Segui
Björn Stelte
Björn Stelte
Email verificata su unibw.de
Titolo
Citata da
Citata da
Anno
Thwarting attacks on ZigBee-Removal of the KillerBee stinger
B Stelte, GD Rodosek
Proceedings of the 9th international conference on network and service …, 2013
602013
Requirements for a future EWS-Cyber Defence in the internet of the future
M Golling, B Stelte
2011 3rd International Conference on Cyber Conflict, 1-16, 2011
452011
Towards a trust computing architecture for RPL in cyber physical systems
S Seeber, A Sehgal, B Stelte, GD Rodosek, J Schönwälder
Proceedings of the 9th International Conference on Network and Service …, 2013
432013
Attack trends in present computer networks
R Koch, B Stelte, M Golling
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-12, 2012
382012
Toward development of high secure sensor network nodes using an FPGA-based architecture
B Stelte
Proceedings of the 6th International Wireless Communications and Mobile …, 2010
222010
Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation
B Stelte, A Matheus
SENSORS, 2011 IEEE, 920-923, 2011
182011
Assuring trustworthiness of sensor data for cyber-physical systems
B Stelte, GD Rodosek
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013
152013
Towards integrity measurement in virtualized environments—a hypervisor based sensory integrity measurement architecture (SIMA)
B Stelte, R Koch, M Ullmann
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
132010
iNagMon Network Monitoring on the iPhone
B Stelte, I Hochstatter
2009 Third International Conference on Next Generation Mobile Applications …, 2009
112009
Concealed Integrity Monitoring for Wireless Sensor Networks
T Bühring
Wireless Sensor Network 3 (01), 10, 2011
72011
ISP traceback-Attack path detection
B Stelte
2013 IEEE Conference on Communications and Network Security (CNS), 363-364, 2013
42013
An event management communication system for wireless sensor networks
B Stelte
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
32011
A flexible cryptographic infrastructure for high-security SDR-based systems
P Hillmann, B Stelte
2013 Military Communications and Information Systems Conference (MilCIS), 1-6, 2013
22013
Evidence theory for reputation-based trust in wireless sensor networks
A Matheus, B Stelte
Proceedings of the 3rd International Conference on Computing for Geospatial …, 2012
22012
Unidirectional traffic flow to protect wireless sensor networks against byzantine attacks
B Stelte
E-Business and Telecommunications: International Joint Conference, ICETE …, 2012
22012
A Real-Time-Enabled, Blackboard-Based, Publish/Subscribe Architecture for Wireless Sensor Nodes
B Stelte
Wireless Sensor Network 2 (08), 612, 2010
22010
Protection against byzantine attacks on wireless sensor networks
B Stelte
Proceedings of the International Conference on Wireless Information Networks …, 2011
12011
State-of-the-Art Kryptoverfahren für drahtlose Sensornetze–Eine Krypto-Bibliothek für MantisOS
B Stelte, B Saxe
Gesellschaft für Informatik eV, 2010
12010
D5. 1—Initial deliverable on network and service monitoring
A Sperotto, R Hofstede, R Schmidt, A Mayzaud, A Sehgal, B Stelte, ...
Computer Networks (LCN 2013), 2013
2013
Ausgewählte Themen der IT-Sicherheit
M Golling, B Stelte
Univ. der Bundeswehr München, Fak. für Informatik, 2012
2012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20