Skip to main content Skip to main navigation

Publikationen

Seite 1 von 3.

  1. The PUF Commitment: Evaluating the Stability of SRAM-Cells

    In: 20th European Conference on Cyber Warfare and Security. European Conference on Cyber Warfare and Security (ECCWS-2021), June 24-25, Chester, …

  2. Daniel Reti; David Klaaßen; Simon Duque Antón; Hans Dieter Schotten

    Secure (S)Hell: Introducing an SSH Deception Proxy Framework

    In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE International Conference on Cyber …

  3. The PhySec Thing: About Trust and Security in Industrial IoT Systems

    In: Brett van Niekerk; Joey Jansen van Vuuren; Trishana Ramluckan (Hrsg.). Journal of Information Warfare (JIW), Vol. 19, No. 3, Pages 35-49, …

  4. [Poster] The PUF Commitment: SRAM-based Trust Anchors for the IIoT

    Academic Conferences and Publishing International Limited Reading, 6/2020.

  5. How to Secure the Communication and Authentication in the IIoT: A SRAM-based Hybrid Cryptosystem

    In: European Conference on Cyber Warfare and Security. European Conference on Cyber Warfare and Security (ECCWS), June 25-26, Chester, United Kingdom, …

  6. Christoph Lipps; Sachinkumar Bavikatti Mallikarjun; Mathias Strufe; Hans Dieter Schotten

    Enhanced Channel-PUFs: The Advantages of Artificial Intelligence for Channel Estimation

    In: 15th International Conference on Cyber Warfare and Security. International Conference on Cyber Warfare and Security (ICCWS-2020), March 12-13, …

  7. Anna-Pia Lohfink; Simon Duque Antón; Hans Dieter Schotten; Heike Leitte; Christoph Garth

    Security in Process: Visually Supported Triage Analysis in Industrial Process Data

    In: IEEE Transactions on Visualization and Computer Graphics (TVCG), Vol. 27, Pages 1655-1664, IEEE Press, 2020.

  8. Simon Duque Antón; Michael Gundall; Daniel Fraunholz; Hans Dieter Schotten

    Attack Scenarios in Industrial Environments and How to Detect Them: A Roadmap

    In: Journal of Information Warfare (JIW), Vol. 19, Pages 1-15, Goldbelt Inc., Peregrine Technical Solutions, 2020.

  9. Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

    In: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). International Conference on Cyber Security …

  10. Escape the Fake: Introducing Simulated Container-Escapes for Honeypots

    In: Hans Dieter Schotten; Bin Han (Hrsg.). Proceedings of the 1st Workshop on Next Generation Networks and Applications. Workshop on Next Generation …