Silke Holtmanns

Orcid: 0000-0003-2616-6212

Affiliations:
  • Bell Labs, Nokia, Finland
  • Nokia Research Center, Finland
  • Ericsson Eurolab Deutschland GmbH, Herzogenrath, Germany


According to our database1, Silke Holtmanns authored at least 31 papers between 2001 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Security policies definition and enforcement utilizing policy control function framework in 5G.
Comput. Commun., 2021

2020
Threat modeling framework for mobile communication systems.
CoRR, 2020

2019
A Framework for Privacy Quantification: Measuring the Impact of Privacy Techniques Through Mutual Information, Distance Mapping, and Machine Learning.
Cogn. Comput., 2019

2018
Experiences in Trusted Cloud Computing.
J. ICT Stand., 2018

Mobile Subscriber Profile Data Privacy Breach via 4G Diameter Interconnection.
J. ICT Stand., 2018

Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space.
Cogn. Comput., 2018

Roaming Interface Signaling Security for LTE Networks.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment.
Proceedings of the Computer Safety, Reliability, and Security, 2018

2017
Experiences in Trusted Cloud Computing.
Proceedings of the Network and System Security - 11th International Conference, 2017

Subscriber Profile Extraction and Modification via Diameter Interconnection.
Proceedings of the Network and System Security - 11th International Conference, 2017

Testbed for security orchestration in a network function virtualization environment.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

Providing for privacy in a network infrastructure protection context.
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

SMS and one-time-password interception in LTE networks.
Proceedings of the IEEE International Conference on Communications, 2017

On Distance Mapping from non-Euclidean Spaces to Euclidean Spaces.
Proceedings of the Machine Learning and Knowledge Extraction, 2017

Practical Estimation of Mutual Information on Non-Euclidean Spaces.
Proceedings of the Machine Learning and Knowledge Extraction, 2017

2016
Interconnection Security Standards - We Are All Connected.
J. ICT Stand., 2016

User location tracking attacks for LTE networks using the interworking functionality.
Proceedings of the 2016 IFIP Networking Conference, 2016

Privacy in LTE networks.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks.
Proceedings of the Formal Methods and Software Engineering, 2016

We know where you are!
Proceedings of the 8th International Conference on Cyber Conflict, 2016

Data Anonymization as a Vector Quantization Problem: Control Over Privacy for Health Data.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Aligning the Conflicting Needs of Privacy, Malware Detection and Network Protection.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Some dangers from 2G networks legacy support and a possible mitigation.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2007
Access Authentication to IMS Systems in Next Generation Networks.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

2006
Evaluation of certificate validation mechanisms.
Comput. Commun., 2006

2004
Privacy Rights Management for Mobile Phones.
Proceedings of the Wireless Information Systems, 2004

2003
Confidential mobile mail retrieval.
Comput. Commun., 2003

2002
Private Mail Retrieval Search on Encrypted Data.
Proceedings of the Wireless Information Systems, 2002

Privacy in a Mobile Environment.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
Mobile Payment Solutions.
Proceedings of the Towards The E-Society: E-Commerce, 2001


  Loading...