Hans-Joachim Hof
Orcid: 0000-0002-6930-9271Affiliations:
- Technical University of Ingolstadt, Germany
According to our database1,
Hans-Joachim Hof
authored at least 39 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
1
2
1
10
1
1
1
1
3
1
1
1
1
2
2
1
1
3
4
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on thi.de
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management Systems.
Proceedings of the 2024 on Cyber Security in CarS Workshop, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
An Analysis of Security Concerns in Transitioning Battery Management Systems from First to Second Life.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Comput. Secur., June, 2023
2022
Proceedings of the Mensch und Computer 2022 - Workshopband, Darmstadt, Germany, September 4, 2022
2021
Presentation of the Programme of the 6th GI/ACM Standardization Workshop on Industrial Automation and Control Systems.
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021
2020
The 5th GI/ACM Workshop 2020 Scope and Draft Programme on Standardization of Secure and Safe Smart Manufacturing Systems with respect to IEC 62443 IACS.
Proceedings of the 50. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2020 - Back to the Future, Karlsruhe, Germany, 28. September, 2020
2019
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft, INFORMATIK 2019, 2019
2016
Beyond the Dolev-Yao Model: Realistic Application-Specific Attacker Models for Applications Using Vehicular Communication.
CoRR, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 2016 Wireless Days, 2016
2015
CoRR, 2015
The All-Seeing Eye: A Massive-Multi-Sensor Zero-Configuration Intrusion Detection System for Web Applications.
CoRR, 2015
Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption.
CoRR, 2015
ASIA: An Access Control, Session Invocation and Authorization Architecture for Home Energy Appliances in Smart Energy Grid Environments.
CoRR, 2015
Secure Communication Using Electronic Identity Cards for Voice over IP Communication, Home Energy Management, and eMobility.
CoRR, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2015
2014
Datenschutz und Datensicherheit, 2014
2010
Security Design for Industrial Sensor Networks (Sicherheit für industrielle Sensornetze).
it Inf. Technol., 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
2009
Int. J. Pervasive Comput. Commun., 2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
2008
2007
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2007
A Generic, Self-organizing, and Distributed Bootstrap Service for Peer-to-Peer Networks.
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007
Proceedings of the Algorithms for Sensor and Ad Hoc Networks, 2007
2005
Comput. Commun., 2005
2004
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004
Proceedings of the Wireless Sensor Networks, First European Workshop, 2004
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004