Jan Pennekamp

Orcid: 0000-0003-0398-6904

According to our database1, Jan Pennekamp authored at least 48 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Interdisciplinary Survey on Information Flows in Supply Chains.
ACM Comput. Surv., February, 2024

Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs.
IEEE Access, 2024

2023
Offering Two-way Privacy for Evolved Purchase Inquiries.
ACM Trans. Internet Techn., November, 2023

SoK: Evaluations in Industrial Intrusion Detection Research.
CoRR, 2023

Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation.
CoRR, 2023

Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead.
CoRR, 2023

FAIR Sensor Ecosystem: Long-Term (Re-)Usability of FAIR Sensor Data through Contextualization.
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023

One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023

Poster: Accountable Processing of Reported Street Problems.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking.
Proceedings of the Advanced Information Systems Engineering, 2023

2022
A Computer Science Perspective on Digital Transformation in Production.
ACM Trans. Internet Things, 2022

Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

On the need for strong sovereignty in data ecosystems.
Proceedings of the First International Workshop on Data Ecosystems co-located with 48th International Conference on Very Large Databases (VLDB 2022), 2022

Scalable and Privacy-Focused Company-Centric Supply Chain Management.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

A False Sense of Security?: Revisiting the State of Machine Learning-Based Industrial Intrusion Detection.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Cookie Banners and Privacy Policies: Measuring the Impact of the GDPR on the Web.
ACM Trans. Web, 2021

CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively.
IEEE Trans. Netw. Serv. Manag., 2021

Blockchain-based privacy preservation for supply chains supporting lightweight multi-hop information accountability.
Inf. Process. Manag., 2021

Unlocking Secure Industrial Collaborations through Privacy-Preserving Computation.
ERCIM News, 2021

Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use.
CoRR, 2021

Development of a Model to Evaluate the Potential of 5G Technology for Latency-critical Applications in Production.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2021

Data Reliability and Trustworthiness Through Digital Transmission Contracts.
Proceedings of the Semantic Web - 18th International Conference, 2021

Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
FactDAG: Formalizing Data Interoperability in an Internet of Production.
IEEE Internet Things J., 2020

Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking.
IACR Cryptol. ePrint Arch., 2020

Assessing the Security of OPC UA Deployments.
CoRR, 2020

Expressing FactDAG Provenance with PROV-O.
Proceedings of the 6th Workshop on Managing the Evolution and Preservation of the Data Web (MEPDaW) co-located with the 19th International Semantic Web Conference (ISWC 2020), 2020

How to Securely Prune Bitcoin's Blockchain.
Proceedings of the 2020 IFIP Networking Conference, 2020

Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

A Secure and Practical Decentralized Ecosystem for Shareable Education Material.
Proceedings of the 2020 International Conference on Information Networking, 2020

Private Multi-Hop Accountability for Supply Chains.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

Secure End-to-End Sensing in Supply Chains.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Privacy-Preserving Production Process Parameter Exchange.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Hi Doppelgänger : Towards Detecting Manipulation in News Comments.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Towards an Infrastructure Enabling the Internet of Production.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019

Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Privacy-Preserving Remote Knowledge System.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

POSTER: Traffic Splitting to Counter Website Fingerprinting.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2017
A survey on the evolution of privacy enforcement on smartphones and the road ahead.
Pervasive Mob. Comput., 2017

CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

2016
Website Fingerprinting at Internet Scale.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016


  Loading...