Mathias Fischer

Orcid: 0000-0002-6254-8288

Affiliations:
  • University Hamburg, Department of Informatics, Germany
  • TU Darmstadt, CASED, Germany
  • TU Ilmenau, Germany


According to our database1, Mathias Fischer authored at least 94 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SoK: Towards Security and Safety of Edge AI.
CoRR, 2024

Detecting Web Bots via Keystroke Dynamics.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

Data Poisoning Detection in Federated Learning.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Encrypted Endpoints: Defending Online Services from Illegitimate Bot Automation.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Towards Synthesizing Datasets for IEEE 802.1 Time-sensitive Networking.
CoRR, 2023

SEBDA: A Secure and Efficient Blockchain Based Data Aggregation Scheme.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Detecting Web Bots via Mouse Dynamics and Communication Metadata.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Measuring the Edge: A Performance Evaluation of Edge Offloading.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking.
Proceedings of the IFIP Networking Conference, 2023

TSN Gatekeeper: Enforcing stream reservations via P4-based in-network filtering.
Proceedings of the IFIP Networking Conference, 2023

Towards Developing Resilient and Service-oriented Mission-critical Systems.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Moving Target Defense for Service-Oriented Mission-Critical Networks.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Tell Me More: Black Box Explainability for APT Detection on System Provenance Graphs.
Proceedings of the IEEE International Conference on Communications, 2023

Low-Latency TLS 1.3-Aware Hole Punching.
Proceedings of the IEEE International Conference on Communications, 2023

Preemptive DoS attacks on Time Sensitive Networks.
Proceedings of the IEEE Global Communications Conference, 2023

Latency-Aware Scheduling for Real-Time Application Support in Edge Computing.
Proceedings of the 6th International Workshop on Edge Systems, Analytics and Networking, 2023

Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Introduction to the Special Section on Recent Advances in Networks and Distributed Systems.
ACM Trans. Internet Techn., November, 2022

Preface and Table of Contents.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Smart Urban Data Space for Citizen Science.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

On the Resilience of Opportunistic Networks against DoS Attacks.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Towards SDN-based Dynamic Path Reconfiguration for Time Sensitive Networking.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Privacy-Preserving Convolutional Neural Networks Using Homomorphic Encryption.
Proceedings of the International Workshop on Biometrics and Forensics, 2022

Deep Learning-based Multi-PLC Anomaly Detection in Industrial Control Systems.
Proceedings of the IEEE Global Communications Conference, 2022

Distributed Bio-inspired Configuration of Virtualized Mission-critical Networks.
Proceedings of the IEEE Global Communications Conference, 2022

Reinforcement Learning assisted Routing for Time Sensitive Networks.
Proceedings of the IEEE Global Communications Conference, 2022

Polymorphic Protocols at the Example of Mitigating Web Bots.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Service-Based Resilience via Shared Protection in Mission-Critical Embedded Networks.
IEEE Trans. Netw. Serv. Manag., 2021

Malware Sight-Seeing: Accelerating Reverse-Engineering via Point-of-Interest-Beacons.
CoRR, 2021

SDN-based Self-Configuration for Time-Sensitive IoT Networks.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

On the Reliability of IEEE 802.1CB FRER.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

On the Security of IEEE 802.1 Time-Sensitive Networking.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Implementation and Orchestration of IEEE 802.1CB FRER in OMNeT++.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Analysing Leakage during VPN Establishment in Public Wi-Fi Networks.
Proceedings of the ICC 2021, 2021

Multi-Stage Attack Detection via Kill Chain State Machines.
Proceedings of the CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, 2021

Mitigation of IPv6 Router Spoofing Attacks with P4.
Proceedings of the ANCS '21: Symposium on Architectures for Networking and Communications Systems, Layfette, IN, USA, December 13, 2021

Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Enhanced Performance and Privacy for TLS over TCP Fast Open.
Proc. Priv. Enhancing Technol., 2020

