| Jahr Year | Titel/Autor:in Title/Author | Publikationstyp Publication Type |
|---|---|---|
| 2026 | Structural Testing with Homomorphic Encryption Aleksandrov, Andrei |
Konferenzbeitrag Conference Paper |
| 2026 | N5GEH-skalierbares Anlagenmonitoring in großen Liegenschaften - N5GEH-SKAMO Hartwig, Karen; Wilde, Andreas; Kemeth, Ferdinand; Esch, Wolfgang; Spiegelberg, Ingo |
Bericht Report |
| 2026 | Im Cybersicherheits- und Datenschutzgeflecht: Besser konsolidieren für mehr Innovation Selzer, Annika; Kreutzer, Michael; Stummer, Sarah |
Internetbeitrag Internet Contribution |
| 2026 | Precision Envelope Management Silhavy, Daniel; Eisenbacher, David; Kornienko, Olga; Nguyen, Minh; Pham, Stefan |
Konferenzbeitrag Conference Paper |
| 2026 | Cybersecurity risk assessment in OT systems using attack graphs Unger, Simon; Arzoglou, Ektor; Heinrich, Markus; Scheuermann, Dirk; Katzenbeisser, Stefan |
Zeitschriftenaufsatz Journal Article |
| 2026 | Secure Medical Digital Twins: A Use-Case Driven Approach Ahmad, Salmah; Bartelt, Bianca; Enzmann, Matthias; Kohlhammer, Jörn; Wesarg, Stefan; Wolf, Ruben |
Konferenzbeitrag Conference Paper |
| 2026 | A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS) Schupp, Jonas; Sigl, Georg |
Konferenzbeitrag Conference Paper |
| 2026 | Model-Aware Visual Analytics for Aligning Data Shift in Network Traffic Classification Cherepanov, Igor; Sessler, David; Feil, Alexander; Ulmer, Alex; Kohlhammer, Jörn |
Konferenzbeitrag Conference Paper |
| 2026 | Standardized and Usage-Controlled Alert Analysis for Improved Cyber Threat Intelligence Meyer zum Felde, Hendrik; Azzabi, Radhouene; Gouy-Pailler, Cédric; Lehmann, Gilles; Gil, Amaia |
Konferenzbeitrag Conference Paper |
| 2026 | DaV3is: Data Flow-Based Vulnerability Verification Through Visualization Mertz, Tobias; Reynolds-Ringer, Steven Lamarr; Kohlhammer, Jörn |
Zeitschriftenaufsatz Journal Article |
| 2026 | PowerRange: An immersive cyber range for power grid operators Bader, Lennart; Wagner, Eric; Serror, Martin |
Zeitschriftenaufsatz Journal Article |
| 2025 | Same Same but Different? Appelt, Dominik |
Konferenzbeitrag Conference Paper |
| 2025 | Cybersicherheitsforschung im Spannungsfeld des Strafrechts - Überblick über bisherige Rechtsprechung zu einschlägigen strafrechtlichen Normen Kriegel, Jessica |
Konferenzbeitrag Conference Paper |
| 2025 | Einordnung wesentlicher und wichtiger Einrichtungen nach der NIS-2-Richtlinie - eine Betrachtung mit Schwerpunkt auf dem Energiesektor Hardt, Mark Joshua |
Konferenzbeitrag Conference Paper |
| 2025 | Utilizing SBOM for Transparent AI Risk Communication Helmer, Lennard; Fink, Lisa; Poretschkin, Maximilian |
Konferenzbeitrag Conference Paper |
| 2025 | LENI: Lightweight and Efficient Network-Optimized Remote Attestation for IoT Devices Eckel, Michael |
Konferenzbeitrag Conference Paper |
| 2025 | Who Appraises the Appraiser? Decentralized Attestation with Partial Appraisal and Aggregated Results Eckel, Michael; Gkoktsis, George; Horn, Markus |
Konferenzbeitrag Conference Paper |
| 2025 | Towards Stateless Post-Quantum Remote Attestation for IoT Using TPM and DICE Eckel, Michael; Gorbracht, Janik; Gkoktsis, George; Kaupat, Tobias |
Konferenzbeitrag Conference Paper |
