10 Search Results for "Kargl, Frank"


Document
Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)

Authors: Sven Dietrich, Frank Kargl, Hartmut König, Pavel Laskov, and Artur Hermann

Published in: Dagstuhl Reports, Volume 13, Issue 10 (2024)


Abstract
This report documents the program and the findings of Dagstuhl Seminar 23431 "Network Attack Detection and Defense - AI-Powered Threats and Responses". With the emergence of artificial intelligence (AI), attack detection and defense are taking on a new level of quality. Artificial intelligence will promote further automation of attacks. There are already examples of this, such as the Deep Locker malware. It is expected that we will soon face a situation in which malware and attacks will become more and more automated, intelligent, and AI-powered. Consequently, today’s threat response systems will become more and more inadequate, especially when they rely on manual intervention of security experts and analysts. The main objective of the seminar was to assess the state of the art and potentials that AI advances create for both attackers and defenders. The seminar continued the series of Dagstuhl events "Network Attack Detection and Defense" held in 2008, 2012, 2014, and 2016. The objectives of the seminar were threefold, namely (1) to investigate various scenarios of AI-based malware and attacks, (2) to debate trust in AI and modeling of threats against AI, and (3) to propose methods and strategies for AI-powered network defenses. At the seminar, which brought together participants from academia and industry, we stated that recent advances in artificial intelligence have opened up new possibilities for each of these directions. In general, more and more researchers in networking and security look at AI-based methods which made this a timely event to assess and categorize the state of the art as well as work towards a roadmap for future research. The outcome of the discussions and the proposed research directions are presented in this report.

Cite as

Sven Dietrich, Frank Kargl, Hartmut König, Pavel Laskov, and Artur Hermann. Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431). In Dagstuhl Reports, Volume 13, Issue 10, pp. 90-129, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)


Copy BibTex To Clipboard

@Article{dietrich_et_al:DagRep.13.10.90,
  author =	{Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut and Laskov, Pavel and Hermann, Artur},
  title =	{{Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)}},
  pages =	{90--129},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2024},
  volume =	{13},
  number =	{10},
  editor =	{Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut and Laskov, Pavel and Hermann, Artur},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.13.10.90},
  URN =		{urn:nbn:de:0030-drops-198365},
  doi =		{10.4230/DagRep.13.10.90},
  annote =	{Keywords: artificial intelligence, cybersecurity, intrusion detection, machine learning}
}
Document
Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242)

Authors: Frank Kargl, Ioannis Krontiris, Jason Millar, André Weimerskirch, and Kevin Gomez

Published in: Dagstuhl Reports, Volume 13, Issue 6 (2024)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 23242 "Privacy Protection of Automated and Self-Driving Vehicles". While privacy for connected vehicles has been considered for many years, automated and autonomous vehicles (AV) technology is still in its infancy and the privacy and data protection aspects for AVs are not well addressed. Their capabilities pose new challenges to privacy protection, given the large sensor arrays that collect data in public spaces and the integration of AI technology. During the seminar, several keynote presentations highlighted the research challenges from different perspectives, i.e. legal, ethical, and technological. It was also discussed extensively why vehicles need to make dynamic assessments of trust as an enabling factor for the secure communication and data sharing with other vehicles, but without increasing any privacy risks. Then, the main objective of the seminar was to produce a research road-map to address the major road-blockers in making progress on the way to deployment of privacy protection in automated and autonomous vehicles. First, the group identified six common scenarios of Cooperative, Connected and Automated Mobility (CCAM) during development and product life-cycle, and analyzed the privacy implications for each scenario. Second, it formulated the need to have a methodology to determine the cost-benefit trade-offs between privacy and other criteria like financial, usability, or safety. Third, it identified existing tools, frameworks, and PETs, and potential modifications that are needed to support the automotive industry and automotive scenarios. Finally, the group explored the interplay between privacy and trust, by elaborating on different trust properties based on performance, on ethical aspects, and on user acceptance.

