TU Darmstadt / ULB / TUbiblio

Blättern nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Publikationsjahr | Sprache
Anzahl der Einträge: 15.

Matyunin, Nikolay ; Szefer, Jakub ; Biedermann, Sebastian ; Katzenbeisser, Stefan :
Covert channels using mobile device's magnetic field sensors.
[Online-Edition: https://doi.org/10.1109/ASPDAC.2016.7428065]
In: 21st Asia and South Pacific Design Automation Conference, ASP-DAC 2016, Macao, Macao, January 25-28, 2016.
[ Konferenzveröffentlichung] , (2016)

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015 S. 5-13.
[Artikel] , (2015)

Biedermann, Sebastian :
Transparent Security Services for an Infrastructure-as-a-Service Cloud.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4415]
TU Darmstadt
[Dissertation], (2015)

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Hot-Hardening: Getting More Out of Your Security Settings.
In: ACSAC '14 . ACM
[ Konferenzveröffentlichung] , (2014)

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan :
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM .
[ Konferenzveröffentlichung] , (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan :
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
IACR Cryptology ePrint Archive 2014
[ Konferenzveröffentlichung] , (2014)

Riecker, Michael ; Biedermann, Sebastian ; El Bansarkhani, Rachid ; Hollick, Matthias :
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security 2014 S. 61-69.
[Artikel] , (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas :
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327 S. 114-125.
[Artikel] , (2014)

Hauke, Sascha ; Biedermann, Sebastian ; Mühlhäuser, Max ; Heider, Dominik :
On the Application of the Supervised Machine Learning to Trustworthiness Assessment.
In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). In: Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)
[ Konferenzveröffentlichung] , (2013)

Biedermann, Sebastian ; Zittel, Martin ; Katzenbeisser, Stefan :
Improving security of virtual machines during live migrations.
In: IEEE Press S. 352-357.
[Artikel] , (2013)

Riecker, Michael ; Biedermann, Sebastian ; Hollick, Matthias :
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
Accepted for publication in 28th ACM Symposium On Applied Computing (SAC)
[ Konferenzveröffentlichung] , (2013)

Hauke, Sascha ; Biedermann, Sebastian ; Heider, Dominik ; Mühlhäuser, Max :
On the Application of Supervised Machine Learning to Trustworthiness Assessment.

[Report] , (2013)

Biedermann, Sebastian ; Katzenbeisser, Stefan :
POSTER: Event-based Isolation of Critical Data in the Cloud.
In:
[Artikel] , (2013)

Riecker, Michael ; Barroso, Ana ; Hollick, Matthias ; Biedermann, Sebastian :
On Data-centric Intrusion Detection in Wireless Sensor Networks.
Proceedings of the IEEE Conference on Cyber, Physical and Social Computing (CPSCom)
[ Konferenzveröffentlichung] , (2012)

Biedermann, Sebastian ; Katzenbeisser, Stefan :
Detecting Computer Worms in the Cloud.
Open Problems in Network Security (iNetSec 2011) Springer
[ Konferenzveröffentlichung] , (2011)

Diese Liste wurde am Sat Feb 16 02:41:08 2019 CET generiert.