Sebastian Biedermann

According to our database1, Sebastian Biedermann authored at least 21 papers between 2011 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Covert channels using mobile device's magnetic field sensors.
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016

2015
Lightweight energy consumption-based intrusion detection system for wireless sensor networks.
Int. J. Inf. Sec., 2015

Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Transparent security services for an infrastructure-as-a-service cloud.
PhD thesis, 2014

Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
IACR Cryptol. ePrint Arch., 2014

ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Data-centric phishing detection based on transparent virtualization technologies.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection.
Proceedings of the Information Security - 17th International Conference, 2014

Towards fast hardware memory integrity checking with skewed Merkle trees.
Proceedings of the HASP 2014, 2014

Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Hot-hardening: getting more out of your security settings.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
On the Application of Supervised Machine Learning to Trustworthiness Assessment.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Lightweight energy consumption based intrusion detection system for wireless sensor networks.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Improving security of virtual machines during live migrations.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Event-based isolation of critical data in the cloud.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
On Data-Centric Intrusion Detection in Wireless Sensor Networks.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Fast dynamic extracted honeypots in cloud computing.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

2011
The memory effect and its implications on Web QoE modeling.
Proceedings of the 23rd International Teletraffic Congress, 2011

Trustable outsourcing of business processes to cloud computing environments.
Proceedings of the 5th International Conference on Network and System Security, 2011

Detecting Computer Worms in the Cloud.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011


  Loading...