Cite as

Frank Kargl, Ioannis Krontiris, Jason Millar, André Weimerskirch, and Kevin Gomez. Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242). In Dagstuhl Reports, Volume 13, Issue 6, pp. 22-54, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)


Copy BibTex To Clipboard

@Article{kargl_et_al:DagRep.13.6.22,
  author =	{Kargl, Frank and Krontiris, Ioannis and Millar, Jason and Weimerskirch, Andr\'{e} and Gomez, Kevin},
  title =	{{Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242)}},
  pages =	{22--54},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2024},
  volume =	{13},
  number =	{6},
  editor =	{Kargl, Frank and Krontiris, Ioannis and Millar, Jason and Weimerskirch, Andr\'{e} and Gomez, Kevin},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.13.6.22},
  URN =		{urn:nbn:de:0030-drops-196375},
  doi =		{10.4230/DagRep.13.6.22},
  annote =	{Keywords: Automotive Security and Privacy, Privacy and Data Protection, Cooperative Connected and Automated Mobility}
}
Document
Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042)

Authors: Frank Kargl, Ioannis Krontiris, André Weimerskirch, Ian Williams, and Nataša Trkulja

Published in: Dagstuhl Reports, Volume 12, Issue 1 (2022)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 22042 "Privacy Protection of Automated and Self-Driving Vehicles". The Seminar reviewed existing privacy-enhancing technologies, standards, tools, and frameworks for protecting personal information in the context of automated and self-driving vehicles (AVs). We specifically focused on where such existing techniques clash with requirements of an AV and its data processing and identified the major road blockers on the way to deployment of privacy protection in AVs from a legal, technical, business and ethical perspective. Therefore, the seminar took an interdisciplinary approach involving autonomous and connected driving, privacy protection, and legal data protection experts. This report summarizes the discussions and findings during the seminar, includes the abstracts of talks, and includes a report from the working groups.

Cite as

Frank Kargl, Ioannis Krontiris, André Weimerskirch, Ian Williams, and Nataša Trkulja. Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042). In Dagstuhl Reports, Volume 12, Issue 1, pp. 83-100, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2022)


Copy BibTex To Clipboard

@Article{kargl_et_al:DagRep.12.1.83,
  author =	{Kargl, Frank and Krontiris, Ioannis and Weimerskirch, Andr\'{e} and Williams, Ian and Trkulja, Nata\v{s}a},
  title =	{{Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042)}},
  pages =	{83--100},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2022},
  volume =	{12},
  number =	{1},
  editor =	{Kargl, Frank and Krontiris, Ioannis and Weimerskirch, Andr\'{e} and Williams, Ian and Trkulja, Nata\v{s}a},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.12.1.83},
  URN =		{urn:nbn:de:0030-drops-169220},
  doi =		{10.4230/DagRep.12.1.83},
  annote =	{Keywords: automotive security and privacy, privacy and data protection}
}
Document
Network Attack Detection and Defense (Dagstuhl Seminar 16361)

Authors: Marc C. Dacier, Sven Dietrich, Frank Kargl, and Hartmut König

Published in: Dagstuhl Reports, Volume 6, Issue 9 (2017)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 16361 "Network Attack Detection and Defense: Security Challenges and Opportunities of Software-Defined Networking". Software-defined networking (SDN) has attracted a great attention both in industry and academia since the beginning of the decade. This attention keeps undiminished. Security-related aspects of software-defined networking have only been considered more recently. Opinions differ widely. The main objective of the seminar was to discuss the various contrary facets of SDN security. The seminar continued the series of Dagstuhl events Network Attack Detection and Defense held in 2008, 2012, and 2014. The objectives of the seminar were threefold, namely (1) to discuss the security challenges of SDN, (2) to debate strategies to monitor and protect SDN-enabled networks, and (3) to propose methods and strategies to leverage on the flexibility brought by SDN for designing new security mechanisms. At the seminar, which brought together participants from academia and industry, we discussed the advantages and disadvantages of using software-defined networks from the security point of view. We agreed that SDN provides new possibilities to better secure networks, but also offers a number of serious security problems which require further research. The outcome of these discussions and the proposed research directions are presented in this report.