| 2025 | Weiterbildung zur Cybersicherheit Schneider, Markus; Heftrig, Elias; Dukanovic, Sinisa; Dexheimer, Thomas |
Zeitschriftenaufsatz Journal Article |
| 2025 | Cross-Divisional Cybersecurity Risk Management in Automotive: Requirements and Current Practices Wagner, Patrick |
Konferenzbeitrag Conference Paper |
| 2025 | Strategic Open Source in Industrial Digital Ecosystems Schleimer, Anna Maria; Otto, Boris; Hirschen, Christian; Oelsner, Tom |
Paper |
| 2025 | Enhancing Cyber Threat Intelligence Sharing through Data Spaces in Critical Infrastructures Akbari Gurabi, Mehdi; Sen, Ömer; Rahimidanesh, Navid; Ulbig, Andreas; Decker, Stefan |
Konferenzbeitrag Conference Paper |
| 2025 | Cybertraining auf einer Cyber Range Schneider, Markus; Dexheimer, Thomas; Heftrig, Elias; Dukanovic, Sinisa |
Zeitschriftenaufsatz Journal Article |
| 2025 | Systematic Review: Malware Detection and Classification in Cybersecurity Berrios, Sebastian; Leiva, Dante; Olivares, Bastian; Allende-Cid, Héctor; Hermosilla, Pamela |
Zeitschriftenaufsatz Journal Article |
| 2025 | Explainable AI for Forensic Analysis: A Comparative Study of SHAP and LIME in Intrusion Detection Models Hermosilla, Pamela; Berríos, Sebastián; Allende-Cid, Héctor |
Zeitschriftenaufsatz Journal Article |
| 2025 | Work in Progress: Artificial Intelligence in Cybersecurity - Developing a Framework for Ethically Responsible Practices Lehniger, Nandshin Gerda; Kubach, Michael |
Konferenzbeitrag Conference Paper |
| 2025 | Cybersicherheit im Energiesektor Appelt, Dominik; Enzmann, Matthias; Selzer, Annika |
Zeitschriftenaufsatz Journal Article |
| 2025 | A Machine-Learning-Based Approach for the Detection and Mitigation of Distributed Denial-of-Service Attacks in Internet of Things Environments Berríos, Sebastián; Garcia, Sebastián; Hermosilla, Pamela; Allende-Cid, Héctor |
Zeitschriftenaufsatz Journal Article |
| 2025 | pandaict: a Novel Open-Source Tool for modeling Cyber-Physical Energy Systems Ringelstein, Jan; Marten, Frank Bernhard; Vogt, Mike; Banerjee, Gourab; Bao, Johannes |
Konferenzbeitrag Conference Paper |
| 2025 | pandaict: a Novel Open-Source Tool for modeling Cyber-Physical Energy Systems Ringelstein, Jan; Marten, Frank Bernhard; Vogt, Mike; Schmidt-Banerjee, Gourab; Bao, Johannes |
Vortrag Presentation |
| 2025 | Sentinel AI: LLM Powered Cybersecurity Intelligence Tracker Neelam, Jaya Sravya |
Master Thesis |
| 2025 | Improving Static and Dynamic Vulnerability Analysis using Values and Dataflows Miltenberger, Marc |
Dissertation Doctoral Thesis |
| 2025 | On Collaboration and Automation in the Context of Threat Detection and Response with Privacy-Preserving Features Nitz, Lasse; Akbari Gurabi, Mehdi; Cermak, Milan; Zadnik, Martin; Karpuk, David; Drichel, Arthur; Schäfer, Sebastian; Holmes, Benedikt; Mandal, Avikarsha |
Zeitschriftenaufsatz Journal Article |
| 2025 | Breaking it down to build it back up: Attacks and Defenses for RPKI Mirdita, Donika |
Dissertation Doctoral Thesis |
| 2025 | The Internet of Quantum Things (IoQT) - A New Frontier in Quantum Emulation and Simulation Kefaloukos, Ioannis; Tcholtchev, Nikolay Vassilev; Kourtis, Michail-Alexandros; Oikonomakis, Giorgos; Rompogiannakis, Emmanouil Eleftherios; Markakis, Evangelos |
Konferenzbeitrag Conference Paper |
