Silke Holtmanns
Orcid: 0000-0003-2616-6212Affiliations:
- Bell Labs, Nokia, Finland
- Nokia Research Center, Finland
- Ericsson Eurolab Deutschland GmbH, Herzogenrath, Germany
According to our database1,
Silke Holtmanns
authored at least 32 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024
2021
Security policies definition and enforcement utilizing policy control function framework in 5G.
Comput. Commun., 2021
2020
2019
A Framework for Privacy Quantification: Measuring the Impact of Privacy Techniques Through Mutual Information, Distance Mapping, and Machine Learning.
Cogn. Comput., 2019
2018
J. ICT Stand., 2018
Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space.
Cogn. Comput., 2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Proceedings of the Computer Safety, Reliability, and Security, 2018
2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the Machine Learning and Knowledge Extraction, 2017
Proceedings of the Machine Learning and Knowledge Extraction, 2017
2016
User location tracking attacks for LTE networks using the interworking functionality.
Proceedings of the 2016 IFIP Networking Conference, 2016
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks.
Proceedings of the Formal Methods and Software Engineering, 2016
Proceedings of the 8th International Conference on Cyber Conflict, 2016
Data Anonymization as a Vector Quantization Problem: Control Over Privacy for Health Data.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016
2015
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2007
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007
2006
2004
Privacy Rights Management for Mobile Phones.
Proceedings of the Wireless Information Systems, 2004
2003
2002
Private Mail Retrieval Search on Encrypted Data.
Proceedings of the Wireless Information Systems, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
2001