Stefan Rass

Orcid: 0000-0003-2821-2489

According to our database1, Stefan Rass authored at least 136 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Computer-Aided Verification of P/NP Proofs: A Survey and Discussion.
IEEE Access, 2024

2023
Game-theoretic APT defense: An experimental study on robotics.
Comput. Secur., September, 2023

Benchmarking Function Hook Latency in Cloud-Native Environments.
CoRR, 2023

RobotPerf: An Open-Source, Vendor-Agnostic, Benchmarking Suite for Evaluating Robotics Computing System Performance.
CoRR, 2023

Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code.
CoRR, 2023

PentestGPT: An LLM-empowered Automatic Penetration Testing Tool.
CoRR, 2023

ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics.
CoRR, 2023

False-Bottom Encryption: Deniable Encryption From Secret Sharing.
IEEE Access, 2023

How to Plausibly Deny Steganographic Secrets.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Anonymously Publishing Liveness Signals with Plausible Deniability.
Proceedings of the Advances in Mobile Computing and Multimedia Intelligence, 2023

2022
Games over Probability Distributions Revisited: New Equilibrium Models and Refinements.
Games, 2022

Hacking planned obsolescense in robotics, towards security-oriented robot teardown.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Metricizing the Euclidean Space towards Desired Distance Relations in Point Clouds.
CoRR, 2022

Decisions with Uncertain Consequences - A Total Ordering on Loss-Distributions.
CoRR, 2022

Defending Against Advanced Persistent Threats using Game-Theory.
CoRR, 2022

Supervised Machine Learning with Plausible Deniability.
Comput. Secur., 2022

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles.
IEEE Access, 2022

Tackling Denial of Service Attacks on Key Management in Software-Defined Quantum Key Distribution Networks.
IEEE Access, 2022

Synchronization in Security Games.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

Towards Cost-Benefit-Aware Adaptive Monitoring for Cyber-Physical Systems.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Quantum Key Distribution Networks - A Quality of Service Perspective, 1
Springer, ISBN: 978-3-031-06607-8, 2022

2021
A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows.
J. Cybersecur. Priv., January, 2021

Game-Theoretic Decision Support for Cyber Forensic Investigations.
Sensors, 2021

Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice.
Found. Trends Robotics, 2021

Quantum Key Distribution: A Networking Perspective.
ACM Comput. Surv., 2021

Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problems.
Comput. Optim. Appl., 2021

Simulation-driven Risk Model for Interdependent Critical Infrastructures.
Proceedings of the 18th International Conference on Information Systems for Crisis Response and Management, 2021

Multi-categorical Risk Assessment for Urban Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2021

2020
Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

A Novel Approach to Quality-of-Service Provisioning in Trusted Relay Quantum Key Distribution Networks.
IEEE/ACM Trans. Netw., 2020

synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems.
J. Inf. Secur. Appl., 2020

alurity, a toolbox for robot cybersecurity.
CoRR, 2020

Can ROS be used securely in industry? Red teaming ROS-Industrial.
CoRR, 2020

Computer & security special issue editorial.
Comput. Secur., 2020

Generic Parity-Based Concurrent Error Detection for Lightweight ARX Ciphers.
IEEE Access, 2020

Cross-Domain Risk Analysis to Strengthen City Resilience: the ODYSSEUS Approach.
Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management, 2020

Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities.
Proceedings of the Critical Infrastructure Protection XIV, 2020

IT-Application Behaviour Analysis: Predicting Critical System States on OpenStack using Monitoring Performance Data and Log Files.
Proceedings of the 15th International Conference on Software Technologies, 2020

A Method for the Joint Analysis of Numerical and Textual IT-System Data to Predict Critical System States.
Proceedings of the Software Technologies - 15th International Conference, 2020

Security Games over Lexicographic Orders.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Fuzzy Expert Systems for Automated Data Quality Assessment and Improvement Processes.
Proceedings of the EKAW 2020 Posters and Demonstrations Session co-located with 22nd International Conference on Knowledge Engineering and Knowledge Management (EKAW 2020), 2020

