2024 | |
87. |
19th ACM ASIA Conference on Computer and Communications Security (ACM AsiaCCS '24), Singapur
Publisher: ACM,
July
2024
|
86. |
Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS '24), May 6-10, 2024, Seoul, Korea
Publisher: IEEE,
May
2024
|
85. |
Illicit Blockchain Content – Its Different Shapes, Consequences, and Remedies
Blockchains – A Handbook on Fundamentals, Platforms and Applications Volume 105
of Advances in Information Security
Chapter 10,
page 301-336.
Publisher: Springer,
March
2024
ISBN: 978-3-031-32145-0
|
84. |
22nd International Conference on Applied Cryptography and Network Security (ACNS '24), Abu Dhabi, UAE
March
2024
Accepted
|
2023 | |
83. |
Journal of Systems Research,
3(1)
October
2023
ISSN: 2770-5501
DOI: 10.5070/SR33162445
|
82. |
48th IEEE Conference on Local Computer Networks (LCN), Daytona Beach, Florida, US
Publisher: IEEE,
October
2023
Accepted
|
81. |
Proceedings of the 9th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems
(CyberICPS '23), co-located with the the 28th European Symposium on Research in Computer Security (ESORICS '23)
September
2023
Accepted
|
80. |
Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS '23), September 25-29, 2023, The Hague, The Netherlands Volume 14345, page 102-122.
Publisher: Springer,
September
2023
ISBN: 978-3-031-51475-3
|
79. |
Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE '23), June 12-16, 2023, Zaragoza, Spain Volume 13901, page 489-505.
Publisher: Springer,
June
2023
ISBN: 978-3-031-34559-3
|
78. |
Internet of Production: Fundamentals, Applications and Proceedings
of Interdisciplinary Excellence Accelerator Series
page 35-60.
Publisher: Springer,
February
2023
ISBN: 978-3-031-44496-8
|
2022 | |
77. |
38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA
Publisher: RWTH Aachen University,
December
2022
|
76. |
Cybersecurity Artifacts Competition and Impact Award at 38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA
Publisher: ACSA,
December
2022
|
75. |
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM,
November
2022
|
74. |
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022)
October
2022
|
73. |
IEEE Transactions on Cloud Computing,
10(3):1661-1674
September
2022
ISSN: 2168-7161
|
72. |
47th IEEE Conference on Local Computer Networks (LCN)
Edmonton, Canada, September 26-29, 2022
Publisher: IEEE,
September
2022
|
71. |
Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS '22), September 26-30, 2022, Copenhagen, Denmark Volume 978-3-031-17143-7, page 574--594.
Publisher: Springer Nature Switzerland,
September
2022
|
70. |
Cyber Security Experimentation and Test Workshop (CSET 2022)
Virtual, August 8, 2022
Publisher: ACM, New York, NY, USA
August
2022
ISBN: 978-1-4503-9684-4/22/08
|
69. |
Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan, page 252-266.
Publisher: ACM,
May
2022
ISBN: 978-1-4503-9140-5/22/05
|
68. |
Proceedings of the 8th ACM Cyber-Physical System Security Workshop (CPSS '22), co-located with the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan, page 73-84.
Publisher: ACM,
May
2022
ISBN: 978-1-4503-9176-4/22/05
|
67. |
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22), page 201-206.
Publisher: ACM,
May
2022
ISBN: 978-1-4503-9216-7/22/05
|
66. |
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22), page 207-221.
Publisher: ACM,
May
2022
ISBN: 978-1-4503-9216-7/22/05
|
65. |
Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22), May 2-5, 2022, Shanghai, China
Publisher: IEEE,
May
2022
ISBN: 978-1-6654-9538-7/22
|
2021 | |
64. |
Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER '20), co-located with the 36th Annual Computer Security Applications Conference (ACSAC '20), December 7-11, 2020, Austin, TX, USA
Publisher: ACSA,
December
2021
ISBN: 978-1-891562-81-5
|
63. |
IEEE Transactions on Network and Service Management,
18(3):3064-3078
September
2021
ISSN: 1932-4537
|
62. |
ERCIM News,
126:24-25
July
2021
ISSN: 0926-4981
|
61. |
Proceedings of the 1st ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS '21), co-located with the 11th ACM Conference on Data and Application Security and Privacy (CODASPY '21), April 26-28, 2021, Virtual Event, USA, page 78–87.
