125430
Juniorprofessur für Sicherheit und Datenschutz in industrieller Kooperation| ID | I:(DE-82)125430_20211001 |
All known publications ...
Download: BibTeX | EndNote XML, Text | RIS |
Journal Article
PowerRange: An immersive cyber range for power grid operators
International journal of critical infrastructure protection 53, 100845 (2026) [10.1016/j.ijcip.2026.100845]
Files
BibTeX |
EndNote:
XML,
Text |
RIS
Journal Article
Seldom: An Anonymity Network with Selective Deanonymization
ACM transactions on privacy and security : TOPS 29(2), 1-30 (2026) [10.1145/3794848]
Files
BibTeX |
EndNote:
XML,
Text |
RIS
Report (Brochure)/Book
SPICe Chronicles 2025: The Year with Hot Papers, a Spicy New Lecture and a Sizzling Round of Applause
Aachen : Security and Privacy in Industrial Cooperation, RWTH Aachen University, SPICe Chronicles 2025, 5 Seiten : Illustrationen (2025) [10.18154/RWTH-2025-10700]
Files
Fulltext
BibTeX |
EndNote:
XML,
Text |
RIS
Contribution to a book/Contribution to a conference proceedings
Assessing the Latency of Network Layer Security in 5G Networks
18th ACM Conference on Security and Privacy in Wireless and Mobile Networks
18. ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2025, Arlington, VAArlington, VA, USA, 30 Jun 2025 - 3 Jul 2025
[Erscheinungsort nicht ermittelbar], ACM conferences 262-267 (2025) [10.1145/3734477.3734722]
Files
BibTeX |
EndNote:
XML,
Text |
RIS
Contribution to a book/Contribution to a conference proceedings
Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure
Proceedings of The 8th Cyber Security in Networking Conference (CSNet 2024): AI for Cybersecurity : 04-06 December 2024, Paris, France. / editors: Jean-Gabriel Ganascia, Guy Pujolle, Hassan Noura, Ola Salman, Khalil Hariss, Fatema El Husseini, Nour El Madhoun
8. Cyber Security in Networking Conference, CSNet, ParisParis, France, 4 Dec 2024 - 6 Dec 2024
[Piscataway, NJ] : IEEE 4 Seiten (2024) [10.1109/CSNet64211.2024.10851719]
BibTeX |
EndNote:
XML,
Text |
RIS
Journal Article
Secure integration of 5G in industrial networks : State of the art, challenges and opportunities
Future generation computer systems 166, 107645 (2025) [10.1016/j.future.2024.107645]
Files
BibTeX |
EndNote:
XML,
Text |
RIS
Journal Article
Simulation of multi-stage attack and defense mechanisms in smart grids
International journal of critical infrastructure protection : IJCIP 48, 100727 (2025) [10.1016/j.ijcip.2024.100727]
Files
BibTeX |
EndNote:
XML,
Text |
RIS
Contribution to a book/Contribution to a conference proceedings
Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks: Dataset Paper
CODASPY ’25 : Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy
15. ACM Conference on Data and Application Security and Privacy, CODASPY 2025, Pittsburgh, PAPittsburgh, PA, USA, 4 Jun 2025 - 6 Jun 2025
New York, NY, USA : ACM 419-424 (2024) [10.1145/3714393.3726006]
Files
BibTeX |
EndNote:
XML,
Text |
RIS
Contribution to a book/Contribution to a conference proceedings
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
[The 33rd USENIX Security Symposium, 2024-08-14 - 2024-08-16, Philadelphia, PA, USA]
33. USENIX Security Symposium, Philadelphia, PAPhiladelphia, PA, USA, 14 Aug 2024 - 16 Aug 2024
5179-5196 (2024)
Fulltext
BibTeX |
EndNote:
XML,
Text |
RIS
Contribution to a book
Illicit Blockchain Content: Its Different Shapes, Consequences, and Remedies
Blockchains : A Handbook on Fundamentals, Platforms and Applications / edited by Sushmita Ruj, Salil S. Kanhere, Mauro Conti
Cham : Springer International Publishing, Advances in Information Security 105, 301-336 (2024) [10.1007/978-3-031-32146-7_10]
BibTeX |
EndNote:
XML,
Text |
RIS
All known publications ...
Download: BibTeX | EndNote XML, Text | RIS |