Andreas Aßmuth

Orcid: 0009-0002-2081-2455

According to our database1, Andreas Aßmuth authored at least 21 papers between 2016 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Introducing the Cyber-Physical Data Flow Diagram to Improve Threat Modelling of Internet of Things Devices.
CoRR, April, 2026

An Analysis of Attack Vectors Against FIDO2 Authentication.
CoRR, April, 2026

CVEs With a CVSS Score Greater Than or Equal to 9.
CoRR, April, 2026

2025
Practical Acoustic Eavesdropping On Typed Passphrases.
CoRR, March, 2025

Graph of Effort: Quantifying Risk of AI Usage for Vulnerability Assessment.
CoRR, March, 2025

2024
DDoS attack detection techniques in IoT networks: a survey.
Clust. Comput., December, 2024

Securing Confidential Data For Distributed Software Development Teams: Encrypted Container File.
CoRR, 2024

Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices.
CoRR, 2024

Threat Analysis of Industrial Internet of Things Devices.
CoRR, 2024

PLASMA - Platform for Service Management in Digital Remote Maintenance Applications.
CoRR, 2024

Security of Cloud Services with Low-Performance Devices in Critical Infrastructures.
CoRR, 2024

Cloud Security and Security Challenges Revisited.
CoRR, 2024

A Secure and Privacy-Friendly Logging Scheme.
CoRR, 2024

Securing 3rd Party App Integration in Docker-based Cloud Software Ecosystems.
CoRR, 2024

Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis.
CoRR, 2024

Encrypted Container File: Design and Implementation of a Hybrid-Encrypted Multi-Recipient File Structure.
CoRR, 2024

An Approach for Decentralized Authentication in Networks of UAVs.
CoRR, 2024

Managing Forensic Recovery in the Cloud.
CoRR, 2024

Strategies for Intrusion Monitoring in Cloud Services.
CoRR, 2024

2023
Security Challenges for Cloud or Fog Computing-Based AI Applications.
CoRR, 2023

2016
Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016


  Loading...