Cyber-Security in Critical Infrastructures - A Game-Theoretic Approach
Springer, ISBN: 978-3-030-46907-8, 2020

2019
An Overview of Data Quality Frameworks.
IEEE Access, 2019

Cut-The-Rope: A Game of Stealthy Intrusion.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Honeypot Type Selection Games for Smart Grid Networks.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Estimating Cascading Effects in Cyber-Physical Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2019

2018
Security from the Adversary's Inertia-Controlling Convergence Speed When Playing Mixed Strategy Equilibria.
Games, 2018

Risk Assessment Uncertainties in Cybersecurity Investments.
Games, 2018

Password Security as a Game of Entropies.
Entropy, 2018

Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks.
CoRR, 2018

Community-Based Security for the Internet of Things.
CoRR, 2018

Game Theory Meets Network Security: A Tutorial at ACM CCS.
CoRR, 2018

On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats.
IEEE Access, 2018

An Overview of Data-Driven Techniques for IT-Service-Management.
IEEE Access, 2018

Trust and Distrust: On Sense and Nonsense in Big Data.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

Analyzing Cascading Effects among Critical Infrastructures.
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018

Disappointment-Aversion in Security Games.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

A Measure for Resilience of Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2018

Game Theory Meets Network Security: A Tutorial.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Security for the Robot Operating System.
Robotics Auton. Syst., 2017

Implementation of quantum key distribution network simulation module in the network simulator NS-3.
Quantum Inf. Process., 2017

Uncertainty in Cyber Security Investments.
CoRR, 2017

Towards a Physical Oracle for the Partition Problem using Analogue Computing.
CoRR, 2017

Physical Intrusion Games - Optimizing Surveillance by Simulation and Game Theory.
IEEE Access, 2017

Learning pairing-based cryptography by hands-on exercises.
Proceedings of the IEEE 6th International Conference on Teaching, 2017

On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Playing a Multi-objective Spot-checking Game in Public Transportation Systems.
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017

2016
Side-channel leakage models for RISC instruction set architectures from empirical data.
Microprocess. Microsystems, 2016

Using neural networks to aid CVSS risk aggregation - An empirically validated approach.
J. Innov. Digit. Ecosyst., 2016

On the Existence of Weak One-Way Functions.
CoRR, 2016

On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack.
IEEE Access, 2016

Modelling security risk in critical utilities: The system at risk as a three player game and agent society.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Arguable anonymity from key-privacy: The deterministic crowds protocol.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Application-level security for ROS-based applications.
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016

GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Security Risk Aggregation Based on Neural Networks - An Empirically Validated Approach.
Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, 2016

2015
Secure Communication over Software-Defined Networks.
Mob. Networks Appl., 2015

Private function evaluation by local two-party computation.
EURASIP J. Inf. Secur., 2015

Oblivious Lookup Tables.
CoRR, 2015

On Game-Theoretic Risk Management (Part Two) - Algorithms to Compute Nash-Equilibria in Games with Distributions as Payoffs.
CoRR, 2015

Uncertainty in Games: Using Probability-Distributions as Payoffs.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Licensed processing of encrypted information.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Structured Communication - Approaching S-BPM with Microsoft Technologies.
Proceedings of the S-BPM in the Wild, Practical Value Creation, 2015

Embodying Business Rules in S-BPM.
Proceedings of the S-BPM in the Wild, Practical Value Creation, 2015

2014
Hardware-Sicherheit.
Datenschutz und Datensicherheit, 2014

Modeling and Execution of Multienterprise Business Processes.
Proceedings of the IEEE 16th Conference on Business Informatics, 2014

Chameleon-Hashing für Interaktive Beweise der Verfügbarkeit dynamischer Daten in der Cloud.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Numerical Computation of Multi-goal Security Strategies.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

2013
On Game-Theoretic Network Security Provisioning.
J. Netw. Syst. Manag., 2013

Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption.
CoRR, 2013

Distributed Business Processes - A Framework for Modeling and Execution.
CoRR, 2013

Dynamic Proofs of Retrievability from Chameleon-Hashes.
Proceedings of the SECRYPT 2013, 2013

