public_v6:publications:start
Unterschiede
Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
| Nächste Überarbeitung | Vorhergehende Überarbeitung | ||
| public_v6:publications:start [2020/03/10 05:21] – angelegt admin | public_v6:publications:start [2025/12/14 17:34] (aktuell) – [2023] admin | ||
|---|---|---|---|
| Zeile 1: | Zeile 1: | ||
| + | ==== 2025 ==== | ||
| + | **Real-time air quality measurement with Open Data - an interactive particulate matter meter for cyclists**\\ | ||
| + | //Sarah Wauschkuhn, Thomas Scheffler// | ||
| + | 22. GI/ITG KuVS Fachgespräch Sensornetze, | ||
| + | [[https:// | ||
| + | |||
| + | **Script-Based Approach to P4 Data Plane Programming**\\ | ||
| + | //Pascal Bast, Thomas Scheffler// | ||
| + | 4th KuVS Fachgespräch on " | ||
| + | [[https:// | ||
| + | |||
| + | |||
| + | ==== 2023 ==== | ||
| + | |||
| + | **Using P4-INT on Tofino for Measuring Device Performance Characteristics in a Network Lab**\\ | ||
| + | //Sadok Mehdi Mazigh, Marcel Beausencourt, | ||
| + | KuVS Fachgespräch - Würzburg Workshop on Modeling, Analysis and Simulation of Next-Generation Communication Networks 2023 (WueWoWAS’23), | ||
| + | [[https:// | ||
| + | |||
| + | ---- | ||
| + | |||
| + | ==== 2022 ==== | ||
| + | |||
| + | **Proceedings des 19. GI/ITG KuVS Fachgespräch Sensornetze**\\ | ||
| + | //Thomas Scheffler, Christoph Lange (Hrsg.)//\\ | ||
| + | 19. GI/ITG KuVS Fachgespräch Sensornetze, | ||
| + | [[https:// | ||
| + | |||
| + | ---- | ||
| + | |||
| + | ==== 2019 ==== | ||
| + | |||
| + | **Evaluation of Intrusion Detection Systems in IPv6 Networks**\\ | ||
| + | //Max Schrötter, Thomas Scheffler, Bettina Schnor//\\ | ||
| + | International Conference on Security and Cryptography (SECRYPT 2019) Prague, Czech Republic, 2019\\ | ||
| + | [[https:// | ||
| + | |||
| + | **Securing IPv6 Neighbor Discovery and SLAAC in Access Networks Through SDN**\\ | ||
| + | //Daniel Nelle, Thomas Scheffler// | ||
| + | ACM/IRTF Applied Networking Research Workshop 2019 (ANRW' | ||
| + | [[http:// | ||
| + | |||
| + | ---- | ||
| ==== 2018 ==== | ==== 2018 ==== | ||
| **Ontology-driven Device Descriptions for IoT Network Management**\\ | **Ontology-driven Device Descriptions for IoT Network Management**\\ | ||
| - | //Kristina Sahlmann, Thomas Scheffler, Bettina Schnor\\ | + | //Kristina Sahlmann, Thomas Scheffler, Bettina Schnor//\\ |
| - | //3rd Workshop on Interoperability and Open-Source Solutions for the Internet of Things (InterOSS-IoT), | + | 3rd Workshop on Interoperability and Open-Source Solutions for the Internet of Things (InterOSS-IoT), |
| 2018 Global Internet of Things Summit (GIoTS), Bilbao, Spain, June 2018.\\ | 2018 Global Internet of Things Summit (GIoTS), Bilbao, Spain, June 2018.\\ | ||
| [[https:// | [[https:// | ||
| Zeile 71: | Zeile 114: | ||
| //Sven Schindler, Oliver Eggert, Bettina Schnor, and Thomas Scheffler// | //Sven Schindler, Oliver Eggert, Bettina Schnor, and Thomas Scheffler// | ||
| International Conference on Security and Cryptography (SECRYPT 2014), Vienna, Austria, 2014.\\ | International Conference on Security and Cryptography (SECRYPT 2014), Vienna, Austria, 2014.\\ | ||
| - | [[https://prof.beuth-hochschule.de/? | + | {{ :public_v6: |
| **IPv6 Network Attack Detection with HoneydV6\\ | **IPv6 Network Attack Detection with HoneydV6\\ | ||
| Zeile 84: | Zeile 127: | ||
| //Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler and Eldad Zack//\\ | //Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler and Eldad Zack//\\ | ||