Cite as

Marc C. Dacier, Sven Dietrich, Frank Kargl, and Hartmut König. Network Attack Detection and Defense (Dagstuhl Seminar 16361). In Dagstuhl Reports, Volume 6, Issue 9, pp. 1-28, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2017)


Copy BibTex To Clipboard

@Article{dacier_et_al:DagRep.6.9.1,
  author =	{Dacier, Marc C. and Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut},
  title =	{{Network Attack Detection and Defense (Dagstuhl Seminar 16361)}},
  pages =	{1--28},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2017},
  volume =	{6},
  number =	{9},
  editor =	{Dacier, Marc C. and Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.6.9.1},
  URN =		{urn:nbn:de:0030-drops-69122},
  doi =		{10.4230/DagRep.6.9.1},
  annote =	{Keywords: attack detection, denial-of-service attack detection and response, intrusion detection, malware assessment, network monitoring, openflow protocol, programmable networks, security, software-defined networking, targeted attacks, vulnerability analysis}
}
Document
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)

Authors: Marc Dacier, Frank Kargl, Hartmut König, and Alfonso Valdes

Published in: Dagstuhl Reports, Volume 4, Issue 7 (2014)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 14292 "Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures". The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It is the sequel of several previous Dagstuhl seminars: (1) the series "Network Attack Detection and Defense" held in 2008 and 2012, and (2) the Dagstuhl seminar "Securing Critical Infrastructures from Targeted Attacks", held in 2012. At the seminar, which brought together members from academia an industry, appropriate methods for detecting attacks on industrial control systems (ICSs) and for limiting the impact on the physical components were considered. A central question was whether and how reactive security mechanisms can be made more ICS- and process-aware. To some extent it seems possible to adopt existing security approaches from other areas (e.g., conventional networks, embedded systems, or sensor networks). The main question is whether adopting these approaches is sufficient to reach the desired level of security for ICSs. Detecting attacks to the physical components and appropriate reactions to attacks are new aspects that need to be considered as well. The main result of the seminar is a list of recommendations for future directions in ICS security that is presented in this report.

Cite as

Marc Dacier, Frank Kargl, Hartmut König, and Alfonso Valdes. Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292). In Dagstuhl Reports, Volume 4, Issue 7, pp. 62-79, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)


Copy BibTex To Clipboard

@Article{dacier_et_al:DagRep.4.7.62,
  author =	{Dacier, Marc and Kargl, Frank and K\"{o}nig, Hartmut and Valdes, Alfonso},
  title =	{{Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)}},
  pages =	{62--79},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2014},
  volume =	{4},
  number =	{7},
  editor =	{Dacier, Marc and Kargl, Frank and K\"{o}nig, Hartmut and Valdes, Alfonso},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.4.7.62},
  URN =		{urn:nbn:de:0030-drops-47912},
  doi =		{10.4230/DagRep.4.7.62},
  annote =	{Keywords: Security, Intrusion Detection, Critical Infrastructures, Industrial Control Systems, SCADA, Vulnerability Analysis, Malware Assessment, Attack Response and Countermeasures}
}
Document
Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502)

Authors: Marc Dacier, Frank Kargl, and Alfonso Valdes

Published in: Dagstuhl Reports, Volume 2, Issue 12 (2013)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 12502 "Securing Critical Infrastructures from Targeted Attacks". Through a series of presentations, discussions, and working group meetings, the seminar achieved to shape a clearer picture of what actually constitutes a targeted attack on a critical infrastructure and defined the terms PEST (persistent, sophisticated and targeted) attacks and Critical Cyber Infrastructure in this context. This clearer view will hopefully help the research community and industry to address such threats in a more consistent and holistic way.

