translate from the application requirements intoSDN parameters."}

@INPROCEEDINGS{Seeg1906:Rule,AUTHOR={Jan Seeger and Arne {Br{\"o}ring} and Marc-Oliver Pahl and Ermin Sakic},TITLE="{Rule-Based} Translation of {Application-Level} {QoS} Constraints into{SDN} Configurations for the {IoT}",BOOKTITLE="2019 European Conference on Networks and Communications (EuCNC): NetworkSoftwarisation (NET) (EuCNC2019 - NET)",ADDRESS="Valencia, Spain",DAYS=17,MONTH=jun,YEAR=2019,KEYWORDS="SDN; IoT; Semantics; QoS",ABSTRACT="In this paper, we propose an approach for the automated translation ofapplication-level requirements regarding the logical workflow and its QoSinto a configuration of the underlying network substrate. Our goal is tofacilitate the integration of QoS constraints in the development ofindustrial IoT applications to make them more reliable. We follow anapproach based on two semantic models: The first model allows to design theworkflow of an IoT application and to express application-level QoSrequirements on its interactions. The second model captures theconfiguration of a network and can be used as input to a north-boundinterface of an SDN controller. Finally, we make use of rule-based semanticreasoning to automatically translate from the application requirements intoSDN parameters."}

@MISC{pahl:2019IMTutorialVSL-slides, author = {Pahl, Marc-Oliver}, title = {[Slides] Data- and Service-Centric Orchestration of the Internet of Things}, howpublished = {Tutorial given at the Integrated Management Symposium (IM) 2019 on April 9, 2019 in Washington D.C.}, month = {Apr}, year = {2019}, webpdf = {https://s2labs.org/download/publications/2019-04-09_Tutorial1_Data-andService-CentricOrchestrationOfTheInternetOfThings.pdf}, abstract={Managing the Internet of Things (IoT) is complex. The devices and their communication protocols are highly heterogeneous. Interfacing the plethora of remotely manageable devices is so complex that it currently still prevents the IoT from taking off. Data-centric management architectures reduce the complexity. So does service-orientation. In this tutorial you will learn about the basics of data-centric microservice-oriented management of the IoT. We will cover different key aspects of IoT research including - Name-Based IoT, Service-Centric IoT, Middleware, Peer-to-Peer Systems, Edge-Based IoT, Autonomous Management, Hardware Making. Using a Virtual Box virtual machine, we will go through a practical hands-on with you. You will learn about the modelling of IoT devices and services, semantically rich discovery of services, name-based management architectures, and peer-to-peer systems. At the end we will have implemented a complex IoT scenario together that is composed of multiple collaborating microservices. Please bring your laptop with Virtual Box installed to the tutorial.}}

@MISC{pahl:2019IMTutorialVSL-slides, author = {Pahl, Marc-Oliver}, title = {[Slides] Data- and Service-Centric Orchestration of the Internet of Things}, howpublished = {Tutorial given at the Integrated Management Symposium (IM) 2019 on April 9, 2019 in Washington D.C.}, month = {Apr}, year = {2019}, webpdf = {https://s2labs.org/download/publications/2019-04-09_Tutorial1_Data-andService-CentricOrchestrationOfTheInternetOfThings.pdf}, abstract={Managing the Internet of Things (IoT) is complex. The devices and their communication protocols are highly heterogeneous. Interfacing the plethora of remotely manageable devices is so complex that it currently still prevents the IoT from taking off. Data-centric management architectures reduce the complexity. So does service-orientation. In this tutorial you will learn about the basics of data-centric microservice-oriented management of the IoT. We will cover different key aspects of IoT research including - Name-Based IoT, Service-Centric IoT, Middleware, Peer-to-Peer Systems, Edge-Based IoT, Autonomous Management, Hardware Making. Using a Virtual Box virtual machine, we will go through a practical hands-on with you. You will learn about the modelling of IoT devices and services, semantically rich discovery of services, name-based management architectures, and peer-to-peer systems. At the end we will have implemented a complex IoT scenario together that is composed of multiple collaborating microservices. Please bring your laptop with Virtual Box installed to the tutorial.}}

@MISC{pahl:2019CKI-video, author = {Pahl, Marc-Oliver}, title = {[Video] Composing the (Industrial) Internet of Things}, howpublished = {Talk given at the Siemens-TUM CKI Konferenz 2019 - Industrial Internet of Things on April 4, 2019}, month = {Apr}, year = {2019}, webpdf = {https://youtu.be/vGkEICN8F7Y}, abstract={What are the key building blocks for enabling a composable Internet of THings? How can we provide resilience, security, scalability, and low latency?}}

@MISC{pahl:2019CKI-video, author = {Pahl, Marc-Oliver}, title = {[Video] Composing the (Industrial) Internet of Things}, howpublished = {Talk given at the Siemens-TUM CKI Konferenz 2019 - Industrial Internet of Things on April 4, 2019}, month = {Apr}, year = {2019}, webpdf = {https://youtu.be/vGkEICN8F7Y}, abstract={What are the key building blocks for enabling a composable Internet of THings? How can we provide resilience, security, scalability, and low latency?}}

