TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 13.

Matyunin, Nikolay and Szefer, Jakub and Biedermann, Sebastian and Katzenbeisser, Stefan (2016):
Covert channels using mobile device's magnetic field sensors.
pp. 525-532, 21st Asia and South Pacific Design Automation Conference, ASP-DAC 2016, Macao, Macao, January 25-28, 2016, DOI: 10.1109/ASPDAC.2016.7428065,
[Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, pp. 5-13. [Article]

Biedermann, Sebastian (2015):
Transparent Security Services for an Infrastructure-as-a-Service Cloud.
TU Darmstadt,
[Ph.D. Thesis]

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2014):
Hot-Hardening: Getting More Out of Your Security Settings.
In: ACSAC '14, In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 6-15,
ACM, New Orleans, Louisiana, USA, ISBN 978-1-4503-3005-3,
DOI: 10.1145/2664243.2664246,
[Conference or Workshop Item]

Araujo, Frederico and Hamlen, Kevin and Biedermann, Sebastian and Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM, In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pp. 942-953,
Scottsdale, AZ, USA, [Conference or Workshop Item]

Biedermann, Sebastian and Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]

Riecker, Michael and Biedermann, Sebastian and El Bansarkhani, Rachid and Hollick, Matthias (2014):
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security, 14 (2), pp. 155-167. Springer, ISSN 1615-5270,
[Article]

Biedermann, Sebastian and Karvelas, Nikolaos and Katzenbeisser, Stefan and Strufe, Thorsten and Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327, pp. 114-125. [Article]

Hauke, Sascha and Biedermann, Sebastian and Mühlhäuser, Max and Heider, Dominik (2013):
On the Application of the Supervised Machine Learning to Trustworthiness Assessment.
In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 525 - 534,
IEEE, Melbourne, VIC, Australia, 16-18 July 2013, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.5,
[Conference or Workshop Item]

Biedermann, Sebastian and Zittel, Martin and Katzenbeisser, Stefan (2013):
Improving security of virtual machines during live migrations.
In: IEEE Press, pp. 352-357. [Article]

Biedermann, Sebastian and Katzenbeisser, Stefan (2013):
POSTER: Event-based Isolation of Critical Data in the Cloud.
[Article]

Riecker, Michael and Barroso, Ana and Hollick, Matthias and Biedermann, Sebastian (2012):
On Data-centric Intrusion Detection in Wireless Sensor Networks.
In: Proceedings of the IEEE Conference on Cyber, Physical and Social Computing (CPSCom),
[Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan (2011):
Detecting Computer Worms in the Cloud.
In: Open Problems in Network Security (iNetSec 2011), pp. 43-54,
Springer, [Conference or Workshop Item]

This list was generated on Sat May 15 00:32:08 2021 CEST.