Campusleben_HAW_Hamburg_33

Lehrende_HAW_Hamburg_18

Studierende_HAW_Hamburg_20

Informationen für:

Publikationen von Professorinnen und Professoren der HAW Hamburg

Jahr:  
Alle : 1984, ... , 2017, 2018, 2019, 2020
Autor:  
Alle : A, À, B, C, D, E, F, G, H, I, J, K, L, M, N, O, Ö, P, Q, R, S, T, U, V, W, Y, Z 
Präferenzen: 
Referenzen pro Seite: Zeige Schlüsselwörter Zeige Zusammenfassung
Referenzen

Buchbeiträge:

default
Barbara König, Dennis Nolte, Julia Padberg und Arend Rensink
A Tutorial on Graph Transformation
Reiko Heckel; Gabriele Taentzer (Hrsg.) Graph Transformation, Specifications, and Nets - In Memory of Hartmut Ehrig
Seite 83-104.
Verlag: Springer,
2018

Marker: TI-I

Tagungs-/Konferenz-/Katalogbeiträge:

default
Birgit Koeppen, Anna Kerstin Usbeck, Mamadou Lamine Ndiaye und Amadou Ndiaye
Investigation of Balancing Power Demand in the Roll-out Scenario of Solar Energy in Senegal
Solar Integration Workshop 2018
Stockholm
16.-17. Oktober 2018
Energynautics (Hrsg.) Proceedings of the 8th Solar Integration Workshop – International Workshop on Integration of Solar Power into Power Systems

Marker: TI-MP

default
Matthias Nitsche und Marina Tropmann-Frick
Context and Embeddings in Language Modelling - an Exploration
Selected Papers of the {XX} International Conference on Data Analytics and Management in Data Intensive Domains {(DAMDID/RCDL} 2018), Moscow, Russia, October 9-12, 2018

Marker: TI - I

default
Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt und Matthias Wählisch
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem
Internet Measurement Conference - IMC
Boston, MA
Proc. of ACM Internet Measurement Conference (IMC 2018) , Seite 343--349.
Association of the Computing Machinery
Verlag: ACM Digital Library, New York, NY, USA

Marker: TI-I

Zusammenfassung: In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the implications of exposing certificate DNS names from the perspective of security and privacy. We find that certificates in CT logs have seen exponential growth. Website support for CT has also constantly increased, with now a majority of established connections supporting CT. With the increasing deployment of CT, there are also concerns of information leakage due to all certificates being visible in CT logs. To understand this threat, we introduce a CT honeypot and show that data from CT logs is being used to identify targets for scanning campaigns only minutes after certificate issuance. We present and evaluate a methodology to learn and validate new subdomains from the vast number of domains extracted from CT logged certificates.

default
Nico Hinze, Marcin Nawrocki, Mattijs Jonker, Alberto Dainotti, Thomas C. Schmidt und Matthias Wählisch
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP
SIGCOMM
Budapest
Proc. of ACM SIGCOMM. Poster Session , Seite 57--59.
Association of the Computing Machinery
Verlag: ACM Digital Library, New York, NY, USA

Marker: TI-I

Zusammenfassung: In this poster, we analyze Denial of Service attacks from two vantage points, a national Internet Service Provider and a large regional Internet Exchange Point. Our results reveal that common mitigation techniques (i.e., blackholing) can be outperformed by more fine grained filtering (i.e., BGP Flowspec) without increasing complexity.

default
Ayla Nawaz, Sven Pfeiffer, Gerwald Lichtenberg und Philipp Rostalski
Anomaly Detection for the European XFEL using a Nonlinear Parity Space Method
10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes
SAFEPROCESS 2018

Marker: LS-MT

pdf
Ayla Nawaz, Sven Pfeiffer, Gerwald Lichtenberg und Philipp Rostalski
Anomaly Detection for Cavity Signals - Results from the European XFEL
Vancouver
9th International Particle Accelerator Conference

Marker: LS-MT

Total:
138
Export als:
BibTeX, XML

Letzte Änderung: 23.01.15

An die Redaktion