Campusleben_HAW_Hamburg_45

Lehrende_HAW_Hamburg_4

Studierende_HAW_Hamburg_24

Informationen für:

Publikationen von Professorinnen und Professoren der HAW Hamburg

Jahr:  
Alle : 1986, ... , 2017, 2018, 2019, 2020
Autor:  
Alle : A, À, B, C, D, E, F, G, H, I, J, K, L, M, N, O, Ö, P, Q, R, S, T, U, V, W, Y, Z 
Alle : Zabrocki, ... , Zettler, Zhang, Zhao, ... , Zöllner 
Präferenzen: 
Referenzen pro Seite: Zeige Schlüsselwörter Zeige Zusammenfassung
Referenzen

Zeitschriftenbeiträge:

default
Joachim Westenhoefer, Robert von Katzler, Hans-Joachim Jensen, Birgit-Christiane Zyriax, Bettina Jagemann, Volker Hardt und Marcus Oldenburg
Cultural differences in food and shape related attitudes and eating behavior are associated with differences of Body Mass Index in the same food environment: cross-sectional results from the Seafarer Nutrition Study of Kiribati and European seafarers on merchant ships
BMC Obesity, 5:1
24 Januar 2018

Schlüsselwörter: Obesity, Pacific islanders, Body shape, Eating behavior, Disinhibition, Seafarer

Marker: LS-GW

default
Birgit-Christiane Zyriax, Robert von Katzler, Bettina Jagemann, Joachim Westenhoefer, Hans-Joachim Jensen, Volker Harth und Marcus Oldenburg
Food offerings on board and dietary intake of European and Kiribati seafarers - Cross-sectional data from the Seafarer Nutrition Study
Journal of Occupational Medicine and Toxicology, 13:9
2018

Marker: LS-GW

default
Thomas Grätsch, Frank Ihlenburg und Marc Zarnekow
Vibroakustisches Simulationsmodell zur Reduzierung von Tonalitäten
Ingenieurspiegel, (4)
2018

Marker: TI-MP

Tagungs-/Konferenz-/Katalogbeiträge:

default
Andrej Zieger, Felix Freiling und Klaus-Peter Kossakowski
The ?-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
International Conference on IT Security Incident Management & IT Forensics (IMF)
Hamburg
7-9. Mai 2018
Harald Baier Holger Morgenstern (Hrsg.) Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics (IMF2018) Band 11th / 2018 , Seite 115-133.
Verlag: IEEE,
English

Schlüsselwörter: Threat Intelligence; Vulnerability Management; Risk Metrics; Cyber Security

Marker: TI-I

Zusammenfassung: To manage cyber security risks in practice, a simple yet effective method to assess such risks for individual systems is needed. With time-to-compromise (TTC), McQueen et al. (2005) introduced such a metric that measures the expected time that a system remains uncompromised given a specific threat landscape. TTC combines simplicity with expressiveness and therefore has evolved into one of the most successful cybersecurity metrics in practice. We revisit TTC and identify several mathematical and methodological shortcomings which we address by embedding all aspects of the metric into the continuous domain and the possibility to incorporate information about vulnerability characteristics and other cyber threat intelligence into the model. We propose ?-TTC, a formal extension of TTC which includes information from CVSS vectors as well as a continuous attacker skill based on a ?-distribution. We show that our new metric remains simple enough for practical use and gives more realistic predictions than the original TTC by using data from a modern and productively used vulnerability database of a national CERT.

default
Andrej Zieger, Felix Freiling und Klaus-Peter Kossakowski
The beta-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
International Conference on IT Security Incident Management & IT Forensics (IMF)
Hamburg
7-9. Mai 2018
Harald Baier Holger Morgenstern (Hrsg.) Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics (IMF2018) Band 11th / 2018 , Seite 115-133.
Verlag: IEEE,
English

Schlüsselwörter: Threat Intelligence; Vulnerability Management; Risk Metrics; Cyber Security

Marker: TI-I

Zusammenfassung: To manage cyber security risks in practice, a simple yet effective method to assess such risks for individual systems is needed. With time-to-compromise (TTC), McQueen et al. (2005) introduced such a metric that measures the expected time that a system remains uncompromised given a specific threat landscape. TTC combines simplicity with expressiveness and therefore has evolved into one of the most successful cyber security metrics in practice. We revisit TTC and identify several mathematical and methodological shortcomings which we address by embedding all aspects of the metric into the continuous domain and the possibility to incorporate information about vulnerability characteristics and other cyber threat intelligence into the model. We propose beta-TTC, a formal extension of TTC which includes information from CVSS vectors as well as a continuous attacker skill based on a beta-distribution. We show that our new metric remains simple enough for practical use and gives more realistic predictions than the original TTC by using data from a modern and productively used vulnerability database of a national CERT.

default
Marc Zarnekow, Thomas Grätsch und Frank Ihlenburg
A hybrid numerical-analytical approach to the dynamic analysis of helical gear excitations due to varying mesh stiffness
CST2018: The Thirteenth International Conference on Computational Structures Technology
Sitges, Spanien

Marker: TI-MP

default
Thomas Grätsch, Frank Ihlenburg und Marc Zarnekow
Simulation of Gear-excited Vibrations in Wind Turbine Drivetrains with a Hybrid Numerical-Analytical Approach
WCCM2018: 13th World Congress on Computational Mechanics
New York, USA

Marker: TI-MP

default
Thomas Grätsch, Frank Ihlenburg und Marc Zarnekow
Vibroacoustic FEA for the Tonality Correction of Wind Turbines
Akustik-Seminar
HAW Hamburg

Marker: TI-MP

Total:
93
Export als:
BibTeX, XML

Letzte Änderung: 23.01.15

An die Redaktion