| 2025 | A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling Akbari Gurabi, Mehdi; Mansoor, Muhammad Usman; Matzutt, Roman; Mandal, Avikarsha; Decker, Stefan |
Konferenzbeitrag Conference Paper |
| 2025 | All your TLS keys are belong to Us: A novel approach to live memory forensic key extraction Baier, Daniel; Lambertz, Martin |
Zeitschriftenaufsatz Journal Article |
| 2025 | Leveraging BRSKI to Protect the Hardware Supply Chain of Operational Technology: Opportunities and Challenges Heinl, Michael P.; Reuter, Adrian; Peters, Sebastian N.; Bever, Markus |
Konferenzbeitrag Conference Paper |
| 2025 | Kollaboratives Modelltraining und Datensicherheit Piendl, Daniel; Izaber-Ludwig, Andy; Rothe, Jakob; Zäh, Michael F. |
Zeitschriftenaufsatz Journal Article |
| 2025 | Towards ML-KEM & ML-DSA on OpenTitan Abdulrahman, Amin; Oberhansl, Felix Fritz; Hien Pham, Hoang Nguyen; Philipoom, Jade; Schwabe, Peter; Stelzer, Tobias; Seelos-Zankl, Andreas |
Konferenzbeitrag Conference Paper |
| 2025 | Characterizing Hosting and Security Practices for Public-Facing LDAP Servers Cesar, Gustavo Luvizotto; Öndarö, Gurur; Kaspereit, Jonas; Ising, Fabian; Schinzel, Sebastian; Jonker, Mattijs; Holz, Ralph G. |
Konferenzbeitrag Conference Paper |
| 2025 | Towards Graph-based Self-learning of Industrial Process Behaviour for Anomaly Detection Meshram, Ankush; Karch, Markus; Haas, Christian; Beyerer, Jürgen |
Zeitschriftenaufsatz Journal Article |
| 2025 | Assessing and Communicating Software Security: Enhancing Software Product Health With Architectural Threat Analysis Strüwer, Jan-Niclas; Trentinaglia, Roman; Wohlers, Benedict; Bodden, Eric; Dumitrescu, Roman |
Konferenzbeitrag Conference Paper |
| 2025 | Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform Stelzer, Tobias; Oberhansl, Felix Fritz; Schupp, Jonas; Karl, Patrick; Turcuman, Horia |
Zeitschriftenaufsatz Journal Article |
| 2025 | Securing the Additive Manufacturing Process Chain Puch, Nikolai; Dopfer, Stefan; Birkel, Leon |
Konferenzbeitrag Conference Paper |
| 2025 | How can Design Thinking benefit Cybersecurity? Arunkumar, Mrudula; Schunck, Christian Heinrich; Ben Mamia, Salma; Roßnagel, Heiko |
Konferenzbeitrag Conference Paper |
| 2025 | Security awareness versus secure behaviour Ben Mamia, Salma; Schunck, Christian Heinrich; Arunkumar, Mrudula; Roßnagel, Heiko |
Konferenzbeitrag Conference Paper |
| 2025 | Soft Analytical Side-Channel Attacks on the NTT for Post-Quantum Cryptography Maurer, Daniel |
Master Thesis |
| 2025 | Deployment Challenges of Industrial Intrusion Detection Systems Wolsing, Konrad; Wagner, Eric; Basels, Frederik; Wagner, Patrick; Wehrle, Klaus |
Konferenzbeitrag Conference Paper |
| 2025 | Investigating PKI and Routing Security Frieß, Jens |
Dissertation Doctoral Thesis |
| 2025 | A parameter study for LLL and BKZ with application to shortest vector problems Köppl, Tobias; Zander, René; Henkel, Louis; Tcholtchev, Nikolay Vassilev |
Konferenzbeitrag Conference Paper |
| 2025 | OT-Security im industriellen Mittelstand Kubach, Michael; Winterstetter, Matthias; Schunck, Christian Heinrich |
Studie Study |
| 2025 | Zero-Day Threat Mitigation via Deep Learning in Cloud Environments Berrios Vasquez, Sebastian Ignacio; Hermosilla Monckton, Pamela; Leiva Muñoz, Dante Ivan; Allende, Héctor |