Cite as

Marc Dacier, Frank Kargl, and Alfonso Valdes. Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502). In Dagstuhl Reports, Volume 2, Issue 12, pp. 49-63, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{dacier_et_al:DagRep.2.12.49,
  author =	{Dacier, Marc and Kargl, Frank and Valdes, Alfonso},
  title =	{{Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502)}},
  pages =	{49--63},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{12},
  editor =	{Dacier, Marc and Kargl, Frank and Valdes, Alfonso},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.2.12.49},
  URN =		{urn:nbn:de:0030-drops-39894},
  doi =		{10.4230/DagRep.2.12.49},
  annote =	{Keywords: Critical Infrastructures, Targeted Attacks, Security}
}
Document
10402 Abstracts Collection and Executive Summary – Inter-Vehicular Communication

Authors: Falko Dressler, Frank Kargl, Jörg Ott, Ozan K. Tonguz, and Lars Wischhof

Published in: Dagstuhl Seminar Proceedings, Volume 10402, Inter-Vehicular Communication (2011)


Abstract
From October 3 to October 6, 2010, the Dagstuhl Seminar 10402 ``Inter-Vehicular Communication'' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar are put together in this paper. The first section describes the seminar topics and goals in general.

Cite as

Falko Dressler, Frank Kargl, Jörg Ott, Ozan K. Tonguz, and Lars Wischhof. 10402 Abstracts Collection and Executive Summary – Inter-Vehicular Communication. In Inter-Vehicular Communication. Dagstuhl Seminar Proceedings, Volume 10402, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)


Copy BibTex To Clipboard

@InProceedings{dressler_et_al:DagSemProc.10402.1,
  author =	{Dressler, Falko and Kargl, Frank and Ott, J\"{o}rg and Tonguz, Ozan K. and Wischhof, Lars},
  title =	{{10402 Abstracts Collection and Executive Summary – Inter-Vehicular Communication}},
  booktitle =	{Inter-Vehicular Communication},
  pages =	{1--7},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2011},
  volume =	{10402},
  editor =	{Falko Dressler and Frank Kargl and J\"{o}rg Ott and Ozan K. Tonguz and Lars Wischhof},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10402.1},
  URN =		{urn:nbn:de:0030-drops-29299},
  doi =		{10.4230/DagSemProc.10402.1},
  annote =	{Keywords: Inter-Vehicular Communication, Car-2-Car, Car-2-X, Intelligent Transportation Systems}
}
Document
10402 Report – Working Group on Communication Patterns

Authors: Claudio Casetti, Falko Dressler, Lars Eggert, Felix Schmidt-Eisenlohr, Jerome Haerri, Ozan K. Tonguz, Jörg Ott, and Lars Wischhof

Published in: Dagstuhl Seminar Proceedings, Volume 10402, Inter-Vehicular Communication (2011)


Abstract
The objective of the working group communication patterns during the Dagstuhl Seminar on Vehicular Networks has been to review the current status of the communication patterns and principles and discuss the upcoming challenges the community will face in the near future. This is an executive summary of the discussions during the sessions.

Cite as

Claudio Casetti, Falko Dressler, Lars Eggert, Felix Schmidt-Eisenlohr, Jerome Haerri, Ozan K. Tonguz, Jörg Ott, and Lars Wischhof. 10402 Report – Working Group on Communication Patterns. In Inter-Vehicular Communication. Dagstuhl Seminar Proceedings, Volume 10402, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)


Copy BibTex To Clipboard

@InProceedings{casetti_et_al:DagSemProc.10402.2,
  author =	{Casetti, Claudio and Dressler, Falko and Eggert, Lars and Schmidt-Eisenlohr, Felix and Haerri, Jerome and Tonguz, Ozan K. and Ott, J\"{o}rg and Wischhof, Lars},
  title =	{{10402 Report – Working Group on Communication Patterns}},
  booktitle =	{Inter-Vehicular Communication},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2011},
  volume =	{10402},
  editor =	{Falko Dressler and Frank Kargl and J\"{o}rg Ott and Ozan K. Tonguz and Lars Wischhof},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10402.2},
  URN =		{urn:nbn:de:0030-drops-29287},
  doi =		{10.4230/DagSemProc.10402.2},
  annote =	{Keywords: V2V, communication principles}
}
Document
10402 Report – Working Group on Fundamental Limits and Opportunities

Authors: Hannes Hartenstein, Geert Heijenk, Martin Mauve, Björn Scheuermann, and Lars Wolf

Published in: Dagstuhl Seminar Proceedings, Volume 10402, Inter-Vehicular Communication (2011)


Abstract
This working group investigated first steps towards finding a theoretical foundation for inter-vehicle communication. The main outcome is a sketch of a roadmap for future work in this direction.

