Nils Ole Tippenhauer
Nils Ole Tippenhauer
Faculty, CISPA Helmholtz Center for Information Security
Geverifieerd e-mailadres voor cispa.saarland - Homepage
Geciteerd door
Geciteerd door
On the requirements for successful GPS spoofing attacks
NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun
Proceedings of the ACM conference on Computer and communications security …, 2011
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis
Y Meidan, M Bohadana, A Shabtai, JD Guarnizo, M Ochoa, ...
Proceedings of the Symposium on Applied Computing (SAC), 506-509, 2017
Limiting the Impact of Stealthy Attacks on Industrial Control Systems
DI Urbina, J Giraldo, AA Cardenas, NO Tippenhauer, J Valente, M Faisal, ...
Conference on Computer and Communications Security (CCS), 2016
SWaT: a water treatment testbed for research and training on ICS security
AP Mathur, NO Tippenhauer
Workshop on Cyber-physical Systems for Smart Water Networks (CySWater), 31-36, 2016
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
J Giraldo, D Urbina, A Cardenas, J Valente, M Faisal, J Ruths, ...
ACM Computing Surveys (CSUR), 2018
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
Attacks on public WLAN-based positioning systems
NO Tippenhauer, KB Rasmussen, C Pöpper, S Čapkun
Proceedings of the conference on Mobile systems, applications, and services …, 2009
Characterizing cyber-physical attacks on water distribution systems
R Taormina, S Galelli, NO Tippenhauer, E Salomons, A Ostfeld
Journal of Water Resources Planning and Management 143 (5), 04017009, 2017
Battle of the attack detection algorithms: Disclosing cyber attacks on water distribution networks
R Taormina, S Galelli, NO Tippenhauer, E Salomons, A Ostfeld, ...
Journal of Water Resources Planning and Management 144 (8), 04018048, 2018
Low-Complexity Visible Light Networking with LED-to-LED Communication
D Giustiniano, NO Tippenhauer, S Mangold
IFIP Wireless Days, 2012
Siphon: Towards scalable high-interaction physical honeypots
JD Guarnizo, A Tambe, SS Bhunia, M Ochoa, NO Tippenhauer, A Shabtai, ...
Proceedings of the ACM Workshop on Cyber-Physical System Security (CPSS), 57-68, 2017
ID-based secure distance bounding and localization
NO Tippenhauer, S Capkun
European Symposium on Research in Computer Security (ESORICS), 621-636, 2009
MiniCPS: A toolkit for security research on CPS Networks
D Antonioli, NO Tippenhauer
Proceedings of the ACM Workshop on Cyber-Physical Systems-Security and/or …, 2015
Investigation of signal and message manipulations on the wireless channel
C Pöpper, NO Tippenhauer, B Danev, S Capkun
European Symposium on Research in Computer Security (ESORICS), 40-59, 2011
On Limitations of Friendly Jamming for Confidentiality
NO Tippenhauer, L Malisa, A Ranganathan, S Capkun
IEEE Symposium on Security & Privacy, 2013
On ladder logic bombs in industrial control systems
N Govil, A Agrawal, NO Tippenhauer
Proceedings of the Workshop on the Security of Industrial Control Systems …, 2017
On attacker models and profiles for cyber-physical systems
M Rocchetto, NO Tippenhauer
European Symposium on Research in Computer Security (ESORICS), 427-449, 2016
Iotscanner: Detecting privacy threats in IoT neighborhoods
S Siby, RR Maiti, NO Tippenhauer
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and …, 2017
BIAS: bluetooth impersonation attacks
D Antonioli, NO Tippenhauer, K Rasmussen
2020 IEEE symposium on security and privacy (SP), 549-562, 2020
Advanced Security Testbed Framework for Wearable IoT Devices
S Siboni, A Shabtai, NO Tippenhauer, J Lee, Y Elovici
Transactions on Internet Technology, 2016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20