Publisher: ACM,
April
2021
ISBN: 978-1-4503-8319-6/21/04
|
2020 | |
60. |
Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC '20), December 15, 2020, Virtual Event, page 31-44.
Publisher: HomomorphicEncryption.org,
December
2020
DOI: 10.25835/0072999
ISBN: 978-3-00-067798-4
|
59. |
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA.
Publisher: ACM, New York, NY, USA
November
2020
|
58. |
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA.
Publisher: ACM, New York, NY, USA
November
2020
|
57. |
Proceedings of the Internet Measurement Conference (IMC '20), October 27-29, 2020, Pittsburgh, PA, USA, page 101-110.
Publisher: ACM,
October
2020
ISBN: 978-1-4503-8138-3/20/10
|
56. |
IEEE Transactions on Industrial Informatics,
17(5):2985-2996
September
2020
ISSN: 1941-0050
|
55. |
Proceedings of the 19th IFIP Networking 2020 Conference (NETWORKING '20), June 22-26, 2020, Paris, France, page 298-306.
Publisher: IEEE,
June
2020
ISBN: 978-3-903176-28-7
|
54. |
Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops '20), 1st Workshop on Blockchain for IoT and Cyber-Physical Systems (BIoTCPS '20), June 7-11, 2020, Dublin, Ireland
Publisher: IEEE,
June
2020
ISBN: 978-1-7281-7440-2
|
53. |
Proceedings of the 1st ITG Workshop on IT Security (ITSec '20), April 2-3, 2020, Tübingen, Germany
Publisher: University of Tübingen,
April
2020
|
2019 | |
52. |
Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC '19), co-located with the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom, page 27-38.
Publisher: ACM,
November
2019
ISBN: 978-1-4503-6831-5/19/11
|
51. |
IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2561-9
|
50. |
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2700-2
|
49. |
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Publisher: IEEE,
October
2019
ISBN: 978-1-7281-2700-2
|
48. |
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 4th Workshop on Computational Methods in Online Misbehavior (CyberSafety '19), May 13–17, 2019, San Francisco, CA, USA, page 197-205.
Publisher: ACM,
May
2019
ISBN: 978-1-4503-6675-5/19/05
|
47. |
Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW, page 31-37.
Publisher: IEEE,
May
2019
ISBN: 978-1-5386-8500-6/19
|
46. |
ITG-news,
02/2019:7-8
April
2019
|
45. |
Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), Wailea, HI, USA, page 7252-7261.
Publisher: University of Hawai'i at Manoa / AIS,
January
2019
ISBN: 978-0-9981331-2-6
|
2018 | |
44. |
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
December
2018
ISBN: 978-3-8440-6389-9
|
43. |
43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA
Publisher: IEEE,
October
2018
ISBN: 978-1-5386-4413-3
|
42. |
Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), co-located with the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany
Publisher: ACM,
August
2018
ISBN: 978-1-4503-6448-5
|
41. |
Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018), page 364-370.
Publisher: IEEE,
April
2018
ISBN: 978-1-5386-5008-0
|
40. |
Future Generation Computer Systems,
80:448-466
March
2018
ISSN: 0167-739X
|
39. |
Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao
Publisher: Springer,
February
2018
|
2017 | |
38. |
Pervasive and Mobile Computing,
42:58-76
December
2017
ISSN: 1574-1192
|
37. |
Network Security and Privacy for Cyber-Physical Systems
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2,
page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November
2017
ISBN: 978-1-119-22604-8
|
36. |
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Melbourne, VIC, Australia, page 543-544.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
35. |
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia, page 262-271.
Publisher: ACM,
November
2017
ISBN: 978-1-4503-5368-7
|
34. |
Proceedings of the 16th Workshop on Privacy in the Electronic Society (WPES), co-located with the 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA
Publisher: ACM,
October
2017
ISBN: 978-1-4503-5175-1
|
33. |
Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, NSW, Australia, page 185-192.