On Bayesian Trust and Risk Forecasting for Compound Systems.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013

The S-BPM Architecture: A Framework for Multi-agent Systems.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2013

A Network Modeling and Analysis Tool for Perfectly Secure Communication.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Shared Crowds: A Token-Ring Approach to Hide the Receiver.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

S-BPM Illustrated - A Storybook about Business Process Modeling and Execution.
Springer, ISBN: 978-3-642-36903-2, 2013

2012
Neue Lösungsansätze.
Datenschutz und Datensicherheit, 2012

On Secure Communication over Wireless Sensor Networks.
Proceedings of the SECRYPT 2012, 2012

Anonymous Communication by Branch-and-Bound.
Proceedings of the Seventh International Conference on Availability, 2012

2011
A Unified Framework for the Analysis of Availability, Reliability and Security, With Applications to Quantum Networks.
IEEE Trans. Syst. Man Cybern. Part C, 2011

Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Information-Theoretic Security as an Optimization Problem.
J. Next Gener. Inf. Technol., 2011

Redigierbare Digitale Signaturen - Theorie und Praxis.
Datenschutz und Datensicherheit, 2011

Information-leakage in Hybrid Randomized Protocols.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Towards a Rapid-Alert System for Security Incidents.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011

On Security and Privacy in Cloud Computing.
Proceedings of the CLOSER 2011, 2011

Crowds Based on Secret-Sharing.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Building a Quantum Network: How to Optimize Security and Expenses.
J. Netw. Syst. Manag., 2010

Quantenkryptographie - Überblick und aktuelle Entwicklungen.
Datenschutz und Datensicherheit, 2010

Fusion Discrete Logarithm Problems
CoRR, 2010

Anonymous but Authorized Transactions Supporting Selective Traceability.
Proceedings of the SECRYPT 2010, 2010

Selectively Traceable Anonymous and Unlinkable Token-Based Transactions.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Multipath Authentication without shared Secrets and with Applications in Quantum Networks.
Proceedings of the 2010 International Conference on Security & Management, 2010

Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare.
Proceedings of the Communications and Multimedia Security, 2010

Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication.
Proceedings of the Communications and Multimedia Security, 2010

Non-interactive Information Reconciliation for Quantum Key Distribution.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Quantum Coin-Flipping-Based Authentication.
Proceedings of IEEE International Conference on Communications, 2009

Über Informationstheoretische Sicherheit: Aktuelle Probleme und Lösungen.
Proceedings of the Ausgezeichnete Informatikdissertationen 2009, 2009

How to overcome the 'Trusted Node Model' in Quantum Cryptography.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Security in Quantum Networks as an Optimization Problem.
Proceedings of the The Forth International Conference on Availability, 2009

On Information-Theoretic Security - Contemporary Problems and Solutions.
PhD thesis, 2009

2008
Integration of Ontological Scene Representation and Logic-Based Reasoning for Context-Aware Driver Assistance Systems.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2008

Fusion of an uncalibrated camera with velocity information for distance measurement from a moving camera on highways.
Proceedings of the 5th Workshop on Positioning, Navigation and Communication, 2008

How to protect privacy in floating car data systems.
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008

Towards a game-theoretic model of co-operative context-aware driving under random influences.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2008

Secure Message Relay over Networks with QKD-Links.
Proceedings of the Second International Conference on Quantum, 2008

A Game-Theoretic Approach to Co-operative Context-Aware Driving with Partially Random Behavior.
Proceedings of the Smart Sensing and Context, Third European Conference, 2008

Application framework for high security requirements in R&D environments based on quantum cryptography.
Proceedings of the CRiSIS '08, 2008

A model for ontology-based scene description for context-aware driver assistance systems.
Proceedings of the 1st International ICST Conference on Ambient Media and Systems, 2008

2007
Extrinsic Camera Calibration for an On-board Two-Camera System without overlapping Field of View.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2007

Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Achieving Unconditional Security in Existing Networks Using Quantum Cryptography.
Proceedings of the SECRYPT 2006, 2006


  Loading...