h1

h2

h3

h4

h5
h6

125430

Juniorprofessur für Sicherheit und Datenschutz in industrieller Kooperation
IDI:(DE-82)125430_20211001

RWTH Aachen

Recent Publications

All known publications ...
Download: BibTeX | EndNote XML,  Text | RIS | 

http://join2-wiki.gsi.de/foswiki/pub/Main/Artwork/join2_logo100x88.png Journal Article  ;  ;
PowerRange: An immersive cyber range for power grid operators
International journal of critical infrastructure protection 53, 100845 () [10.1016/j.ijcip.2026.100845]  GO OpenAccess  Download fulltext Files BibTeX | EndNote: XML, Text | RIS

http://join2-wiki.gsi.de/foswiki/pub/Main/Artwork/join2_logo100x88.png Journal Article  ;  ;
Seldom: An Anonymity Network with Selective Deanonymization
ACM transactions on privacy and security : TOPS 29(2), 1-30 () [10.1145/3794848]  GO OpenAccess  Download fulltext Files BibTeX | EndNote: XML, Text | RIS

http://join2-wiki.gsi.de/foswiki/pub/Main/Artwork/join2_logo100x88.png Report (Brochure)/Book  ;  ;  ;
SPICe Chronicles 2025: The Year with Hot Papers, a Spicy New Lecture and a Sizzling Round of Applause
Aachen : Security and Privacy in Industrial Cooperation, RWTH Aachen University, SPICe Chronicles 2025, 5 Seiten : Illustrationen () [10.18154/RWTH-2025-10700]  GO OpenAccess  Download fulltext Files  Download fulltextFulltext BibTeX | EndNote: XML, Text | RIS

http://join2-wiki.gsi.de/foswiki/pub/Main/Artwork/join2_logo100x88.png Contribution to a book/Contribution to a conference proceedings  ;  ;
Assessing the Latency of Network Layer Security in 5G Networks
18th ACM Conference on Security and Privacy in Wireless and Mobile Networks
18. ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2025, Arlington, VAArlington, VA, USA, 30 Jun 2025 - 3 Jul 20252025-06-302025-07-03
[Erscheinungsort nicht ermittelbar], ACM conferences 262-267 () [10.1145/3734477.3734722]  GO OpenAccess  Download fulltext Files BibTeX | EndNote: XML, Text | RIS

http://join2-wiki.gsi.de/foswiki/pub/Main/Artwork/join2_logo100x88.png Contribution to a book/Contribution to a conference proceedings  ;  ;  ;
Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure
Proceedings of The 8th Cyber Security in Networking Conference (CSNet 2024): AI for Cybersecurity : 04-06 December 2024, Paris, France. / editors: Jean-Gabriel Ganascia, Guy Pujolle, Hassan Noura, Ola Salman, Khalil Hariss, Fatema El Husseini, Nour El Madhoun
8. Cyber Security in Networking Conference, CSNet, ParisParis, France, 4 Dec 2024 - 6 Dec 20242024-12-042024-12-06
[Piscataway, NJ] : IEEE 4 Seiten () [10.1109/CSNet64211.2024.10851719]  GO BibTeX | EndNote: XML, Text | RIS

http://join2-wiki.gsi.de/foswiki/pub/Main/Artwork/join2_logo100x88.png Journal Article  ;  ;  ;
Secure integration of 5G in industrial networks : State of the art, challenges and opportunities
Future generation computer systems 166, 107645 () [10.1016/j.future.2024.107645]  GO OpenAccess  Download fulltext Files BibTeX | EndNote: XML, Text | RIS

http://join2-wiki.gsi.de/foswiki/pub/Main/Artwork/join2_logo100x88.png Journal Article  ;  ;  ;  ;  ;  ;  ;
Simulation of multi-stage attack and defense mechanisms in smart grids
International journal of critical infrastructure protection : IJCIP 48, 100727 () [10.1016/j.ijcip.2024.100727]  GO OpenAccess  Download fulltext Files BibTeX | EndNote: XML, Text | RIS

http://join2-wiki.gsi.de/foswiki/pub/Main/Artwork/join2_logo100x88.png Contribution to a book/Contribution to a conference proceedings  ;  ;  ;
Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks: Dataset Paper
CODASPY ’25 : Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy
15. ACM Conference on Data and Application Security and Privacy, CODASPY 2025, Pittsburgh, PAPittsburgh, PA, USA, 4 Jun 2025 - 6 Jun 20252025-06-042025-06-06
New York, NY, USA : ACM 419-424 () [10.1145/3714393.3726006]  GO OpenAccess  Download fulltext Files BibTeX | EndNote: XML, Text | RIS

http://join2-wiki.gsi.de/foswiki/pub/Main/Artwork/join2_logo100x88.png Contribution to a book/Contribution to a conference proceedings  ;  ;  ;  ;
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
[The 33rd USENIX Security Symposium, 2024-08-14 - 2024-08-16, Philadelphia, PA, USA]
33. USENIX Security Symposium, Philadelphia, PAPhiladelphia, PA, USA, 14 Aug 2024 - 16 Aug 20242024-08-142024-08-16
5179-5196 ()  GO   Download fulltextFulltext BibTeX | EndNote: XML, Text | RIS

http://join2-wiki.gsi.de/foswiki/pub/Main/Artwork/join2_logo100x88.png Contribution to a book  ;  ;  ;
Illicit Blockchain Content: Its Different Shapes, Consequences, and Remedies
Blockchains : A Handbook on Fundamentals, Platforms and Applications / edited by Sushmita Ruj, Salil S. Kanhere, Mauro Conti Cham : Springer International Publishing, Advances in Information Security 105, 301-336 () [10.1007/978-3-031-32146-7_10]  GO BibTeX | EndNote: XML, Text | RIS

All known publications ...
Download: BibTeX | EndNote XML,  Text | RIS | 


 Datensatz erzeugt am 2021-10-01, letzte Änderung am 2021-10-02



Dieses Dokument bewerten:

Rate this document:
1
2
3
 
(Bisher nicht rezensiert)