Publisher: IEEE,
August
2017
ISBN: 978-1-5090-4905-9
|
32. |
BMC Medical Genomics,
10(Suppl 2):29-42
July
2017
ISSN: 1755-8794
|
31. |
Proceedings of the 2017 Network Traffic Measurement and Analysis Conference (TMA 2017), Dublin, Ireland
Publisher: IEEE / IFIP,
June
2017
ISBN: 978-3-901882-95-1
|
30. |
Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada, page 252-258.
Publisher: IEEE,
April
2017
DOI: 10.1109/IC2E.2017.32
ISBN: 978-1-5090-5817-4
|
29. |
Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA, page 83-94.
Publisher: ACM,
March
2017
ISBN: 978-1-4503-4523-1
|
28. |
Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA, page 17-24.
Publisher: IEEE,
February
2017
ISBN: 978-3-901882-88-3
|
2016 | |
27. |
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, page 366-370.
Publisher: IEEE,
December
2016
ISBN: 978-1-5090-1445-3
|
26. |
Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 99-110.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4569-9
|
25. |
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 1766-1768.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4139-4
|
24. |
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, page 1769-1771.
Publisher: ACM,
October
2016
ISBN: 978-1-4503-4139-4
|
23. |
Technical Report
Document number: AIB-2016-06
Report Number: arXiv:1607.03239 [cs.NI]
Department of Computer Science, RWTH Aachen University, Ahornstr. 55, 52074 Aachen, Germany
July
2016
|
22. |
Proceedings of the Second International Workshop on
Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), co-located with the 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany, page 130-135.
Publisher: IEEE,
April
2016
ISBN: 978-1-5090-3684-4
|
21. |
Future Generation Computer Systems,
56:701-718
March
2016
ISSN: 0167-739X
|
20. |
Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA
Publisher: Internet Society,
February
2016
ISBN: 978-1-891562-41-9
|
2015 | |
19. |
14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco Volume 9476of Lecture Notes in Computer Science, page 197-213.
Publisher: Springer,
December
2015
ISBN: 978-3-319-26822-4
|
18. |
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September
2015
ISBN: 978-3-319-29882-5
|
17. |
2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA, page 198-205.
Publisher: IEEE,
May
2015
DOI: 10.1109/SPW.2015.9
|
16. |
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
Publisher: ACM,
March
2015
ISBN: 978-1-4503-3191-3
|
2014 | |
15. |
A Trust Point-based Security Architecture for Sensor Data in the Cloud
Trusted Cloud Computing
page 77-106.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
14. |
Trusted Cloud Computing
page 203-218.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
13. |
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada Volume 37of Procedia Computer Science, page 370-375.
Publisher: Elsevier,
September
2014
|
12. |
2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Barcelona, Spain, page 191-196.
Publisher: IEEE,
August
2014
ISBN: 978-1-4799-4357-9
|
11. |
7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)
July
2014
|
10. |
Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC), Madeira, Portugal
Publisher: IEEE,
June
2014
|
9. |
Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, page 1-8.
Publisher: IEEE,
January
2014
ISBN: 978-1-4799-3635-9
|
2013 | |
8. |
Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, UK, page 266-269.
Publisher: IEEE,
December
2013
ISBN: 978-0-7695-5095-4
|
7. |
International Journal of Grid and High Performance Computing (IJGHPC),
5(4):97-112
December
2013
ISSN: 1938-0259
|
6. |
Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, page 259-266.
Publisher: IEEE,
October
2013
ISBN: 978-1-4577-2014-7
|
5. |
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), part of 2013 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, page 18-22.
Publisher: IEEE,
May
2013
DOI: 10.1109/SPW.2013.31
ISBN: 978-1-4799-0458-7
|
4. |
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-1998-0
|
3. |
Internet-Draft
Document number: draft-hummen-hip-middle-puzzle-01
Internet Engineering Task Force,
January
2013
|
2012 | |
2. |
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan, page 232-240.
Publisher: IEEE,
December
2012
ISBN: 978-1-4673-4511-8
|
1. |
Internet-Draft
Document number: draft-hummen-hip-middle-puzzle-00
Internet Engineering Task Force,
July
2012
|