Artificial Intelligence for Cybersecurity
Professor
please contact me by email for an appointment
Cybersicherheit – Mehr als nur ein Kostenfaktor?!
In: Netzwerk.Wirtschaft Vilshofen
Pro Vilshofen Stadtmarketing e.V. Vilshofen
A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models
PRIVATE OPEN DATA?! - EAsyAnon TRUSTSERVICE. Posterpräsentation
In: Nationale Konferenz IT-Sicherheitsforschung 2023 - Die digital vernetzte Gesellschaft stärken
Bundesministerium für Bildung und Forschung Berlin
On the Improvement of the Isolation Forest Algorithm for Outlier Detection with Streaming Data
In: Electronics vol. 10 pg. 1534.
DOI: 10.3390/electronics10131534
Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data
In: Electronics vol. 10 pg. 2160.
DOI: 10.3390/electronics10172160
Unsupervised Feature Selection for Outlier Detection on Streaming Data to Enhance Network Security
In: Applied Sciences vol. 11 pg. 12073.
DOI: 10.3390/app112412073
A Resource-Preserving Self-Regulating Uncoupled MAC Algorithm to be Applied in Incident Detection
In: Computers & Security vol. 85 pg. 270-285.
DOI: 10.1016/j.cose.2019.05.010
On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks
pg. 72-83.
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
pg. 906-911.
DOI: 10.1109/PERCOMW.2019.8730749
Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks
pg. 21-26.
DecADe - Decentralized Anomaly Detection . Posterpräsentation
In: 5. Tag der Forschung
Technische Hochschule Deggendorf Deggendorf
Incident Reaction Based on Intrusion Detections’ Alert Analysis
pg. 1-6.
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF( 2m ) Based on Montgomery Arithmetic (Article ID 4983404)
In: Security and Communication Networks pg. 1-18.
DOI: 10.1155/2018/4983404
Comparison of Supervised, Semi-supervised and Unsupervised Learning Methods in Network Intrusion Detection Systems (NIDS) Application
In: Anwendungen und Konzepte in der Wirtschaftsinformatik (AKWI) pg. 10-19.
Experimental assessment of FIRO- and GARO-based noise sources for digital TRNG designs on FPGAs
pg. 1-6.
Assessment simulation model for uncoupled message authentication
Intrusion Detection Sensoren für industrielle Netzwerke
In: CYBICS - Cyber Security for Industrial Control Systems (Workshop & Konferenz für IT-Sicherheit in der Industrie)
Würzburg
Embedded Plug-In Devices to Secure Industrial Network Communications