Следене
Jörg Daubert
Jörg Daubert
Provadis School of International Management and Technology AG
Потвърден имейл адрес: provadis-hochschule.de - Начална страница
Заглавие
Позовавания
Позовавания
Година
On the security and privacy of Internet of Things architectures and systems
E Vasilomanolakis, J Daubert, M Luthra, V Gazis, A Wiesmaier, P Kikiras
2015 International workshop on secure internet of things (SIoT), 49-57, 2015
1932015
A view on privacy & trust in IoT
J Daubert, A Wiesmaier, P Kikiras
2015 IEEE International Conference on Communication Workshop (ICCW), 2665-2670, 2015
1112015
Beyond the hype: On using blockchains in trust management for authentication
N Alexopoulos, J Daubert, M Mühlhäuser, SM Habib
2017 IEEE Trustcom/BigDataSE/ICESS, 546-553, 2017
992017
Big data storage
M Strohbach, J Daubert, H Ravkin, M Lischka
New Horizons for a Data-Driven Economy: A Roadmap for Usage and Exploitation …, 2016
992016
AnonPubSub: Anonymous publish-subscribe overlays
J Daubert, M Fischer, T Grube, S Schiffner, P Kikiras, M Mühlhäuser
Computer Communications 76, 42-53, 2016
282016
Street lamps as a platform
M Mühlhäuser, C Meurisch, M Stein, J Daubert, J Von Willich, J Riemann, ...
Communications of the ACM 63 (6), 75-83, 2020
222020
Challenges and available solutions against organized cyber-crime and terrorist networks
A Tundis, F Huber, B Jäger, J Daubert, E Vasilomanolakis, M Mühlhäuser
WIT Transactions on the Built Environment 174, 429-441, 2018
192018
Improving the usability and ux of the swiss internet voting interface
K Marky, V Zimmermann, M Funk, J Daubert, K Bleck, M Mühlhäuser
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
182020
Efficient privacy-preserving recommendations based on social graphs
A Wainakh, T Grube, J Daubert, M Mühlhäuser
Proceedings of the 13th ACM Conference on Recommender Systems, 78-86, 2019
172019
How Long Do Vulnerabilities Live in the Code? A {Large-Scale} Empirical Measurement Study on {FOSS} Vulnerability Lifetimes
N Alexopoulos, M Brack, JP Wagner, T Grube, M Mühlhäuser
31st USENIX Security Symposium (USENIX Security 22), 359-376, 2022
162022
HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot
J Daubert, D Boopalan, M Mühlhäuser, E Vasilomanolakis
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2018
162018
Twitterize: Anonymous micro-blogging
J Daubert, L Böck, P Kikirasy, M Mühlhäuser, M Fischer
2014 IEEE/ACS 11th International Conference on Computer Systems and …, 2014
162014
Exploring energy grid resilience: The impact of data, prosumer awareness, and action
R Egert, J Daubert, S Marsh, M Mühlhäuser
Patterns 2 (6), 2021
142021
End-2-End privacy architecture for IoT
S Funke, J Daubert, A Wiesmaier, P Kikiras, M Muehlhaeuser
2015 IEEE Conference on Communications and Network Security (CNS), 705-706, 2015
142015
Distributed and anonymous publish-subscribe
J Daubert, M Fischer, S Schiffner, M Mühlhäuser
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
142013
Cover traffic: A trade of anonymity and efficiency
T Grube, M Thummerer, J Daubert, M Mühlhäuser
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
132017
Cloud-based IoT analytics for the smart grid: experiences from a 3-year pilot
T Hasan, P Kikiras, A Leonardi, H Ziekow, J Daubert
EAI Endorsed Transactions on Cloud Systems 1 (2), 2015
92015
Internal attacks in anonymous publish-subscribe P2P overlays
J Daubert, T Grube, M Mühlhäuser, M Fischer
2015 International Conference and Workshops on Networked Systems (NetSys), 1-8, 2015
82015
Anonymous Publish-Subscribe Overlays
J Daubert
Dissertation, Darmstadt, Technische Universität Darmstadt, 2016, 2016
52016
Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot
E Vasilomanolakis, J Daubert, D Boopalan, M Mühlhäuser
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-2, 2018
42018
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20