Stefan Rass
Orcid: 0000-0003-2821-2489
According to our database1,
Stefan Rass
authored at least 145 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
Tell me who you are friends with and I will tell you who you are: Unique neighborhoods in random graphs.
Theor. Comput. Sci., 2024
IEEE Access, 2024
IEEE Access, 2024
PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing.
Proceedings of the 33rd USENIX Security Symposium, 2024
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
RobotPerf: An Open-Source, Vendor-Agnostic, Benchmarking Suite for Evaluating Robotics Computing System Performance.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024
Proceedings of the Decision and Game Theory for Security - 15th International Conference, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
Softwaretechnik-Trends, November, 2023
Comput. Secur., September, 2023
RobotPerf: An Open-Source, Vendor-Agnostic, Benchmarking Suite for Evaluating Robotics Computing System Performance.
CoRR, 2023
CoRR, 2023
ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics.
CoRR, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the Advances in Mobile Computing and Multimedia Intelligence, 2023
2022
Games over Probability Distributions Revisited: New Equilibrium Models and Refinements.
Games, 2022
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022
CoRR, 2022
CoRR, 2022
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles.
IEEE Access, 2022
Tackling Denial of Service Attacks on Key Management in Software-Defined Quantum Key Distribution Networks.
IEEE Access, 2022
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Springer, ISBN: 978-3-031-06607-8, 2022
2021
J. Cybersecur. Priv., January, 2021
Found. Trends Robotics, 2021
Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problems.
Comput. Optim. Appl., 2021
Proceedings of the 18th International Conference on Information Systems for Crisis Response and Management, 2021
Proceedings of the Critical Information Infrastructures Security, 2021
2020
Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020
A Novel Approach to Quality-of-Service Provisioning in Trusted Relay Quantum Key Distribution Networks.
IEEE/ACM Trans. Netw., 2020
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems.
J. Inf. Secur. Appl., 2020
IEEE Access, 2020
Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management, 2020
Proceedings of the Critical Infrastructure Protection XIV, 2020
IT-Application Behaviour Analysis: Predicting Critical System States on OpenStack using Monitoring Performance Data and Log Files.
Proceedings of the 15th International Conference on Software Technologies, 2020
A Method for the Joint Analysis of Numerical and Textual IT-System Data to Predict Critical System States.
Proceedings of the Software Technologies - 15th International Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Fuzzy Expert Systems for Automated Data Quality Assessment and Improvement Processes.
Proceedings of the EKAW 2020 Posters and Demonstrations Session co-located with 22nd International Conference on Knowledge Engineering and Knowledge Management (EKAW 2020), 2020
Springer, ISBN: 978-3-030-46907-8, 2020
2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Proceedings of the Critical Information Infrastructures Security, 2019
2018
Security from the Adversary's Inertia-Controlling Convergence Speed When Playing Mixed Strategy Equilibria.
Games, 2018
Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks.
CoRR, 2018
On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats.
IEEE Access, 2018
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the Critical Information Infrastructures Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Implementation of quantum key distribution network simulation module in the network simulator NS-3.
Quantum Inf. Process., 2017
CoRR, 2017
IEEE Access, 2017
Proceedings of the IEEE 6th International Conference on Teaching, 2017
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017
2016
Side-channel leakage models for RISC instruction set architectures from empirical data.
Microprocess. Microsystems, 2016
Using neural networks to aid CVSS risk aggregation - An empirically validated approach.
J. Innov. Digit. Ecosyst., 2016
IEEE Access, 2016
Modelling security risk in critical utilities: The system at risk as a three player game and agent society.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016
A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Security Risk Aggregation Based on Neural Networks - An Empirically Validated Approach.
Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, 2016
2015
EURASIP J. Inf. Secur., 2015
On Game-Theoretic Risk Management (Part Two) - Algorithms to Compute Nash-Equilibria in Games with Distributions as Payoffs.
CoRR, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the S-BPM in the Wild, Practical Value Creation, 2015
Proceedings of the S-BPM in the Wild, Practical Value Creation, 2015
2014
Proceedings of the IEEE 16th Conference on Business Informatics, 2014
Chameleon-Hashing für Interaktive Beweise der Verfügbarkeit dynamischer Daten in der Cloud.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
2013
Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption.
CoRR, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Springer, ISBN: 978-3-642-36903-2, 2013
2012
On Secure Communication over Wireless Sensor Networks.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
A Unified Framework for the Analysis of Availability, Reliability and Security, With Applications to Quantum Networks.
IEEE Trans. Syst. Man Cybern. Part C, 2011
Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
J. Next Gener. Inf. Technol., 2011
Datenschutz und Datensicherheit, 2011
Information-leakage in Hybrid Randomized Protocols.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011
On Security and Privacy in Cloud Computing.
Proceedings of the CLOSER 2011, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
J. Netw. Syst. Manag., 2010
Datenschutz und Datensicherheit, 2010
Anonymous but Authorized Transactions Supporting Selective Traceability.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Multipath Authentication without shared Secrets and with Applications in Quantum Networks.
Proceedings of the 2010 International Conference on Security & Management, 2010
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare.
Proceedings of the Communications and Multimedia Security, 2010
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication.
Proceedings of the Communications and Multimedia Security, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Ausgezeichnete Informatikdissertationen 2009, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the The Forth International Conference on Availability, 2009
On Information-Theoretic Security - Contemporary Problems and Solutions.
PhD thesis, 2009
2008
Integration of Ontological Scene Representation and Logic-Based Reasoning for Context-Aware Driver Assistance Systems.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2008
Fusion of an uncalibrated camera with velocity information for distance measurement from a moving camera on highways.
Proceedings of the 5th Workshop on Positioning, Navigation and Communication, 2008
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008
Towards a game-theoretic model of co-operative context-aware driving under random influences.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2008
Proceedings of the Second International Conference on Quantum, 2008
A Game-Theoretic Approach to Co-operative Context-Aware Driving with Partially Random Behavior.
Proceedings of the Smart Sensing and Context, Third European Conference, 2008
Application framework for high security requirements in R&D environments based on quantum cryptography.
Proceedings of the CRiSIS '08, 2008
A model for ontology-based scene description for context-aware driver assistance systems.
Proceedings of the 1st International ICST Conference on Ambient Media and Systems, 2008
2007
Extrinsic Camera Calibration for an On-board Two-Camera System without overlapping Field of View.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2007
Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
Achieving Unconditional Security in Existing Networks Using Quantum Cryptography.
Proceedings of the SECRYPT 2006, 2006