Zeitschriftenaufsatz Journal Article |
| 2025 | A5/1 is in the Air: Passive Detection of 2G (GSM) Ciphering Algorithms Koch, Matthias; Nettersheim, Christian; Horstmann, Thorsten; Rademacher, Michael |
Konferenzbeitrag Conference Paper |
| 2025 | Simulation of multi-stage attack and defense mechanisms in smart grids Sen, Ömer; Ivanov, Bozhidar; Kloos, Christian; Zöll, Christoph; Lutat, Philipp; Henze, Martin; Ulbig, Andreas; Andres, Michael |
Zeitschriftenaufsatz Journal Article |
| 2025 | EMERALD: Evidence Management for Continuous Certification as a Service in the Cloud Banse, Christian; Fanta, Björn; Alonso, Juncal; Martinez Martinez, Cristina |
Konferenzbeitrag Conference Paper |
| 2025 | Global Trends in National Cybersecurity Strategies: A Guide for Strategy Development Gärtner, Tanya |
Konferenzbeitrag Conference Paper |
| 2025 | Neue Cybersicherheitsrechtliche Anforderungen im Energiesektor Appelt, Dominik; Steenbergen, Marina |
Konferenzbeitrag Conference Paper |
| 2025 | Leveraging AI Agents for Task Automation in Blockchain Wallets with Account Abstraction Dimitrov, Ivan; Prinz, Wolfgang |
Konferenzbeitrag Conference Paper |
| 2025 | Automatisierung offensiver Cybersicherheitsmaßnahmen Esser, Julia; Plötz, Caroline |
Konferenzbeitrag Conference Paper |
| 2025 | Web3 Attack Matrix: An Adversary Behavior Framework Hanneke, Björn; Horch, Andrea; Savaliya, Sirish Kalubhai; Ruff, Christopher; Schunck, Christian Heinrich |
Konferenzbeitrag Conference Paper |
| 2025 | Entangled Threats: A Unified Kill Chain Model for Quantum Machine Learning Security Debus, Pascal; Wendlinger, Maximilian; Tscharke, Kilian; Herr, Daniel; Brugmann, Cedric; Ohl de Mello, Daniel; Ulmanis, Juris; Erhard, Alexander; Schmidt, Arthur; Petsch, Fabian |
Konferenzbeitrag Conference Paper |
| 2025 | An Exploratory Study on Teaching Software Supply Chain Security Concepts to High School Students Ohm, Marc; Börgener, Yannik; Pohl, Timo |
Konferenzbeitrag Conference Paper |
| 2025 | Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments Wagner, Paul-Georg |
Dissertation Doctoral Thesis |
| 2025 | Blockchain Technology Stramm, Jan; Lautenschlager, Jonathan; Keppler, Lars |
Aufsatz in Buch Book Article |
| 2025 | Post-Quantum Cryptography for Linux File System Integrity Wiesböck, Johannes; Münch, Maximiliane; Weiß, Michael |
Konferenzbeitrag Conference Paper |
| 2025 | Application of Quantum Computing in the Energy Industry, Decarbonization, and Sustainability Capellaro, Christoph; Martín-Cuevas, Rafael; Calleja, Guzmán; Halffmann, Pascal; Sharma, Shivam |
Aufsatz in Buch Book Article |
| 2025 | Towards a Quantitative Holistic Cybersecurity Assessment of Energy Systems Herzog, Almut; Geiger, Alexander; Ulbig, Andreas |
Konferenzbeitrag Conference Paper |
| 2025 | Simulating the overload of medical processes due to system failures during a cyberattack Willing, Markus; Ebbers, Simon; Dresen, Christian; Czolbe, Marc; Saatjohann, Christoph; Schinzel, Sebastian |
Zeitschriftenaufsatz Journal Article |
| 2025 | Aktuelle Entwicklungen des Rechtsrahmens der Cybersicherheit und Privatheit | Tagungsband Conference Proceeding |
| 2025 | GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection Wolsing, Konrad; Wagner, Eric; Lux, Luisa; Wehrle, Klaus; Henze, Martin |
