Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Dirk Scheuermann"'
Autor:
Simon Unger, Markus Heinrich, Dirk Scheuermann, Stefan Katzenbeisser, Max Schubert, Leon Hagemann, Lukas Iffländer
Publikováno v:
Vehicles, Vol 5, Iss 4, Pp 1254-1274 (2023)
The railway industry—traditionally a conservative industry with low adaption speed for innovation—is currently entering its digitization phase. The sector faces a challenge in integrating new technologies and approaches into the employed—often
Externí odkaz:
https://doaj.org/article/d133cc81f9184db18f90b816dd0f2031
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Connected smart cars enable new attacks that may have serious consequences. Thus, the development of new cars must follow a cybersecurity engineering process including a Threat Analysis and Risk Assessment (TARA). The attack surface assessment is a c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d5067a8c6a25dcc0947d57bed13ec9f7
https://publica.fraunhofer.de/handle/publica/428542
https://publica.fraunhofer.de/handle/publica/428542
Autor:
Rahamatullah Khondoker, Daniel Schneider, Thorsten Henkel, Daniel Zelle, Dirk Scheuermann, Sinisa Dukanovic, Jörg Dörr, Christoph Krauß, Sebastian Mauthofer, Mario Trapp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9769b401e21749f1a35353b4aa37d56e
https://publica.fraunhofer.de/handle/publica/248764
https://publica.fraunhofer.de/handle/publica/248764
Publikováno v:
Computer Communications and Networks ISBN: 9783319646527
Guide to Security in SDN and NFV
Guide to Security in SDN and NFV
Preceded by three industrial evolutions with the virtue of innovation in basic technologies such as mechanics (first evolution, beginning in the 1780s), electricity (second evolution, beginning from the 1870s), and electronics and computation (third
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1849330cf797412145bd8b75c3c20b47
https://doi.org/10.1007/978-3-319-64653-4_9
https://doi.org/10.1007/978-3-319-64653-4_9
Autor:
Ronald Marx, Alexander Oberle, Dirk Scheuermann, Fabien Thomas, Daniel Fages, Frank Gerd Weber, Pedro Larbig
Publikováno v:
AINA
Industrial espionage through complex cyber attacks such as Advanced Persistent Threats (APT) is an increasing risk in any business segment. Combining any available attack vector professional attackers infiltrate their targets progressively, e.g. thro
Publikováno v:
Advances in Swarm and Computational Intelligence ISBN: 9783319204710
ICSI (2)
ICSI (2)
The threat of cyber-attacks grows up, as one can see by several negative security news and reports [8]. Today there are many security components (e.g. anti-virus-system, firewall, and IDS) available to protect enterprise networks; unfortunately, they
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::061fe7bb6e33a8a4057357224825dace
https://doi.org/10.1007/978-3-319-20472-7_48
https://doi.org/10.1007/978-3-319-20472-7_48
Publikováno v:
VTC Fall
The effectiveness of Car2X communication strongly relies on trust in received data. Securing in-vehicle communication is an essential yet so far overlooked step to achieve this objective. We present an approach based on the use of symmetric key mater
Autor:
Dirk Scheuermann, Yves Roudier, Marko Wolf, Muhammad Sabir Idrees, Hendrik Schweppe, Olaf Henniger
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642197857
Nets4Cars/Nets4Trains
Nets4Cars/Nets4Trains
The software running on electronic devices is regularly updated, these days. A vehicle consists of many such devices, but is operated in a completely different manner than consumer devices. Update operations are safety critical in the automotive doma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e0b399d8a3fa224fe813318addc79e11
https://doi.org/10.1007/978-3-642-19786-4_20
https://doi.org/10.1007/978-3-642-19786-4_20
Publikováno v:
3PGCIC
In this paper, we describe how security and privacy can be increased in user-centric Identity Management (IdM) by the introduction of a so-called IdM card. This IdM card securely stores and processes identity data of the card owner, an end user. The
Publikováno v:
Computer Security – ESORICS 2007 ISBN: 9783540748342
ESORICS
ESORICS
The Trusted Platform Module TPM is a basic but nevertheless very complex security component that can provide the foundations and the root of security for a variety of applications. In contrast to the TPM, other basic security mechanisms like cryptogr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e3be09c0daa087b9fb475fc9cc59f11a
https://doi.org/10.1007/978-3-540-74835-9_29
https://doi.org/10.1007/978-3-540-74835-9_29