Künstliche Intelligenz für Cybersicherheit
Professor
nach vorheriger Terminvereinbarung per E-Mail
Embedded Plug-In Devices to Secure Industrial Network Communications.
(2016)
Industrial Legacy System Communication Through Interconnected Embedded Plug-In Devices.
(2016)
Intrusion Detection Sensoren für industrielle Netzwerke.
Würzburg 22.-23.06.2016.
(2016)
IT-Security-Architektur für Next-Generation Kommunikationssysteme im Automobil.
Wolfsburg 08.-09.11.2016.
(2016)
Comparison of Supervised, Semi-supervised and Unsupervised Learning Methods in Network Intrusion Detection Systems (NIDS) Application.
In: Anwendungen und Konzepte in der Wirtschaftsinformatik (AKWI) , pg. 10-19
(2017)
Assessment simulation model for uncoupled message authentication.
(2017)
Experimental assessment of FIRO- and GARO-based noise sources for digital TRNG designs on FPGAs.
pg. 1-6
(2017)
Incident Reaction Based on Intrusion Detections’ Alert Analysis.
pg. 1-6
(2018)
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF( 2m ) Based on Montgomery Arithmetic (Article ID 4983404).
In: Security and Communication Networks , pg. 1-18
(2018)
DOI: 10.1155/2018/4983404
DecADe - Decentralized Anomaly Detection. Posterpräsentation.
Deggendorf 08.03.2018.
(2018)
A Resource-Preserving Self-Regulating Uncoupled MAC Algorithm to be Applied in Incident Detection.
In: Computers & Security (vol. 85) , pg. 270-285
(2019)
DOI: 10.1016/j.cose.2019.05.010
Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks.
pg. 21-26
(2019)
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication.
pg. 906-911
DOI: 10.1109/PERCOMW.2019.8730749
(2019)
On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks.
pg. 72-83
(2019)
On the Improvement of the Isolation Forest Algorithm for Outlier Detection with Streaming Data.
In: Electronics (vol. 10) , pg. 1534
(2021)
DOI: 10.3390/electronics10131534
Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data.
In: Electronics (vol. 10) , pg. 2160
(2021)
DOI: 10.3390/electronics10172160
Unsupervised Feature Selection for Outlier Detection on Streaming Data to Enhance Network Security.
In: Applied Sciences (vol. 11) , pg. 12073
(2021)
DOI: 10.3390/app112412073
A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models.
DOI: 10.1109/IWCMC58020.2023.10183131
(2023)
Anonymization Procedures for Tabular Data: An Explanatory Technical and Legal Synthesis.
In: Information (vol. 14) , pg. 487
(2023)
DOI: 10.3390/info14090487
PRIVATE OPEN DATA?! - EAsyAnon TRUSTSERVICE. Posterpräsentation.
Berlin 13.-15.03.2023.
(2023)
Cybersicherheit – Mehr als nur ein Kostenfaktor?!.
Vilshofen 13.03.2023.
(2023)
Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations.
(2024)
Survey on Automated Threat Modeling Methods. Posterpräsentation.
Nürnberg 03.07.2024.
(2024)
ClustEm4Ano: Clustering Text Embeddings of Nominal Textual Attributes for Microdata Anonymization.
Cham: Springer Nature Switzerland pg. 122-137
DOI: 10.1007/978-3-031-83472-1_9
(2025)