Konferenzbeitrag Conference Paper |
| 2025 | Towards Resilient Cybersecurity in IoBT: Aligning Defense in Depth with CIA-CAP Constraints Pignaton De Freitas, Edison Pignaton; Fernandes, Ricardo Araujo Queiroz; Lopes Rettore, Paulo Henrique; Sevenich, Peter |
Konferenzbeitrag Conference Paper |
| 2025 | Secure Management of Connected Vehicles using Trusted Computing-enabled Central Security Provider Plappert, Christian |
Dissertation Doctoral Thesis |
| 2025 | Resilience-By-Design: Standard-based definition of Resilience and identification of action fields for the systems design of mobility system Mpidi Bita, Isaac; Hovemann, Aschot; Dumitrescu, Roman |
Zeitschriftenaufsatz Journal Article |
| 2025 | PROTECT - Sicherer Netzbetrieb durch Einsatz selbstlernender KI-Firewalls in Energieversorgungsunternehmen. Gesamtabschlussbericht Kummerow, Andre; Nicolai, Steffen; Bachmann, Paul; Schulz, Andreas; Schneider, Martin; Sobreira de Freitas Sihle, Michael Alecsander; Fitzenreiter, Stefan; Eymer, Kerstin |
Bericht Report |
| 2025 | CERERE - An Emulation Environment to Evaluate the Resilience of Complex Systems against Cyber Electro-Magnetic Activities Attenni, Matteo; Belluccini, Sara; Colo, Giordano; Pompili, Andrea; Tedeschi, Pietro; Bader, Lennart; Serror, Martin; Wagner, Eric; Aurisch, Thorsten; Prahl-Kamps, Maximilian; Zißner, Philipp |
Konferenzbeitrag Conference Paper |
| 2025 | Cyber-Physical Interdependence for Power System Operation and Control Zografopoulos, Ioannis; Srivastava, Ankur; Konstantinou, Charalambos; Zhao, Junbo; Abiri-Jahromi, Amir; Chawla, Astha; Nguyen, Bang Le Huy; Bu, Siqi Qiqi; Li, Chendan; Teng, Fei; Preetham, Goli; Ospina, Juan; Asim Aftab, Mohd; Arani, Mohammadreza Fakhari Moghaddam; Sen, Ömer; Moutis, Panayiotis Panos; Ge, Pudong; Guo, Qinglai; Sahoo, Subham Kumar; Lakshminarayana, Subhash; Vu, Tuyen Van; Wang, Zhaoyuan |
Zeitschriftenaufsatz Journal Article |
| 2025 | Information Theoretic Analysis of PUF-Based Tamper Protection Maringer, Georg Johannes; Hiller, Matthias |
Zeitschriftenaufsatz Journal Article |
| 2025 | S/MINE: collecting and analyzing S/MIME certificates at scale Öndarö, Gurur; Kaspereit, Jonas; Umezulike, Samson; Saatjohann, Christoph; Ising, Fabian; Schinzel, Sebastian |
Konferenzbeitrag Conference Paper |
| 2025 | Der Digitale Produktpass: Befähiger der Kreislaufwirtschaft? Munderich, Jannik; Werner, Andreas; Jung, Moritz; Fischer, Thomas |
Studie Study |
| 2025 | Exploring Anomaly Detection for Marine Radar Systems Saillard, Antoine; Wolsing, Konrad; Wehrle, Klaus; Bauer, Jan |
Konferenzbeitrag Conference Paper |
| 2025 | Hardware and Lifecycle Requirements for Secure PROFINET Devices Niemann, Karl-Heinz; Schutter, Hendrik; Leßmann, Gunnar; Rovelli, Francesco; Otto, Jens; Specht, Felix |
Konferenzbeitrag Conference Paper |
| 2025 | On Cybersecurity Incident Response Decision Support System in Smart Grids Sen, Ömer; Mahjoob, Amirali; Neumüller, Martin; Ulbig, Andreas; Decker, Stefan |
Konferenzbeitrag Conference Paper |
| 2025 | Towards Safety and Security Testing of Cyberphysical Power Systems by Shape Validation Geiger, Alexander; Hacker, Immanuel; Sen, Ömer; Ulbig, Andreas |
Konferenzbeitrag Conference Paper |
