Publications

(2025). Practical Acoustic Eavesdropping On Typed Passphrases. Cloud Computing 2025, The Sixteenth International Conference on Cloud Computing, GRIDs, and Virtualization.
(2025). Graph of Effort: Quantifying Risk of AI Usage for Vulnerability Assessment. Cloud Computing 2025, The Sixteenth International Conference on Cloud Computing, GRIDs, and Virtualization.
(2025). Cloud Computing 2025, The Sixteenth International Conference on Cloud Computing, GRIDs, and Virtualization. IARIA.
(2025). IT-Sicherheit und KI. Forschungsbericht 2025 der OTH Amberg-Weiden.
(2024). DDoS attack detection techniques in IoT networks: a survey. Cluster Computing.
(2024). Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis. Cloud Computing 2024, The Fifteenth International Conference on Cloud Computing, GRIDs, and Virtualization.
(2024). Cloud Computing 2024, The Fifteenth International Conference on Cloud Computing, GRIDs, and Virtualization. IARIA.
(2024). Zuverlässige Kommunikations- und Authentifizierungstechnologien für den BVLOS-Einsatz von Drohnen. Forschungsbericht 2024 der OTH Amberg-Weiden.
(2024). Securing Confidential Data For Distributed Software Development Teams: Encrypted Container File. International Journal On Advances in Security.
(2023). Security Challenges for Cloud or Fog Computing-Based AI Applications. Cloud Computing 2023, The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization.