Sebastian Obermeier

Affiliations:
  • Hochschule Luzern, Switzerland


According to our database1, Sebastian Obermeier authored at least 42 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
When Can a Distributed Ledger Replace a Trusted Third Party?
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Bluetooth Low Energy Devices Security Testing Framework.
Proceedings of the 11th IEEE International Conference on Software Testing, 2018

2017
A security evaluation of IEC 62351.
J. Inf. Secur. Appl., 2017

Programmable Logic Controller Forensics.
IEEE Secur. Priv., 2017

2016
Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

2015
A Flexible Architecture for Industrial Control System Honeypots.
Proceedings of the SECRYPT 2015, 2015

A Framework for Incident Response in Industrial Control Systems.
Proceedings of the SECRYPT 2015, 2015

Structured system threat modeling and mitigation analysis for industrial automation systems.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

ICS Threat Analysis Using a Large-Scale Honeynet.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Cyber Security Maintenance for SCADA Systems.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Assessing the Security of IEC 62351.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

A Scalable Honeynet Architecture for Industrial Control Systems.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

2014
Securing Industrial Control Systems through Autonomous Hardening.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

Securing industrial automation and control systems using application whitelisting.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014

Automatic attack surface reduction in next-generation industrial control systems.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

2013
Secure design of engineering software tools in Industrial Automation and Control Systems.
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013

2012
SCADA Systems: Challenges for Forensic Investigators.
Computer, 2012

2011
Protecting a Distributed Voting Schema for Anonymous and Secure Voting Against Attacks of Malicious Partners.
Int. J. E Serv. Mob. Appl., 2011

2010
Constraint Checking for Non-blocking Transaction Processing in Mobile Ad-hoc Networks.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 1, DISI, Funchal, Madeira, Portugal, June 8, 2010

2009
A cross-layer atomic commit protocol implementation for transaction processing in mobile ad-hoc networks.
Distributed Parallel Databases, 2009

Blocking reduction for distributed transaction processing within MANETs.
Distributed Parallel Databases, 2009

Tool Support for Achieving Qualitative Security Assessments of Critical Infrastructures - The ESSAF Framework for Structured Qualitative Analysis.
Proceedings of the SECRYPT 2009, 2009

Collaborative Security Assessments in Embedded Systems Development - The ESSAF Framework for Structured Qualitative Analysis.
Proceedings of the SECRYPT 2009, 2009

2008
Database transaction management in mobile ad-hoc networks.
PhD thesis, 2008

Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants.
J. Softw., 2008

Segmentation-Based Caching for Mobile Auctions.
Proceedings of the Techniques and Applications for Mobile Commerce - Proceedings of TAMoCo 2008, University of Paisley, Glasgow, Scotland, United Kingdom, 14, 2008

CLCP - A Distributed Cross-Layer Commit Protocol for Mobile Ad Hoc Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Adjourn State Concurrency Control Avoiding Time-Out Problems in Atomic Commit Protocols.
Proceedings of the 24th International Conference on Data Engineering, 2008

XML fragment caching for large-scale mobile commerce applications.
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008

2007
Secure Computation of Common Data among Malicious Partners.
Proceedings of the SECRYPT 2007, 2007

A Failure Tolerating Atomic Commit Protocol for Mobile Environments.
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007

XPath Selectivity Estimation for a Mobile Auction Application.
Proceedings of the Eleventh International Database Engineering and Applications Symposium (IDEAS 2007), 2007

Avoiding Infinite Blocking of Mobile Transactions.
Proceedings of the Eleventh International Database Engineering and Applications Symposium (IDEAS 2007), 2007

Reliable Intersection Computation within Malicious Environments.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Dynamic commit tree management for service oriented architectures.
Proceedings of the ICEIS 2007, 2007

XML Query Result Size Estimation for Small Bandwidth Devices.
Proceedings of the Data Management. Data, 2007

Secure Anonymous Union Computation Among Malicious Partners.
Proceedings of the The Second International Conference on Availability, 2007

2006
Sovereign Information Sharing Among Malicious Partners.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

06431 Working Group Summary: Atomicity in Mobile Networks.
Proceedings of the Scalable Data Management in Evolving Networks, 22.10. - 27.10.2006, 2006

06431 Working Group Summary: P2P, Ad Hoc and Sensor Networks - All the Different or All the Same?.
Proceedings of the Scalable Data Management in Evolving Networks, 22.10. - 27.10.2006, 2006

Reducing Sub-transaction Aborts and Blocking Time Within Atomic Commit Protocols.
Proceedings of the Flexible and Efficient Information Handling, 2006

2005
An Integrated Commit Protocol for Mobile Network Databases.
Proceedings of the Ninth International Database Engineering and Applications Symposium (IDEAS 2005), 2005


  Loading...