Jan Pennekamp

Orcid: 0000-0003-0398-6904

According to our database1, Jan Pennekamp authored at least 64 papers between 2016 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
PRepChain: A versatile privacy-preserving reputation system for dynamic supply chain environments.
Future Gener. Comput. Syst., 2026

2025
MapXchange: Designing a Confidentiality-Preserving Platform for Exchanging Technology Parameter Maps.
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, 2025

ConfMod: A Simple Modeling of Confidentiality Requirements for Inter-Organizational Data Sharing.
Proceedings of the NOMS 2025 IEEE Network Operations and Management Symposium, 2025

Congestion-Responsive Queuing for Internet Flows.
Proceedings of the NOMS 2025 IEEE Network Operations and Management Symposium, 2025

Advancing Network Monitoring with Packet-Level Records and Selective Flow Aggregation.
Proceedings of the NOMS 2025 IEEE Network Operations and Management Symposium, 2025

Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach.
Dataset, November, 2024

An Interdisciplinary Survey on Information Flows in Supply Chains.
ACM Comput. Surv., February, 2024

Secure Collaborations for the Industrial Internet of Things.
PhD thesis, 2024

The unresolved need for dependable guarantees on security, sovereignty, and trust in data ecosystems.
Data Knowl. Eng., 2024

PASTA-4-PHT: A Pipeline for Automated Security and Technical Audits for the Personal Health Train.
CoRR, 2024

Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs.
IEEE Access, 2024

scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Evolving the Industrial Internet of Things: The Advent of Secure Collaborations.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

LUA-IoT: Let's Usably Authenticate the IoT.
Proceedings of the Information Security and Cryptology - ICISC 2024, 2024

2023
Offering Two-way Privacy for Evolved Purchase Inquiries.
ACM Trans. Internet Techn., November, 2023

Artifact: SoK: Evaluations in Industrial Intrusion Detection Research.
Dataset, October, 2023

[SoK] Evaluations in Industrial Intrusion Detection Research.
J. Syst. Res., 2023

[Tool] Automatically Extracting Hardware Descriptions from PDF Technical Documentation.
J. Syst. Res., 2023

Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead.
CoRR, 2023

Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2023

FAIR Sensor Ecosystem: Long-Term (Re-)Usability of FAIR Sensor Data through Contextualization.
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023

One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023

Poster: Accountable Processing of Reported Street Problems.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking.
Proceedings of the Advanced Information Systems Engineering, 2023

2022
A Computer Science Perspective on Digital Transformation in Production.
ACM Trans. Internet Things, 2022

Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

On the need for strong sovereignty in data ecosystems.
Proceedings of the First International Workshop on Data Ecosystems co-located with 48th International Conference on Very Large Databases (VLDB 2022), 2022

Scalable and Privacy-Focused Company-Centric Supply Chain Management.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

A False Sense of Security?: Revisiting the State of Machine Learning-Based Industrial Intrusion Detection.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Cookie Banners and Privacy Policies: Measuring the Impact of the GDPR on the Web.
ACM Trans. Web, 2021

CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively.
IEEE Trans. Netw. Serv. Manag., 2021

Blockchain-based privacy preservation for supply chains supporting lightweight multi-hop information accountability.
Inf. Process. Manag., 2021

Unlocking Secure Industrial Collaborations through Privacy-Preserving Computation.
ERCIM News, 2021

Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use.
CoRR, 2021

Development of a Model to Evaluate the Potential of 5G Technology for Latency-critical Applications in Production.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2021

Data Reliability and Trustworthiness Through Digital Transmission Contracts.
Proceedings of the Semantic Web - 18th International Conference, 2021

Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
FactDAG: Formalizing Data Interoperability in an Internet of Production.
IEEE Internet Things J., 2020

Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking.
IACR Cryptol. ePrint Arch., 2020

Assessing the Security of OPC UA Deployments.
CoRR, 2020

Expressing FactDAG Provenance with PROV-O.
Proceedings of the 6th Workshop on Managing the Evolution and Preservation of the Data Web (MEPDaW) co-located with the 19th International Semantic Web Conference (ISWC 2020), 2020

How to Securely Prune Bitcoin's Blockchain.
Proceedings of the 2020 IFIP Networking Conference, 2020

Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

A Secure and Practical Decentralized Ecosystem for Shareable Education Material.
Proceedings of the 2020 International Conference on Information Networking, 2020

Private Multi-Hop Accountability for Supply Chains.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

Secure End-to-End Sensing in Supply Chains.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Privacy-Preserving Production Process Parameter Exchange.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Hi Doppelgänger : Towards Detecting Manipulation in News Comments.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Towards an Infrastructure Enabling the Internet of Production.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019

Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Privacy-Preserving Remote Knowledge System.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

POSTER: Traffic Splitting to Counter Website Fingerprinting.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2017
A survey on the evolution of privacy enforcement on smartphones and the road ahead.
Pervasive Mob. Comput., 2017

CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

2016
Website Fingerprinting at Internet Scale.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016


  Loading...