Ontology-driven device descriptions for IoT network management K Sahlmann, T Scheffler, B Schnor 2018 Global Internet of Things Summit (GIoTS), 1-6, 2018 | 26 | 2018 |
Using IPv6 and 6LoWPAN for home automation networks BM Dörge, T Scheffler 2011 IEEE International Conference on Consumer Electronics-Berlin (ICCE …, 2011 | 26 | 2011 |
Manage resource-constrained IoT devices through dynamically generated and deployed YANG models T Scheffler, O Bonneß Proceedings of the Applied Networking Research Workshop, 42-47, 2017 | 16 | 2017 |
Evaluation of Intrusion Detection Systems in IPv6 Networks. M Schrötter, T Scheffler, B Schnor ICETE (2), 408-416, 2019 | 10 | 2019 |
Managing IoT device capabilities based on oneM2M ontology descriptions K Sahlmann, T Scheffler, B Schnor Proceedings of the 16. GI/ITG KuVS Fachgespräch Sensornetze (Technical Reports), 2017 | 9 | 2017 |
Hyhoneydv6: A hybrid honeypot architecture for IPv6 networks S Schindler, B Schnor, T Scheffler International Journal of Intelligent Computing Research 6 (2), 562-570, 2015 | 9 | 2015 |
A privacy-aware localization service for healthcare environments T Scheffler, S Schindler, M Lewerenz, B Schnor Proceedings of the 4th International Conference on PErvasive Technologies …, 2011 | 9 | 2011 |
Securing IPv6 neighbor discovery and SLAAC in access networks through SDN D Nelle, T Scheffler Proceedings of the Applied Networking Research Workshop, 23-29, 2019 | 8 | 2019 |
IPv6 Network Attack Detection with HoneydV6 S Schindler, B Schnor, S Kiertscher, T Scheffler, E Zack E-Business and Telecommunications - Communications in Computer and …, 2014 | 7 | 2014 |
HoneydV6: A low-interaction IPv6 honeypot S Schindler, B Schnor, S Kiertscher, T Scheffler, E Zack 2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013 | 7 | 2013 |
Development of a Snort IPv6 Plugin-Detection of Attacks on the Neighbor Discovery Protocol. M Schütte, T Scheffler, B Schnor SECRYPT, 399-402, 2012 | 7 | 2012 |
An implementation of a privacy enforcement scheme based on the Java security framework using XACML policies T Scheffler, S Geiß, B Schnor Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008 | 7 | 2008 |
Enforcing location privacy policies through an AOP-based reference monitor T Scheffler, S Schindler, B Schnor World Congress on Internet Security (WorldCIS-2012), 51-56, 2012 | 6 | 2012 |
Using AOP-based enforcement of prioritised XACML policies for location privacy T Scheffler, S Schindler, B Schnor International Journal of Internet Technology and Secured Transactions 5 (1 …, 2013 | 5 | 2013 |
Privacy requirements for embedded sensor devices T Scheffler, B Schnor 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio …, 2005 | 5 | 2005 |
Secure access and management of Smart Objects with SNMPv3 S Zehl, T Scheffler 2013 IEEE Third International Conference on Consumer Electronics Berlin …, 2013 | 4 | 2013 |
Development of a Snort IPv6 Plugin M Schütte, T Scheffler, B Schnor International Conference on Security and Cryptography (SECRYPT 2012), 2012 | 3 | 2012 |
Taming the IPv6 address space with hyhoneydv6 S Schindler, B Schnor, T Scheffler 2015 World Congress on Internet Security (WorldCIS), 113-118, 2015 | 2 | 2015 |
Privacy enforcement with data owner-defined policies T Scheffler Universität Potsdam, 2013 | 2 | 2013 |
Specifying Security Policies for Electronic Health Records. F Apitzsch, S Liske, T Scheffler, B Schnor HEALTHINF (2), 82-90, 2008 | 2 | 2008 |