Martin Henze

Orcid: 0000-0001-8717-2523

Affiliations:
  • Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE, Germany
  • RWTH Aachen University, Germany (former)


According to our database1, Martin Henze authored at least 107 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure.
CoRR, 2024

Secure Integration of 5G in Industrial Networks: State of the Art, Challenges and Opportunities.
CoRR, 2024

Enhancing SCADA Security: Developing a Host-Based Intrusion Detection System to Safeguard Against Cyberattacks.
CoRR, 2024

POSTER: Towards Secure 5G Infrastructures for Production Systems.
CoRR, 2024

You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks.
Proceedings of the 33rd USENIX Security Symposium, 2024

Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets.
Proceedings of the 17th Cyber Security Experimentation and Test Workshop, 2024

Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Towards Secure 5G Infrastructures for Production Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

2023
Artifact: SoK: Evaluations in Industrial Intrusion Detection Research.
Dataset, October, 2023

[SoK] Evaluations in Industrial Intrusion Detection Research.
J. Syst. Res., 2023

When and How to Aggregate Message Authentication Codes on Lossy Channels?
IACR Cryptol. ePrint Arch., 2023

An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids.
CoRR, 2023

Investigation of Multi-stage Attack and Defense Simulation for Data Synthesis.
CoRR, 2023

Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities.
CoRR, 2023

Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead.
CoRR, 2023

Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2023

Comprehensively Analyzing the Impact of Cyberattacks on Power Grids.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023

METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking.
Proceedings of the Advanced Information Systems Engineering, 2023

2022




Complying With Data Handling Requirements in Cloud Storage Systems.
IEEE Trans. Cloud Comput., 2022

On specification-based cyber-attack detection in smart grids.
Energy Inform., 2022

BP-MAC: Fast Authentication for Short Messages.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

PowerDuck: A GOOSE Data Set of Cyberattacks in Substations.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Scalable and Privacy-Focused Company-Centric Supply Chain Management.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Can Industrial Intrusion Detection Be SIMPLE?
Proceedings of the Computer Security - ESORICS 2022, 2022

A False Sense of Security?: Revisiting the State of Machine Learning-Based Industrial Intrusion Detection.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively.
IEEE Trans. Netw. Serv. Manag., 2021

Challenges and Opportunities in Securing the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021

Cybersecurity in Power Grids: Challenges and Opportunities.
Sensors, 2021

Unlocking Secure Industrial Collaborations through Privacy-Preserving Computation.
ERCIM News, 2021

Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use.
CoRR, 2021

An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment.
CoRR, 2021

Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids.
CoRR, 2021

Path Loss in Urban LoRa Networks: A Large-Scale Measurement Study.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2021

Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking.
IACR Cryptol. ePrint Arch., 2020

Graph-based Model of Smart Grid Architectures.
CoRR, 2020

Assessing the Security of OPC UA Deployments.
CoRR, 2020

Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures.
CoRR, 2020

How to Securely Prune Bitcoin's Blockchain.
Proceedings of the 2020 IFIP Networking Conference, 2020

Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

Private Multi-Hop Accountability for Supply Chains.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Facilitating Protocol-independent Industrial Intrusion Detection Systems.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Cybersecurity Research and Training for Power Distribution Grids - A Blueprint.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Hi Doppelgänger : Towards Detecting Manipulation in News Comments.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019

Towards an Infrastructure Enabling the Internet of Production.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019

Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

2018
Accounting for Privacy in the Cloud Computing Landscape.
PhD thesis, 2018

Secure and anonymous decentralized Bitcoin mixing.
Future Gener. Comput. Syst., 2018

Secure Low Latency Communication for Constrained Industrial IoT Scenarios.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Thwarting Unwanted Blockchain Content Insertion.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2018

Towards In-Network Security for Smart Homes.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A survey on the evolution of privacy enforcement on smartphones and the road ahead.
Pervasive Mob. Comput., 2017

Analysis of Fingerprinting Techniques for Tor Hidden Services.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

TraceMixer: Privacy-preserving crowd-sensing sans trusted third party.
Proceedings of the 13th Annual Conference on Wireless On-demand Network Systems and Services, 2017

Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Practical Data Compliance for Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

Privacy-Preserving HMM Forward Computation.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
A comprehensive approach to privacy in the cloud-based Internet of Things.
Future Gener. Comput. Syst., 2016

The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud.
CoRR, 2016

CPPL: Compact Privacy Policy Language.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Website Fingerprinting at Internet Scale.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

Towards Transparent Information on Individual Cloud Service Usage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

POSTER: Fingerprinting Tor Hidden Services.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper).
Proceedings of the Data Privacy Management, and Security Assurance, 2015

CoinParty: Secure Multi-Party Mixing of Bitcoins.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Bandwidth-Optimized Secure Two-Party Computation of Minima.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

2014
POSTER: Privacy-preserving Indoor Localization.
CoRR, 2014

Piccett: Protocol-independent classification of corrupted error-tolerant traffic.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

SCSlib: Transparently Accessing Protected Sensor Data in the Cloud.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

Graph-based redundancy removal approach for multiple cross-layer interactions.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

A Trust Point-based Security Architecture for Sensor Data in the Cloud.
Proceedings of the Trusted Cloud Computing, 2014

SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators.
Proceedings of the Trusted Cloud Computing, 2014

2013
Maintaining User Control While Storing and Processing Sensor Data in the Cloud.
Int. J. Grid High Perform. Comput., 2013

SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators.
CoRR, 2013

6LoWPAN fragmentation attacks and mitigation mechanisms.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Slimfit - A HIP DEX compression layer for the IP-based Internet of Things.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

The Cloud Needs Cross-Layer Data Handling Annotations.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Towards Data Handling Requirements-Aware Cloud Computing.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
A Cloud design for user-controlled storage and processing of sensor data.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012


  Loading...