On the security and privacy of Internet of Things architectures and systems E Vasilomanolakis, J Daubert, M Luthra, V Gazis, A Wiesmaier, P Kikiras 2015 International workshop on secure internet of things (SIoT), 49-57, 2015 | 196 | 2015 |
A view on privacy & trust in IoT J Daubert, A Wiesmaier, P Kikiras 2015 IEEE International Conference on Communication Workshop (ICCW), 2665-2670, 2015 | 119 | 2015 |
Big data storage M Strohbach, J Daubert, H Ravkin, M Lischka New Horizons for a Data-Driven Economy: A Roadmap for Usage and Exploitation …, 2016 | 109 | 2016 |
Beyond the hype: On using blockchains in trust management for authentication N Alexopoulos, J Daubert, M Mühlhäuser, SM Habib 2017 IEEE Trustcom/BigDataSE/ICESS, 546-553, 2017 | 101 | 2017 |
AnonPubSub: Anonymous publish-subscribe overlays J Daubert, M Fischer, T Grube, S Schiffner, P Kikiras, M Mühlhäuser Computer Communications 76, 42-53, 2016 | 29 | 2016 |
How long do vulnerabilities live in the code? a {Large-Scale} empirical measurement study on {FOSS} vulnerability lifetimes N Alexopoulos, M Brack, JP Wagner, T Grube, M Mühlhäuser 31st USENIX Security Symposium (USENIX Security 22), 359-376, 2022 | 25 | 2022 |
Street lamps as a platform M Mühlhäuser, C Meurisch, M Stein, J Daubert, J Von Willich, J Riemann, ... Communications of the ACM 63 (6), 75-83, 2020 | 24 | 2020 |
Improving the usability and ux of the swiss internet voting interface K Marky, V Zimmermann, M Funk, J Daubert, K Bleck, M Mühlhäuser Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 21 | 2020 |
Efficient privacy-preserving recommendations based on social graphs A Wainakh, T Grube, J Daubert, M Mühlhäuser Proceedings of the 13th ACM Conference on Recommender Systems, 78-86, 2019 | 19 | 2019 |
HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot J Daubert, D Boopalan, M Mühlhäuser, E Vasilomanolakis NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2018 | 19 | 2018 |
Challenges and available solutions against organized cyber-crime and terrorist networks A Tundis, F Huber, B Jäger, J Daubert, E Vasilomanolakis, M Mühlhäuser WIT Transactions on the Built Environment 174, 429-441, 2018 | 18 | 2018 |
Cover traffic: A trade of anonymity and efficiency T Grube, M Thummerer, J Daubert, M Mühlhäuser Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017 | 16 | 2017 |
Twitterize: Anonymous micro-blogging J Daubert, L Böck, P Kikirasy, M Mühlhäuser, M Fischer 2014 IEEE/ACS 11th International Conference on Computer Systems and …, 2014 | 16 | 2014 |
End-2-End privacy architecture for IoT S Funke, J Daubert, A Wiesmaier, P Kikiras, M Muehlhaeuser 2015 IEEE Conference on Communications and Network Security (CNS), 705-706, 2015 | 15 | 2015 |
Exploring energy grid resilience: The impact of data, prosumer awareness, and action R Egert, J Daubert, S Marsh, M Mühlhäuser Patterns 2 (6), 2021 | 14 | 2021 |
Distributed and anonymous publish-subscribe J Daubert, M Fischer, S Schiffner, M Mühlhäuser Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 14 | 2013 |
Cloud-based IoT analytics for the smart grid: experiences from a 3-year pilot T Hasan, P Kikiras, A Leonardi, H Ziekow, J Daubert EAI Endorsed Transactions on Cloud Systems 1 (2), 2015 | 9 | 2015 |
Internal attacks in anonymous publish-subscribe P2P overlays J Daubert, T Grube, M Mühlhäuser, M Fischer 2015 International Conference and Workshops on Networked Systems (NetSys), 1-8, 2015 | 8 | 2015 |
Anonymous Publish-Subscribe Overlays J Daubert Dissertation, Darmstadt, Technische Universität Darmstadt, 2016, 2016 | 5 | 2016 |
Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot E Vasilomanolakis, J Daubert, D Boopalan, M Mühlhäuser NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-2, 2018 | 4 | 2018 |