Campusleben_HAW_Hamburg_47

Lehrende_HAW_Hamburg_4

Studierende_HAW_Hamburg_24

Informationen für:

Publikationen von Professorinnen und Professoren der HAW Hamburg

Jahr:  
Alle : 1975, ... , 2000, 2001, 2002, ... , 2020
Autor:  
Alle : A, À, B, C, D, E, F, G, H, I, J, K, L, M, N, O, Ö, P, Q, R, S, T, U, V, W, Y, Z 
Alle : K. Bock, ... , Kolesnikoff, Koletzko, Kolk, ... , Köster 
Präferenzen: 
Referenzen pro Seite: Zeige Schlüsselwörter Zeige Zusammenfassung
Referenzen

2018

Tagungs-/Konferenz-/Katalogbeiträge:

default
Thorsten Struckmann, Peter Kuhn, Simon Ressel und Claudia Weidlich
In situ state of charge and crossover estimation of vanadium redox flow batteries from electrolyte potentials and densities
Lausanne
10.-12.7.2018
The International Flow Battery Forum 2018

Marker: TI-MP

default
Kai Kruppa und Gerwald Lichtenberg
Feedback Linearization of Multilinear Time-Invariant Systems Using Tensor Decomposition Methods
8th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (Simultech)

Marker: LS-MT

default
Andreas Reuter, Randy Bush, Italo Cunha, Ethan Katz-Bassett, Thomas C. Schmidt und Matthias Wählisch
Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering
IETF
Montreal, CA
Proceedings of the Applied Networking Research Workshop aus ANRW '18 , Seite 7--7.
Verlag: ACM Digital Library, New York, NY, USA
ISBN: 978-1-4503-5585-8

Marker: TI-I

default
Finn Schöning und Dragan Kozulovic
The Heron Fan – Concept Description and Preliminary Aerothermo-dynamic Analysis
ASME Turbo Expo 2018
Oslo, Norway
11th-15th June 2018
Proceedings ASME Turbo Expo 2018

Marker: TI-FF

default
Peter Kietzmann, Cenk Gündogan, Thomas C. Schmidt und Matthias Wählisch
A PUF Seed Generator for RIOT: Introducing Crypto-Fundamentals to the Wild
ACM MobiSys
München
Proc. of 16th ACM International Conference on Mobile Systems, Applications (MobiSys), Poster Session
ACM
Verlag: ACM Digital Library, New York, NY, USA

Marker: TI-I

Zusammenfassung: In this work, we present a random seeder for the RIOT operating system based on PUFs. Following the RIOT dedication as a general-purpose IoT operating system, we design a generic PUF extractor based on SRAM memory which is available on most platforms. We design a module for RIOT that hooks into the OS startup code right before kernel initialization. The patterns of a preserved and uninitialized SRAM block are fed into a hash function to derive the desired seed value. To the best of our knowledge, this is the first recent embedded security primitive that has entered a commodity operating system.

default
Cenk Gündogan, Peter Kietzmann, Thomas C. Schmidt, Martine Lenders, Hauke Petersen, Matthias Wählisch, Michael Frey und Felix Shzu-Juraschek
Demo: Seamless Producer Mobility for the Industrial Information-Centric Internet
ACM MobiSys
München
Proc. of 16th ACM International Conference on Mobile Systems, Applications (MobiSys), Demo Session
ACM
Verlag: ACM Digital Library, New York, NY, USA

Marker: TI-I

pdf
Dragan Kozulovic, Christoph Bode und Jens Friedrichs
Aerothermodynamic Anaysis of Heat Recuperation by a Nozzle-Integrated Thermoelectric Generator in a Turbofan
Global Power and Propulsion Society Conference
Montreal, Canada
5th-7th May 2018
Proceedings Global Power and Propulsion Society Conference

Marker: TI-FF

default
Andrej Zieger, Felix Freiling und Klaus-Peter Kossakowski
The ?-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
International Conference on IT Security Incident Management & IT Forensics (IMF)
Hamburg
7-9. Mai 2018
Harald Baier Holger Morgenstern (Hrsg.) Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics (IMF2018) Band 11th / 2018 , Seite 115-133.
Verlag: IEEE,
English

Schlüsselwörter: Threat Intelligence; Vulnerability Management; Risk Metrics; Cyber Security

Marker: TI-I

Zusammenfassung: To manage cyber security risks in practice, a simple yet effective method to assess such risks for individual systems is needed. With time-to-compromise (TTC), McQueen et al. (2005) introduced such a metric that measures the expected time that a system remains uncompromised given a specific threat landscape. TTC combines simplicity with expressiveness and therefore has evolved into one of the most successful cybersecurity metrics in practice. We revisit TTC and identify several mathematical and methodological shortcomings which we address by embedding all aspects of the metric into the continuous domain and the possibility to incorporate information about vulnerability characteristics and other cyber threat intelligence into the model. We propose ?-TTC, a formal extension of TTC which includes information from CVSS vectors as well as a continuous attacker skill based on a ?-distribution. We show that our new metric remains simple enough for practical use and gives more realistic predictions than the original TTC by using data from a modern and productively used vulnerability database of a national CERT.

default
Andrej Zieger, Felix Freiling und Klaus-Peter Kossakowski
The beta-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
International Conference on IT Security Incident Management & IT Forensics (IMF)
Hamburg
7-9. Mai 2018
Harald Baier Holger Morgenstern (Hrsg.) Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics (IMF2018) Band 11th / 2018 , Seite 115-133.
Verlag: IEEE,
English

Schlüsselwörter: Threat Intelligence; Vulnerability Management; Risk Metrics; Cyber Security

Marker: TI-I

Zusammenfassung: To manage cyber security risks in practice, a simple yet effective method to assess such risks for individual systems is needed. With time-to-compromise (TTC), McQueen et al. (2005) introduced such a metric that measures the expected time that a system remains uncompromised given a specific threat landscape. TTC combines simplicity with expressiveness and therefore has evolved into one of the most successful cyber security metrics in practice. We revisit TTC and identify several mathematical and methodological shortcomings which we address by embedding all aspects of the metric into the continuous domain and the possibility to incorporate information about vulnerability characteristics and other cyber threat intelligence into the model. We propose beta-TTC, a formal extension of TTC which includes information from CVSS vectors as well as a continuous attacker skill based on a beta-distribution. We show that our new metric remains simple enough for practical use and gives more realistic predictions than the original TTC by using data from a modern and productively used vulnerability database of a national CERT.

default
Michael Köhler-Bußmeier, Rüdiger Weißbach und et al.
Joint Proceedings of the Workshops at Modellierung 2018 co-located with Modellierung 2018
Modellierung 2018

Marker: TI-I

Seite:  
Zurück | 1, ... , 3, 4, 5, 6, 7, ... , 116 | Weiter
Total:
1156
Export als:
BibTeX, XML

Letzte Änderung: 23.01.15

An die Redaktion