Cybersecurity in power grids: Challenges and opportunities

T Krause, R Ernst, B Klaer, I Hacker, M Henze - Sensors, 2021 - mdpi.com
Increasing volatilities within power transmission and distribution force power grid operators
to amplify their use of communication infrastructure to monitor and control their grid. The …

A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

A study on design requirement development and satisfaction for future virtual world systems

B Shen, W Tan, J Guo, H Cai, B Wang, S Zhuo - Future Internet, 2020 - mdpi.com
Virtual worlds have become global platforms connecting millions of people and containing
various technologies. For example, No Man's Sky (nomanssky. com), a cross-platform virtual …

The quest for secure and privacy-preserving cloud-based industrial cooperation

M Henze - 2020 IEEE Conference on Communications and …, 2020 - ieeexplore.ieee.org
Industrial cooperation promises to leverage the huge amounts of data generated by and
collected in industrial deployments to realize valuable improvements such as increases in …

Distributed configuration, authorization and management in the cloud-based internet of things

M Henze, B Wolters, R Matzutt… - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
Network-based deployments within the Internet of Things increasingly rely on the cloud-
controlled federation of individual networks to configure, authorize, and manage devices …

Complying with data handling requirements in cloud storage systems

M Henze, R Matzutt, J Hiller, E Mühmer… - … on Cloud Computing, 2020 - ieeexplore.ieee.org
In past years, cloud storage systems saw an enormous rise in usage. However, despite their
popularity and importance as underlying infrastructure for more complex cloud services …

An insight into decisive factors in cloud provider selection with a focus on security

S Pape, J Stankovic - … , SECPRE, SPOSE, and ADIoT, Luxembourg City …, 2020 - Springer
In the last ten years cloud computing has developed from a buzz word to the new computing
paradigm on a global scale. Computing power or storage capacity can be bought and …

Veiled in clouds? assessing the prevalence of cloud computing in the email landscape

M Henze, MP Sanford… - 2017 Network Traffic …, 2017 - ieeexplore.ieee.org
The ongoing adoption of cloud-based email services-mainly run by few operators-transforms
the largely decentralized email infrastructure into a more centralized one. Yet, little empirical …

Approach for Ensuring Fragmentation and Integrity of Data in SEDuLOUS

AP Singh, A Choudhary - Proceedings of Second International Conference …, 2021 - Springer
With the rapid adoption of cloud services, more and more data are being uploaded on the
cloud platform. These data are under threat from various threat actors constantly researching …

Giving customers control over their data: Integrating a policy language into the cloud

J Hiller, M Kimmerlin, M Plauth… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
Cloud computing offers the potential to store, manage, and process data in highly available,
scalable, and elastic environments. Yet, these environments still provide very limited and …