Cite as

Hannes Hartenstein, Geert Heijenk, Martin Mauve, Björn Scheuermann, and Lars Wolf. 10402 Report – Working Group on Fundamental Limits and Opportunities. In Inter-Vehicular Communication. Dagstuhl Seminar Proceedings, Volume 10402, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)


Copy BibTex To Clipboard

@InProceedings{hartenstein_et_al:DagSemProc.10402.3,
  author =	{Hartenstein, Hannes and Heijenk, Geert and Mauve, Martin and Scheuermann, Bj\"{o}rn and Wolf, Lars},
  title =	{{10402 Report – Working Group on Fundamental Limits and Opportunities}},
  booktitle =	{Inter-Vehicular Communication},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2011},
  volume =	{10402},
  editor =	{Falko Dressler and Frank Kargl and J\"{o}rg Ott and Ozan K. Tonguz and Lars Wischhof},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10402.3},
  URN =		{urn:nbn:de:0030-drops-29266},
  doi =		{10.4230/DagSemProc.10402.3},
  annote =	{Keywords: Inter-Vehicle Communication, Car-to-X Communication, Fundamental Limits}
}
Document
10402 Report – Working Group on Security and Privacy

Authors: Frank Kargl, Levente Buttyan, David Eckhoff, Panagiotis Papadimitratos, and Elmar Schoch

Published in: Dagstuhl Seminar Proceedings, Volume 10402, Inter-Vehicular Communication (2011)


Abstract
In the security working group, participants created an overview map of current topics in IVC security and privacy research that also includes an estimate of maturity of certain topics.

Cite as

Frank Kargl, Levente Buttyan, David Eckhoff, Panagiotis Papadimitratos, and Elmar Schoch. 10402 Report – Working Group on Security and Privacy. In Inter-Vehicular Communication. Dagstuhl Seminar Proceedings, Volume 10402, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)


Copy BibTex To Clipboard

@InProceedings{kargl_et_al:DagSemProc.10402.4,
  author =	{Kargl, Frank and Buttyan, Levente and Eckhoff, David and Papadimitratos, Panagiotis and Schoch, Elmar},
  title =	{{10402 Report – Working Group on Security and Privacy}},
  booktitle =	{Inter-Vehicular Communication},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2011},
  volume =	{10402},
  editor =	{Falko Dressler and Frank Kargl and J\"{o}rg Ott and Ozan K. Tonguz and Lars Wischhof},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10402.4},
  URN =		{urn:nbn:de:0030-drops-29275},
  doi =		{10.4230/DagSemProc.10402.4},
  annote =	{Keywords: IVC, C2X, VANET, security, privacy}
}
  • Refine by Author
  • 8 Kargl, Frank
  • 3 König, Hartmut
  • 2 Dacier, Marc
  • 2 Dietrich, Sven
  • 2 Dressler, Falko
  • Show More...

  • Refine by Classification
  • 2 Security and privacy → Human and societal aspects of security and privacy
  • 2 Security and privacy → Privacy protections
  • 2 Security and privacy → Privacy-preserving protocols
  • 1 Networks → Network security
  • 1 Security and privacy → Intrusion/anomaly detection and malware mitigation
  • Show More...

  • Refine by Keyword
  • 2 Critical Infrastructures
  • 2 Security
  • 2 intrusion detection
  • 2 security
  • 1 Attack Response and Countermeasures
  • Show More...

  • Refine by Type
  • 10 document

  • Refine by Publication Year
  • 4 2011
  • 2 2024
  • 1 2013
  • 1 2014
  • 1 2017
  • Show More...

Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail