Oliver Jung

Orcid: 0000-0003-0483-1605

According to our database1, Oliver Jung authored at least 28 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Need for Threat Modelling in Unmanned Aerial Systems.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops, 2023

Cybersecurity Analysis in the UAV Domain: the Practical Approach of the Labyrinth Project.
Proceedings of the 2023 ACM Conference on Information Technology for Social Good, 2023

Promoting Healthy Aging Using a Robot Support System and Emotion Recognition.
Proceedings of the dHealth 2023, 2023

2020
FHIR Driven Self-Management Support System for Diabetes.
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020

Neural network based anomaly detection for SCADA systems.
Proceedings of the 23rd Conference on Innovation in Clouds, 2020

2019
Anomaly Detection in Smart Grids based on Software Defined Networks.
Proceedings of the 8th International Conference on Smart Cities and Green ICT Systems, 2019

Empowering Diabetes Patients with Interventions Based on Behaviour Change Techniques.
Proceedings of the dHealth 2019 - From eHealth to dHealth, 2019

2018
Smart Grid Reference Architecture, an Approach on a Secure and Model-Driven Implementation.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018

2017
A Tool that Uses Demand Side Management for Planning the Grid Response to Outages.
Proceedings of the Smart Grid Inspired Future Technologies, 2017

2016
Energy management in microgrids with flexible and interruptible loads.
Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2016

Outage response in microgrids using demand side management.
Proceedings of the IEEE International Smart Cities Conference, 2016

2014
Quantitative Safety and Security Analysis from a Communication Perspective.
Proceedings of the 8th International Conference on Performance Evaluation Methodologies and Tools, 2014

2013
Locality matters: Reducing Internet traffic graphs using location analysis.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2010
Internet security meets the IP multimedia subsystem: an overview.
Secur. Commun. Networks, 2010

IMS security and what we should learn from the Internet.
Elektrotech. Informationstechnik, 2010

2008
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP.
J. Univers. Comput. Sci., 2008

Enhancing ZRTP by using Computational Puzzles.
J. Univers. Comput. Sci., 2008

Using SIP identity to prevent man-in-the-middle attacks on ZRTP.
Proceedings of the 1st IFIP Wireless Days, 2008

A platform for the development of location-based mobile applications with privacy protection.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
Transaction pseudonyms in mobile environments.
J. Comput. Virol., 2007

A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications.
Proceedings of the The Second International Conference on Availability, 2007

2005
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms.
Proceedings of the Trust, 2005

2003
Verschlüsselung mit statistischer Selbstsynchronisation und ihre Anwendung in SDH-Netzen.
PhD thesis, 2003

Implementierungstechnologien für Web-Anwendungen.
Proceedings of the Web Engineering: Systematische Entwicklung von Web-Anwendungen, 2003

2001
Suitability of cryptographic modes of operation for the encryption in high-speed networks.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

1999
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999


  Loading...