关注
Thomas Scheffler
Thomas Scheffler
在 htw-berlin.de 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Ontology-driven device descriptions for IoT network management
K Sahlmann, T Scheffler, B Schnor
2018 Global Internet of Things Summit (GIoTS), 1-6, 2018
262018
Using IPv6 and 6LoWPAN for home automation networks
BM Dörge, T Scheffler
2011 IEEE International Conference on Consumer Electronics-Berlin (ICCE …, 2011
262011
Manage resource-constrained IoT devices through dynamically generated and deployed YANG models
T Scheffler, O Bonneß
Proceedings of the Applied Networking Research Workshop, 42-47, 2017
162017
Evaluation of Intrusion Detection Systems in IPv6 Networks.
M Schrötter, T Scheffler, B Schnor
ICETE (2), 408-416, 2019
102019
Managing IoT device capabilities based on oneM2M ontology descriptions
K Sahlmann, T Scheffler, B Schnor
Proceedings of the 16. GI/ITG KuVS Fachgespräch Sensornetze (Technical Reports), 2017
92017
Hyhoneydv6: A hybrid honeypot architecture for IPv6 networks
S Schindler, B Schnor, T Scheffler
International Journal of Intelligent Computing Research 6 (2), 562-570, 2015
92015
A privacy-aware localization service for healthcare environments
T Scheffler, S Schindler, M Lewerenz, B Schnor
Proceedings of the 4th International Conference on PErvasive Technologies …, 2011
92011
Securing IPv6 neighbor discovery and SLAAC in access networks through SDN
D Nelle, T Scheffler
Proceedings of the Applied Networking Research Workshop, 23-29, 2019
82019
IPv6 Network Attack Detection with HoneydV6
S Schindler, B Schnor, S Kiertscher, T Scheffler, E Zack
E-Business and Telecommunications - Communications in Computer and …, 2014
72014
HoneydV6: A low-interaction IPv6 honeypot
S Schindler, B Schnor, S Kiertscher, T Scheffler, E Zack
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
72013
Development of a Snort IPv6 Plugin-Detection of Attacks on the Neighbor Discovery Protocol.
M Schütte, T Scheffler, B Schnor
SECRYPT, 399-402, 2012
72012
An implementation of a privacy enforcement scheme based on the Java security framework using XACML policies
T Scheffler, S Geiß, B Schnor
Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008
72008
Enforcing location privacy policies through an AOP-based reference monitor
T Scheffler, S Schindler, B Schnor
World Congress on Internet Security (WorldCIS-2012), 51-56, 2012
62012
Using AOP-based enforcement of prioritised XACML policies for location privacy
T Scheffler, S Schindler, B Schnor
International Journal of Internet Technology and Secured Transactions 5 (1 …, 2013
52013
Privacy requirements for embedded sensor devices
T Scheffler, B Schnor
2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio …, 2005
52005
Secure access and management of Smart Objects with SNMPv3
S Zehl, T Scheffler
2013 IEEE Third International Conference on Consumer Electronics Berlin …, 2013
42013
Development of a Snort IPv6 Plugin
M Schütte, T Scheffler, B Schnor
International Conference on Security and Cryptography (SECRYPT 2012), 2012
32012
Taming the IPv6 address space with hyhoneydv6
S Schindler, B Schnor, T Scheffler
2015 World Congress on Internet Security (WorldCIS), 113-118, 2015
22015
Privacy enforcement with data owner-defined policies
T Scheffler
Universität Potsdam, 2013
22013
Specifying Security Policies for Electronic Health Records.
F Apitzsch, S Liske, T Scheffler, B Schnor
HEALTHINF (2), 82-90, 2008
22008
系统目前无法执行此操作,请稍后再试。
文章 1–20