Thwarting attacks on ZigBee-Removal of the KillerBee stinger B Stelte, GD Rodosek Proceedings of the 9th international conference on network and service …, 2013 | 66 | 2013 |
Towards a trust computing architecture for RPL in cyber physical systems S Seeber, A Sehgal, B Stelte, GD Rodosek, J Schönwälder Proceedings of the 9th International Conference on Network and Service …, 2013 | 45 | 2013 |
Requirements for a future EWS-Cyber Defence in the internet of the future M Golling, B Stelte 2011 3rd International Conference on Cyber Conflict, 1-16, 2011 | 43 | 2011 |
Attack trends in present computer networks R Koch, B Stelte, M Golling 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-12, 2012 | 38 | 2012 |
Toward development of high secure sensor network nodes using an FPGA-based architecture B Stelte Proceedings of the 6th International Wireless Communications and Mobile …, 2010 | 22 | 2010 |
Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation B Stelte, A Matheus SENSORS, 2011 IEEE, 920-923, 2011 | 18 | 2011 |
Assuring trustworthiness of sensor data for cyber-physical systems B Stelte, GD Rodosek 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013 | 16 | 2013 |
Towards integrity measurement in virtualized environments—a hypervisor based sensory integrity measurement architecture (SIMA) B Stelte, R Koch, M Ullmann 2010 IEEE International Conference on Technologies for Homeland Security …, 2010 | 13 | 2010 |
iNagMon Network Monitoring on the iPhone B Stelte, I Hochstatter 2009 Third International Conference on Next Generation Mobile Applications …, 2009 | 11 | 2009 |
Concealed Integrity Monitoring for Wireless Sensor Networks T Bühring Wireless Sensor Network 3 (01), 10, 2011 | 8 | 2011 |
ISP traceback-Attack path detection B Stelte 2013 IEEE Conference on Communications and Network Security (CNS), 363-364, 2013 | 4 | 2013 |
An event management communication system for wireless sensor networks B Stelte 12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011 | 3 | 2011 |
A flexible cryptographic infrastructure for high-security SDR-based systems P Hillmann, B Stelte 2013 Military Communications and Information Systems Conference (MilCIS), 1-6, 2013 | 2 | 2013 |
Evidence theory for reputation-based trust in wireless sensor networks A Matheus, B Stelte Proceedings of the 3rd International Conference on Computing for Geospatial …, 2012 | 2 | 2012 |
Unidirectional traffic flow to protect wireless sensor networks against byzantine attacks B Stelte E-Business and Telecommunications: International Joint Conference, ICETE …, 2012 | 2 | 2012 |
A Real-Time-Enabled, Blackboard-Based, Publish/Subscribe Architecture for Wireless Sensor Nodes B Stelte Wireless Sensor Network 2 (08), 612, 2010 | 2 | 2010 |
Protection against byzantine attacks on wireless sensor networks B Stelte Proceedings of the International Conference on Wireless Information Networks …, 2011 | 1 | 2011 |
Virtualisierung: Techniken und sicherheitsorientierte Anwendungen G Teege, B Stelte Univ. der Bundeswehr München, Fak. für Informatik, 2010 | 1 | 2010 |
State-of-the-Art Kryptoverfahren für drahtlose Sensornetze–Eine Krypto-Bibliothek für MantisOS B Stelte, B Saxe Gesellschaft für Informatik eV, 2010 | 1 | 2010 |
D5. 1—Initial deliverable on network and service monitoring A Sperotto, R Hofstede, R Schmidt, A Mayzaud, A Sehgal, B Stelte, ... Computer Networks (LCN 2013), 2013 | | 2013 |