Künstliche Intelligenz für Cybersicherheit
Professor
nach vorheriger Terminvereinbarung per E-Mail
A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models
PRIVATE OPEN DATA?! - EAsyAnon TRUSTSERVICE. Posterpräsentation
Bundesministerium für Bildung und Forschung Berlin
Cybersicherheit – Mehr als nur ein Kostenfaktor?!
Pro Vilshofen Stadtmarketing e.V. Vilshofen
Anonymization Procedures for Tabular Data: An Explanatory Technical and Legal Synthesis
In: Information vol. 14 pg. 487.
DOI: 10.3390/info14090487
Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data
In: Electronics vol. 10 pg. 2160.
DOI: 10.3390/electronics10172160
Unsupervised Feature Selection for Outlier Detection on Streaming Data to Enhance Network Security
In: Applied Sciences vol. 11 pg. 12073.
ISSN: 2076-3417
DOI: 10.3390/app112412073
On the Improvement of the Isolation Forest Algorithm for Outlier Detection with Streaming Data
In: Electronics vol. 10 pg. 1534.
DOI: 10.3390/electronics10131534
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
pg. 906-911.
DOI: 10.1109/PERCOMW.2019.8730749
Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks
pg. 21-26.
A Resource-Preserving Self-Regulating Uncoupled MAC Algorithm to be Applied in Incident Detection
In: Computers & Security vol. 85 pg. 270-285.
DOI: 10.1016/j.cose.2019.05.010
On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks
pg. 72-83.
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF( 2m ) Based on Montgomery Arithmetic (Article ID 4983404)
In: Security and Communication Networks pg. 1-18.
DOI: 10.1155/2018/4983404
DecADe - Decentralized Anomaly Detection . Posterpräsentation
Technische Hochschule Deggendorf Deggendorf
Incident Reaction Based on Intrusion Detections’ Alert Analysis
pg. 1-6.
Assessment simulation model for uncoupled message authentication
Experimental assessment of FIRO- and GARO-based noise sources for digital TRNG designs on FPGAs
pg. 1-6.
Comparison of Supervised, Semi-supervised and Unsupervised Learning Methods in Network Intrusion Detection Systems (NIDS) Application
In: Anwendungen und Konzepte in der Wirtschaftsinformatik (AKWI) pg. 10-19.
Embedded Plug-In Devices to Secure Industrial Network Communications
Intrusion Detection Sensoren für industrielle Netzwerke
Würzburg
Industrial Legacy System Communication Through Interconnected Embedded Plug-In Devices
IT-Security-Architektur für Next-Generation Kommunikationssysteme im Automobil
Wolfsburg