Towards Flexible Security Testing of OT Devices.
CoRR, 2020

Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Scan Correlation - Revealing distributed scan campaigns.
Proceedings of the NOMS 2020, 2020

Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

SDN/NFV-based DDoS Mitigation via Pushback.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Service-Based Resilience for Embedded IoT Networks.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Towards Data-Driven Characterization of Brute-Force Attackers.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Enhanced performance for the encrypted web through TLS resumption across hostnames.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
A QUIC Look at Web Tracking.
Proc. Priv. Enhancing Technol., 2019

QUICker Connection Establishment with Out-Of-Band Validation Tokens.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

SANE: Smart Networks for Urban Citizen Participation.
Proceedings of the 26th International Conference on Telecommunications, 2019

Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Path-Based Optimization of NFV-Resource Allocation in SDN Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Towards Efficient Reconstruction of Attacker Lateral Movement.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Efficient Identification of Applications in Co-resident VMs via a Memory Side-Channel.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

A memory-deduplication side-channel attack to detect applications in co-resident virtual machines.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

GAC: graph-based alert correlation for the detection of distributed multi-step attacks.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Tracking Users across the Web via TLS Session Resumption.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Guest Editorial Emerging Technologies in Software- Driven Communication.
IEEE J. Sel. Areas Commun., 2017

A Classification of Locality in Network Research.
ACM Comput. Surv., 2017

SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
AnonPubSub: Anonymous publish-subscribe overlays.
Comput. Commun., 2016

Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

On the resilience of P2P-based botnet graphs.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Consumer Privacy on Distributed Energy Markets.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016

2015
Taxonomy and Survey of Collaborative Intrusion Detection.
ACM Comput. Surv., 2015

Community-Based Collaborative Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2015

RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streaming.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Internal attacks in anonymous publish-subscribe P2P overlays.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

SkipMon: A locality-aware Collaborative Intrusion Detection System.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Hide and seek: Detecting sensors in P2P botnets.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Resilient and underlay-aware P2P live-streaming.
Comput. Networks, 2014

On the Resilience of Pull-Based P2P Streaming Systems against DoS Attacks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014

HosTaGe: a Mobile Honeypot for Collaborative Defense.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

On advanced monitoring in resilient and unstructured P2P botnets.
Proceedings of the IEEE International Conference on Communications, 2014

Twitterize: Anonymous Micro-blogging.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

2013
OSSim: a generic simulation framework for overlay streaming.
Proceedings of the 2013 Summer Simulation Multiconference, 2013

Distributed and Anonymous Publish-Subscribe.
Proceedings of the Network and System Security - 7th International Conference, 2013

This network is infected: HosTaGe - a low-interaction honeypot for mobile devices.
Proceedings of the SPSM'13, 2013

2012
Construction of attack-resilient and efficient overlay topologies for large-scale P2P-based IPTV infrastructures.
PhD thesis, 2012

2011
On Complexity and Approximability of Optimal DoS Attacks on Multiple-Tree P2P Streaming Topologies.
IEEE Trans. Dependable Secur. Comput., 2011

On virtualization-based network support for peer-assisted live-streaming applications.
Proceedings of the International Conference on the Network of the Future, 2011

Underlay-robust application layer multicast.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Attack-resilient and multiple-tree-based P2P-IPTV distribution.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

On the Dependencies between Source Neighbors in Optimally DoS-stable P2P Streaming Topologies.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Mobility-aware peer-to-peer live-streaming.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010

2009
Methods for Improving Resilience in Communication Networks and P2P Overlays.
Prax. Inf.verarb. Kommun., 2009

Towards the Design of Unexploitable Construction Mechanisms for Multiple-Tree Based P2P Streaming Systems.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

2008
A Key Management Solution for Overlay-Live-Streaming.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

A Distributed IP Mobility Approach for 3G SAE.
Proceedings of the IEEE 19th International Symposium on Personal, 2008


  Loading...