Martin Henze
Orcid: 0000-0001-8717-2523Affiliations:
- Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE, Germany
- RWTH Aachen University, Germany (former)
According to our database1,
Martin Henze
authored at least 107 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on linkedin.com
-
on twitter.com
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure.
CoRR, 2024
Secure Integration of 5G in Industrial Networks: State of the Art, Challenges and Opportunities.
CoRR, 2024
Enhancing SCADA Security: Developing a Host-Based Intrusion Detection System to Safeguard Against Cyberattacks.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets.
Proceedings of the 17th Cyber Security Experimentation and Test Workshop, 2024
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
Dataset, October, 2023
IACR Cryptol. ePrint Arch., 2023
An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids.
CoRR, 2023
CoRR, 2023
Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities.
CoRR, 2023
Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead.
CoRR, 2023
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking.
Proceedings of the Advanced Information Systems Engineering, 2023
2022
IEEE Trans. Cloud Comput., 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
A False Sense of Security?: Revisiting the State of Machine Learning-Based Industrial Intrusion Detection.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022
Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Ind. Informatics, 2021
ERCIM News, 2021
Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use.
CoRR, 2021
An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment.
CoRR, 2021
Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids.
CoRR, 2021
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2021
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems.
Proceedings of the SAT-CPS@CODASPY 2021, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures.
CoRR, 2020
Proceedings of the 2020 IFIP Networking Conference, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
2018
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Pervasive Mob. Comput., 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 13th Annual Conference on Wireless On-demand Network Systems and Services, 2017
Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
Future Gener. Comput. Syst., 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
2014
Proceedings of the IEEE Symposium on Computers and Communications, 2014
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014
Proceedings of the Trusted Cloud Computing, 2014
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators.
Proceedings of the Trusted Cloud Computing, 2014
2013
Int. J. Grid High Perform. Comput., 2013
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators.
CoRR, 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012