Search

Your search keyword '"Stiller, Burkhard"' showing total 206 results

Search Constraints

Start Over You searched for: Author "Stiller, Burkhard" Remove constraint Author: "Stiller, Burkhard" Database OpenAIRE Remove constraint Database: OpenAIRE
206 results on '"Stiller, Burkhard"'

Search Results

1. RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports

2. SpecForce: A Framework to Secure IoT Spectrum Sensors in the Internet of Battlefield Things

3. Demo: closed-loop security orchestration in the telco cloud for moving target defense

4. Real-time Tracking of Medical Devices: An Analysis of Multilateration and Fingerprinting Approaches

6. FederatedTrust: A Solution for Trustworthy Federated Learning

7. TopoFuzzer : a network topology fuzzer for moving target defense in the telco cloud

8. MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation

9. SECAdvisor: a Tool for Cybersecurity Planning using Economic Models

10. RansomAI: AI-powered Ransomware for Stealthy Encryption

11. RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT

12. Overcoming C₆₀-induced interfacial recombination in inverted perovskite solar cells by electron-transporting carborane

14. A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices

15. CoReTM: An Approach Enabling Cross-Functional Collaborative Threat Modeling

16. SecRiskAI: a Machine Learning-Based Approach for Cybersecurity Risk Prediction in Businesses

17. A Case Study of a Blockchain-GDPR Adaptation

19. When Parents and Children Disagree

20. CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors

21. Cybersecurity Support for SMEs

22. Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario

25. On Trust, Blockchain, and Reputation Systems

26. Untangling Header Bidding Lore: Some Myths, Some Truths, and Some Hope

27. 15 Secure Crowdsensing Platforms Through Device Behavior Fingerprinting

28. ITrade: A Blockchain-based, Self-Sovereign, and Scalable Marketplace for IoT Data Streams

30. On-Chain IoT Data Modification in Blockchains

31. AI-enabled slice protection exploiting moving target defense in 6G networks

34. SaCI: A Blockchain-Based Cyber Insurance Approach for the Deployment and Management of a Contract Coverage

35. Blockchain on MSP430 with IEEE 802.15.4

36. A Practical Analysis on Mirai Botnet Traffic

37. BIIT: Standardization of Blockchain-based I2oT Systems in the I4 Era

38. Blockchain-based Anonymous P2P Trading System

39. Passive and Active Measurement (PAM 2020)

40. Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLD

41. Flow-based detection of IPv6-specific network layer attacks

45. Toward a Policy-based Blockchain Agnostic Framework

46. Enabling Dynamic SLA Compensation Using Blockchain-based Smart Contracts

48. Evaluating a Blockchain-based Cooperative Defense

49. Lieferketten dank Blockchain überwachen

Catalog

Books, media, physical & digital resources