| Proceedings of the International Conference on Security and Cryptography (SECRYPT 2013), Reykjavik, Iceland, 2013.\\ | Proceedings of the International Conference on Security and Cryptography (SECRYPT 2013), Reykjavik, Iceland, 2013.\\ | ||
| - | [[https://prof.beuth-hochschule.de/? | + | {{ :public_v6: |
| **Secure access and management of Smart Objects with SNMPv3**\\ | **Secure access and management of Smart Objects with SNMPv3**\\ | ||
| Sven Zehl and Thomas Scheffler\\ | Sven Zehl and Thomas Scheffler\\ | ||
| Proceedings of the Third IEEE International Conference on Consumer Electronics - Berlin (ICCE-Berlin), | Proceedings of the Third IEEE International Conference on Consumer Electronics - Berlin (ICCE-Berlin), | ||
| - | [[https:// | + | {{ :public_v6:publications: |
| **Using AOP-based Enforcement of Prioritized XACML Policies for Location Privacy**\\ | **Using AOP-based Enforcement of Prioritized XACML Policies for Location Privacy**\\ | ||
| Zeile 99: | Zeile 142: | ||
| Sven Zehl, Frank Schwarze, and Thomas Scheffler\\ | Sven Zehl, Frank Schwarze, and Thomas Scheffler\\ | ||
| Tagungsband: | Tagungsband: | ||
| - | [[http:// | + | [[https:// |
| ---- | ---- | ||
| Zeile 107: | Zeile 150: | ||
| //Martin Schütte, Thomas Scheffler, and Bettina Schnor//\\ | //Martin Schütte, Thomas Scheffler, and Bettina Schnor//\\ | ||
| Proceedings of the International Conference on Security and Cryptography (SECRYPT 2012), Rome, Italy, 2012.\\ | Proceedings of the International Conference on Security and Cryptography (SECRYPT 2012), Rome, Italy, 2012.\\ | ||
| - | [[https://prof.beuth-hochschule.de/? | + | {{ :public_v6: |
| **Enforcing Location Privacy Policies through an AOP based Reference-Monitor**\\ | **Enforcing Location Privacy Policies through an AOP based Reference-Monitor**\\ | ||
| Zeile 119: | Zeile 162: | ||
| //Bernd Dörge, Thomas Scheffler// | //Bernd Dörge, Thomas Scheffler// | ||
| 2011 IEEE International Conference on Consumer Electronics - Berlin (ICCE-Berlin 2011), Berlin, 2011\\ | 2011 IEEE International Conference on Consumer Electronics - Berlin (ICCE-Berlin 2011), Berlin, 2011\\ | ||
| - | [[https://prof.beuth-hochschule.de/? | + | {{ :public_v6:publications: |
| **A Privacy-Aware Localization Service for Healthcare Environments**\\ | **A Privacy-Aware Localization Service for Healthcare Environments**\\ | ||
| //Thomas Scheffler, Sven Schindler, Marcus Lewerenz, Bettina Schnor//\\ | //Thomas Scheffler, Sven Schindler, Marcus Lewerenz, Bettina Schnor//\\ | ||
| 3rd Workshop on " | 3rd Workshop on " | ||
| - | [[https://prof.beuth-hochschule.de/? | + | {{ :public_v6:publications: |
| ---- | ---- | ||
| Zeile 139: | Zeile 182: | ||
| //Thomas Scheffler, Stefan Geiß and Bettina Schnor//\\ | //Thomas Scheffler, Stefan Geiß and Bettina Schnor//\\ | ||
| Proceedings of the 23rd International Information Security Conference (SEC 2008), Milano, 2008\\ | Proceedings of the 23rd International Information Security Conference (SEC 2008), Milano, 2008\\ | ||
| - | [[https://prof.beuth-hochschule.de/? | + | {{ :public_v6:publications: |
| **Specifying Security Policies for Electronic Health Records**\\ | **Specifying Security Policies for Electronic Health Records**\\ | ||
| //Felix Apitzsch, Stefan Liske, Thomas Scheffler and Bettina Schnor//\\ | //Felix Apitzsch, Stefan Liske, Thomas Scheffler and Bettina Schnor//\\ | ||
| Proceedings of HEALTHINF 2008, Funchal/ | Proceedings of HEALTHINF 2008, Funchal/ | ||
| - | [[https://prof.beuth-hochschule.de/? | + | {{ :public_v6: |
| ---- | ---- | ||
public_v6/publications/start.1583817706.txt.gz · Zuletzt geändert: von admin
