Jan von der Assen

Orcid: 0000-0002-0591-8887

According to our database1, Jan von der Assen authored at least 27 papers between 2021 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT.
IEEE Trans. Inf. Forensics Secur., 2024

FedEP: Tailoring Attention to Heterogeneous Data Distribution with Entropy Pooling for Decentralized Federated Learning.
CoRR, 2024

Leveraging MTD to Mitigate Poisoning Attacks in Decentralized FL with Non-IID Data.
CoRR, 2024

PACCOR4ESP: Embedded Device Security Attestation using Platform Attribute Certificates.
CoRR, 2024

Asset-driven Threat Modeling for AI-based Systems.
CoRR, 2024

QuantTM: Business-Centric Threat Quantification for Risk Management and Cyber Resilience.
CoRR, 2024

GuardFS: a File System for Integrated Detection and Mitigation of Linux-based Ransomware.
CoRR, 2024

RCVaR: An economic approach to estimate cyberattacks costs using data from industry reports.
Comput. Secur., 2024

DART: A Solution for decentralized federated learning model robustness analysis.
Array, 2024

SecBox: a Lightweight Data Mining Platform for Dynamic and Reproducible Malware Analysis.
Proceedings of the 11th IEEE Swiss Conference on Data Science, 2024

Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Asset-Centric Threat Modeling for AI-Based Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

The Danger Within: Insider Threat Modeling Using Business Process Models.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
Behavioral fingerprinting to detect ransomware in resource-constrained devices.
Comput. Secur., December, 2023

CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation.
CoRR, 2023

MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation.
CoRR, 2023

Early Detection of Cryptojacker Malicious Behaviors on IoT Crowdsensing Devices.
Proceedings of the NOMS 2023, 2023

SecBox: A Lightweight Container-based Sandbox for Dynamic Malware Analysis.
Proceedings of the NOMS 2023, 2023

A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices.
Proceedings of the IEEE International Conference on Communications, 2023

RansomAI: AI-Powered Ransomware for Stealthy Encryption.
Proceedings of the IEEE Global Communications Conference, 2023

Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
MalwSpecSys: A Dataset Containing Syscalls of an IoT Spectrum Sensor Affected by Heterogeneous Malware.
Dataset, May, 2022

An Overview and Ontology of Privacy to Preserve Privacy in Ultra-Wideband Networks.
Proceedings of the IEEE Smartworld, 2022

ProvotuMN: Decentralized, Mix-Net-based, and Receipt-free Voting System.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

CoReTM: An Approach Enabling Cross-Functional Collaborative Threat Modeling.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Poster: DDoSGrid: a Platform for the Post-mortem Analysis and Visualization of DDoS Attacks.
Proceedings of the IFIP Networking Conference, 2021

SecGrid: a Visual System for the Analysis and ML-based Classification of Cyberattack Traffic.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021


  Loading...