Andreas Aßmuth
Open Menu
Close Menu
About me
Experience
Teaching
Publications
Projects
Contact
Publications
Amir Pakmehr
,
Andreas Aßmuth
,
Negar Taheri
,
Ali Ghaffari
(2024).
DDoS attack detection techniques in IoT networks: a survey
.
Cluster Computing
.
Cite
DOI
Pitpimon Choorod
,
Tobias J. Bauer
,
Andreas Aßmuth
(2024).
Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis
.
Cloud Computing 2024, The Fifteenth International Conference on Cloud Computing, GRIDs, and Virtualization
.
Cite
DOI
Andreas Aßmuth
,
Sebastian Fischer
,
Christoph P. Neumann
(2024).
Cloud Computing 2024, The Fifteenth International Conference on Cloud Computing, GRIDs, and Virtualization
.
IARIA
.
Cite
Tobias J. Bauer
,
Andreas Aßmuth
(2024).
Securing Confidential Data For Distributed Software Development Teams: Encrypted Container File
.
International Journal On Advances in Security
.
Cite
DOI
Amir Pakmehr
,
Andreas Aßmuth
,
Christoph P. Neumann
,
Gerald Pirkl
(2023).
Security Challenges for Cloud or Fog Computing-Based AI Applications
.
Cloud Computing 2023, The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization
.
Cite
DOI
Tobias J. Bauer
,
Andreas Aßmuth
(2023).
Encrypted Container File: Design and Implementation of a Hybrid-Encrypted Multi-Recipient File Structure
.
Cloud Computing 2023, The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization
.
Cite
DOI
Andreas Aßmuth
(2023).
Cloud Computing 2023, The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization
.
IARIA
.
Cite
Simon Liebl
,
Andreas Aßmuth
,
Matthias Söllner
(2023).
Security für eingebettete Systeme in kritischen Infrastrukturen: Ergebnisse und Erkenntnisse
.
Cite
Michael Gleißner
,
Johannes Dotzler
,
Juliana Hartig
,
Andreas Aßmuth
,
Clemens Bulitta
,
Steffen Hamm
(2022).
IT Security of Cloud Services and IoT Devices in Healthcare
.
International Journal On Advances in Security
.
Cite
Leah Lathrop
,
Andreas Aßmuth
,
Matthias Söllner
(2022).
Cloning Optical Physical Unclonable Functions Using Machine Learning Attacks
.
Cite
Next »