@MISC{pahl:2019CKI-slides, author = {Pahl, Marc-Oliver}, title = {[Slides] Composing the (Industrial) Internet of Things}, howpublished = {Talk given at the Siemens-TUM CKI Konferenz 2019 - Industrial Internet of Things on April 4, 2019}, month = {Apr}, year = {2019}, webpdf = {https://s2labs.org/download/publications/2019-04-04_CKI_mop_v4.pdf}, abstract={What are the key building blocks for enabling a composable Internet of THings? How can we provide resilience, security, scalability, and low latency?}}

@MISC{pahl:2019CKI-slides, author = {Pahl, Marc-Oliver}, title = {[Slides] Composing the (Industrial) Internet of Things}, howpublished = {Talk given at the Siemens-TUM CKI Konferenz 2019 - Industrial Internet of Things on April 4, 2019}, month = {Apr}, year = {2019}, webpdf = {https://s2labs.org/download/publications/2019-04-04_CKI_mop_v4.pdf}, abstract={What are the key building blocks for enabling a composable Internet of THings? How can we provide resilience, security, scalability, and low latency?}}

@INPROCEEDINGS{Khan1904:Deep,AUTHOR={Khan, Irfan and Aubet, Francois-Xavier and Pahl, Marc-Oliver and Härri, Jérôme},TITLE="Deep Learning-aided Application Scheduler for Vehicular Safety Communication",BOOKTITLE="2019 Wireless Days (WD) (WD2019)",ADDRESS="Manchester, United Kingdom (Great Britain)",DAYS=23,MONTH=apr,YEAR=2019,KEYWORDS="V2V Communication; 802.11p; DSRC; ITS-G5; Deep Learning",ABSTRACT="IEEE 802.11p based V2X communication uses stochastic medium access control,which cannot prevent broadcast packet collision, in particular during highchannel load. Wireless congestion control has been designed to keep thechannel load at an optimal point. However, vehicles' lack of precise andgranular knowledge about true channel activity, in time and space, makes itimpossible to fully avoid packet collisions. In this paper, we propose amachine learning approach using deep neural network for learning vehicles'transmit patterns, and as such predicting future channel activity in spaceand time. We evaluate the performance of our proposal via simulationconsidering multiple safety-related V2X services involving heterogeneoustransmit patterns. Our results show that predicting channel activity, andtransmitting accordingly, reduces collisions and significantly improvescommunication performance.", webpdf = {https://s2labs.org/download/publications/2019_WD_Khan_Aubet_Pahl_Haerri_Deep Learning-aided_Resource_Orchestration_for_Vehicular_Safety_Communication.pdf}}

@INPROCEEDINGS{Khan1904:Deep,AUTHOR={Khan, Irfan and Aubet, Francois-Xavier and Pahl, Marc-Oliver and Härri, Jérôme},TITLE="Deep Learning-aided Application Scheduler for Vehicular Safety Communication",BOOKTITLE="2019 Wireless Days (WD) (WD2019)",ADDRESS="Manchester, United Kingdom (Great Britain)",DAYS=23,MONTH=apr,YEAR=2019,KEYWORDS="V2V Communication; 802.11p; DSRC; ITS-G5; Deep Learning",ABSTRACT="IEEE 802.11p based V2X communication uses stochastic medium access control,which cannot prevent broadcast packet collision, in particular during highchannel load. Wireless congestion control has been designed to keep thechannel load at an optimal point. However, vehicles' lack of precise andgranular knowledge about true channel activity, in time and space, makes itimpossible to fully avoid packet collisions. In this paper, we propose amachine learning approach using deep neural network for learning vehicles'transmit patterns, and as such predicting future channel activity in spaceand time. We evaluate the performance of our proposal via simulationconsidering multiple safety-related V2X services involving heterogeneoustransmit patterns. Our results show that predicting channel activity, andtransmitting accordingly, reduces collisions and significantly improvescommunication performance.", webpdf = {https://s2labs.org/download/publications/2019_WD_Khan_Aubet_Pahl_Haerri_Deep Learning-aided_Resource_Orchestration_for_Vehicular_Safety_Communication.pdf}}

@INPROCEEDINGS{pahl:IM2019:ServiceManagement, AUTHOR="Pahl, Marc-Oliver", TITLE="Multi-Tenant IoT Service Management towards an IOT App Economy", BOOKTITLE="Hot Topics in Network and Service Management (HotNSM) at International Symposium on Integrated Network Management (IM)", ADDRESS="Washington DC, USA", DAYS="8-12", MONTH="apr", YEAR="2019", webpdf = {https://s2labs.org/download/publications/2019-04_IM_HotNSM_Multi-Tenant_IoT_Service_Management_towards_an_App_Economy.pdf}}