Search

Your search keyword '"TIPPENHAUER, NILS OLE"' showing total 232 results

Search Constraints

Start Over You searched for: Author "TIPPENHAUER, NILS OLE" Remove constraint Author: "TIPPENHAUER, NILS OLE"
232 results on '"TIPPENHAUER, NILS OLE"'

Search Results

1. Sensor Deprivation Attacks for Stealthy UAV Manipulation

2. A Scheduling-Aware Defense Against Prefetching-Based Side-Channel Attacks

3. Enabling Physical Localization of Uncooperative Cellular Devices

4. Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations

5. Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels

6. FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network

7. Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge

8. Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems

9. White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems

10. No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems

11. BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy

12. Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis

13. Decentralized Privacy-Preserving Proximity Tracing

14. Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems

15. Challenges for Security Assessment of Enterprises in the IoT Era

16. HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version)

18. Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot

19. Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems

20. Detection of Unauthorized IoT Devices Using Machine Learning Techniques

21. On Ladder Logic Bombs in Industrial Control Systems

22. Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3

23. CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions

25. MiniCPS: A toolkit for security research on CPS Networks

27. Automatic Generation of Security Argument Graphs

28. Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies

29. On Ladder Logic Bombs in Industrial Control Systems

30. Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN

34. Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios

35. Legacy-Compliant Data Authentication for Industrial Control System Traffic

37. On Attacker Models and Profiles for Cyber-Physical Systems

38. The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment

44. High-Fidelity Cyber and Physical Simulation of Water Distribution Systems. I: Models and Data

45. High-fidelity cyber and physical simulation of water distribution systems. II: Enabling cyber-physical attack localization

47. CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems

50. Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System

Catalog

Books, media, physical & digital resources