| 2025 | Economic Challenges of Cybersecurity Innovations Pursuing an Ecosystems Approach Kubach, Michael |
Konferenzbeitrag Conference Paper |
| 2025 | A Generic Framework for Side-Channel Attacks Against LWE-Based Cryptosystems Hermelink, Julius; Streit, Silvan; Mårtensson, Erik; Petri, Richard |
Konferenzbeitrag Conference Paper |
| 2025 | Enhancing Quantum-Safe Cryptography in TLS: The Role of Pre-Shared Keys Frauenschläger, Tobias; Füreder, Lukas; Mottok, Jürgen Horst |
Konferenzbeitrag Conference Paper |
| 2025 | The Internet of Quantum Things (IoQT) - A New Frontier in Quantum Emulation and Simulation Kefaloukos, Ioannis; Tcholtchev, Nikolay; #PLACEHOLDER_PARENT_METADATA_VALUE# |
Konferenzbeitrag Conference Paper |
| 2025 | Fault Attacks on ECC Signature Verification Schneider, Kevin; Auer, Lukas; Wagner, Alexander |
Zeitschriftenaufsatz Journal Article |
| 2025 | Secure Medical Digital Twins: A Use-Case Driven Approach Ahmad, Salmah; Bartelt, Bianca; Enzmann, Matthias; Kohlhammer, Jörn; Wesarg, Stefan; Wolf, Ruben |
Paper |
| 2025 | Comparative Analysis of Threat Assumptions in Field Level Protocol Security Peters, Ludger; Gkoktsis, George; Cäsar, Matthias; Eckel, Michael |
Konferenzbeitrag nicht im Tagungsband Conference Paper not in Proceedings |
| 2025 | Performance and Communication Cost of Hardware Accelerators for Hashing in Post-Quantum Cryptography Karl, Patrick; Schupp, Jonas; Sigl, Georg |
Zeitschriftenaufsatz Journal Article |
| 2025 | Towards Creating a Darknet Image Database Yannikos, York; Agel, Marc Leon; Heeger, Julian; Graner, Lukas; Steinebach, Martin |
Konferenzbeitrag Conference Paper |
| 2025 | Large scale summarization using ensemble prompts and in context learning approaches Leiva-Araos, Andres; Gana, Bady; Allende-Cid, Héctor; Garcia, J. Antonio; Saikia, Manob Jyoti |
Zeitschriftenaufsatz Journal Article |
| 2024 | An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis Graebnitz, Christoph; Pickel, Valentin; Eble, Holger; Morgner, Frank; Hattenbach, Hannes Elias; Margraf, Marian |
Zeitschriftenaufsatz Journal Article |
| 2024 | Leveraging quantum uncertainty: Quantum randomness through the lens of classical communication networks Das, Siddharth; Krause, Stefan; Giering, Kay-Uwe; Pousa, Ricardo J.B.; Bassoli, Riccardo; Fitzek, Frank |
Zeitschriftenaufsatz Journal Article |
| 2024 | Resilience of lattice-based Cryptosystems to Quantum Attacks Köppl, Tobias; Zander, René; Tcholtchev, Nikolay Vassilev |
Konferenzbeitrag Conference Paper |
| 2024 | Strengthening Cyber Defence through Cooperative Development and Shared Expertise in Incident Response Playbooks Akbari Gurabi, Mehdi; Nitz, Lasse; Joglekar, Charukeshi Mayuresh; Mandal, Avikarsha |
Zeitschriftenaufsatz Journal Article |
| 2024 | Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation Akbari Gurabi, Mehdi; Nitz, Lasse; Bregar, Andrej; Popanda, Jan; Siemers, Christian; Matzutt, Roman; Mandal, Avikarsha |
Zeitschriftenaufsatz Journal Article |
| 2024 | A Security Model for Web-Based Communication Fotouhi Tehrani, Pouyan; Osterweil, Eric; Schmidt, Thomas C.; Wählisch, Matthias |
Zeitschriftenaufsatz Journal Article |
Diese Liste ist ein Auszug aus der Publikationsplattform Fraunhofer-Publica
This list has been generated from the publication platform Fraunhofer-Publica