Publikationen

Wissenschaftliche Publikationen zum Thema Kritische Infrastrukturen und IT-Sicherheit

Die Sicherheit Kritischer Infrastrukturen nahm bereits in der Vergangenheit einen immer größeren Stellenwert ein. Zahlreiche Wissenschaftler aus Wirtschaft und aus den Hochschulen haben in wissenschaftlichen Publikationen auf das Thema aufmerksam gemacht und forschen an weiteren Mechanismen im Bereich der IT-Sicherheit.

Hier finden Sie eine Vielzahl ständig erweiterter wissenschaftlicher Publikationen des ESCI-Forschungsteams.

Journals

Sänn, Alexander (2011): Klasse statt Masse, in: Innovationsmanager, 16, S. 66-67.

Langendoerfer, Peter (2011): Wireless sensor and actuator networks for critical infrastructure protection, in: Eurescom mess@ge, 1/2011, S. 11-12.

Sänn, Alexander; Baier, Daniel (2011): Lead Users and Non-Lead Users: Do Their Preference Really Differ in Product Design?, Proceedings of the 18th IPDM Conference, June 05-07, 2011, Delft, The Netherlands, 2011, S. 222-223.

Sojka, Anna; Piotrowski, Krzysztof; Langendoerfer, Peter (2011): Symbiosis on a Lightweight ECC Security and Distributed Shared Memory in Wireless Sensor Networks, IEEE 30th Symposium on Reliable Distributed Systems Workshops, 2011, S. 36-41

Buttyán, Levente; Gessner, Dennis; Hessler, Alban; Langendoerfer, Peter (2010): Application of Wireless Sensor Networks in Critical Infrastructure Protection: Challenges and Design Options, in: IEEE Wireless Communications Magazine, Special Issue on Security and Privacy in Emerging Wireless Networks, 17, Nr. 5, S. 44 – 49.

Präsentationen

Schuster, Franka (2012): A Distributed Intrusion Detection System for Industrial Automation Networks, Event: 17th IEEE International Conference on Emerging Technologies & Factory Automation (ETFA 2012), Krakau, Polen

Paul, Andreas (2012): Profinet IO Vulnerability Assessment and Attack Derivation, Event: 7th International Conference on Critical Information Security (CRITIS 2012), Lillehammer, Norway

Lange, Stefan; Stecklina, Oliver (2012): Topologieüberwachung von drahtlosen Sensornetzen in der Automatisierung, Event: 11. GI/ITG KuVS Fachgespräch “Drahtlose Sensornetze”, Darmstadt, Germany.

Sänn, Alexander (2012): Complex Product Development: Using a Combined VoC Lead User Approach. Event: The 36th Annual Conference of the German Classification Society (GfKl), Hildesheim, Germany.

Sojka, Anna; Piotrowski, Krzysztof (2012): A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks, Event: 9th International Joint Conference on e-Business and Telecommunications, Rome, Italy.

Stecklina, Oliver; Sänn, Alexander (2012): Erweiterte Sicherheit für Kritische Infrastrukturen (ESCI), Event: ISI4people Innovationsforum, Berlin, Germany.

Sänn, Alexander (2012): Lead Users And Non-Lead Users: Breakthrough Preferences Measured By Online Analysis, Event: 2012 ISMS Marketing Science Conference, Boston, Massachusetts.

Sänn, Alexander (2012): Lead Users And Non-Lead Users: Breakthrough Preferences Measured By Online Analysis, Event: The R&D Management Conference 2012, Grenoble, France.

Stecklina Oliver; Langendörfer, Peter (2011): Ubiquitous Computing Asks for Ubiquitous Line of Defense, Event: Proc. Workshop über IT-Sicherheit in kollaborativen und stark vernetzten Systemen, Berlin, Germany.

Peter, Steffen; Schreier, Michaela; Langendörfer, Peter (2011): WSAN4CIP – Wireless Sensor and ActuatorNetworks for the Protection of Critical Infrastructures (Poster), Event: 4th Summer School on Network and Information Security, Crete, Greece.

Sänn, Alexander (2011): Lead Users and Non-Lead Users: Do Their Preference Really Differ in Product Design?, Event: 18th International Product Development Management Conference, Delft, The Netherlands.

Langendörfer, Peter (2011): WSAN4CIP in a nut shell, Event: 1st Effectsplus cluster meeting, Brussels, Belgium.

Die Kommentarfunktion ist geschlossen.