Thomas Scheffler

According to our database1, Thomas Scheffler authored at least 16 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Evaluation of Intrusion Detection Systems in IPv6 Networks.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Securing IPv6 neighbor discovery and SLAAC in access networks through SDN.
Proceedings of the Applied Networking Research Workshop, 2019

2018
Ontology-driven Device Descriptions for IoT Network Management.
Proceedings of the 2018 Global Internet of Things Summit, 2018

2017
Manage resource-constrained IoT devices through dynamically generated and deployed YANG models.
Proceedings of the Applied Networking Research Workshop, 2017

2015
Taming the Ipv6 address space with hyhoneydv6.
Proceedings of the 2015 World Congress on Internet Security, 2015

2014
Shellcode Detection in IPv6 Networks with HoneydV6.
Proceedings of the SECRYPT 2014, 2014

2013
Privacy enforcement with data owner-defined policies.
PhD thesis, 2013

HoneydV6: A Low-interaction IPv6 Honeypot.
Proceedings of the SECRYPT 2013, 2013

IPv6 Network Attack Detection with HoneydV6.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

Secure access and management of smart objects with SNMPv3.
Proceedings of the IEEE Third International Conference on Consumer Electronics, 2013

2012
Enforcing location privacy policies through an AOP-based reference monitor.
Proceedings of the 2012 World Congress on Internet Security, 2012

Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol.
Proceedings of the SECRYPT 2012, 2012

2011
A privacy-aware localization service for healthcare environments.
Proceedings of the PETRA 2011, 2011

2008
An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Specifying Security Policies for Electronic Health Records.
Proceedings of the First International Conference on Health Informatics, 2008

2005
Privacy requirements for embedded sensor devices.
Proceedings of the IEEE 16th International Symposium on Personal, 2005


  Loading...