Andreas Aßmuth Andreas Aßmuth
  • About me
  • Experience
  • Teaching
  • Publications
  • Projects
  • Contact
  • Publications
    • Cloud Computing 2025, The Sixteenth International Conference on Cloud Computing, GRIDs, and Virtualization
    • Graph of Effort: Quantifying Risk of AI Usage for Vulnerability Assessment
    • Practical Acoustic Eavesdropping On Typed Passphrases
    • IT-Sicherheit und KI
    • DDoS attack detection techniques in IoT networks: a survey
    • Cloud Computing 2024, The Fifteenth International Conference on Cloud Computing, GRIDs, and Virtualization
    • Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis
    • Securing Confidential Data For Distributed Software Development Teams: Encrypted Container File
    • Zuverlässige Kommunikations- und Authentifizierungstechnologien für den BVLOS-Einsatz von Drohnen
    • Cloud Computing 2023, The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization
    • Encrypted Container File: Design and Implementation of a Hybrid-Encrypted Multi-Recipient File Structure
    • Security Challenges for Cloud or Fog Computing-Based AI Applications
    • Security für eingebettete Systeme in kritischen Infrastrukturen: Ergebnisse und Erkenntnisse
    • Cloning Optical Physical Unclonable Functions Using Machine Learning Attacks
    • IT Security of Cloud Services and IoT Devices in Healthcare
    • A Secure and Privacy-Friendly Logging Scheme
    • An Approach for Decentralized Authentication in Networks of UAVs
    • IT Security of Cloud Services and IoT Devices in Healthcare
    • Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices
    • Forschungsprojekt ADACORSA "Airborne data collection on resilient system architectures"
    • Projekt AutoDrive – fail-aware, fail-safe, fail-operational
    • Securing Low-Power Industrial Devices in Critical Infrastructures
    • Cloud Computing 2020, The Eleventh International Conference on Cloud Computing, GRIDs, and Virtualization
    • Securing the Internet of Things from the Bottom Up Using Physical Unclonable Functions
    • Threat Analysis of Industrial Internet of Things Devices
    • Cloud-Backup-Strategien
    • Cloud Computing 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization
    • Cloud Security and Security Challenges revisited
    • PLASMA -- Platform for Service Management in Digital Remote Maintenance Applications
    • Security of Cloud Services with Low-Performance Devices in Critical Infrastructures
    • Analysis of the Internet Security Protocol TLS Version 1.3
    • Sicherheitsprobleme und -herausforderungen beim autonomen Fahren
    • Managing Forensic Recovery in the Cloud
    • Securing 3rd Party App Integration in Docker-based Cloud Software Ecosystems
    • Bedrohungen durch Scheduling-basierende Angriffsszenarien im Automotive-Bereich
    • Forensic Recovery and Intrusion Monitoring in the Cloud
    • Strategies for intrusion monitoring in cloud services
    • Bedrohungslage fahrzeuginterner Kommunikationsnetzwerke und Bus-Systeme
    • Cloud Accounting Systems, the Audit Trail, Forensics and the EU GDPR: How Hard Can It Be?
    • Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors
    • Setting up a Multi-core Computing System for Cryptanalytic Problems and Evaluation of Password Cracking Algorithms
    • Ein Supercomputer für (fast) 0 €
    • Photonenaktivierte Reinigungs- und Oxidationsprozesse für die Nanoelektronik
    • Doping profile dependence of the vertical impact ionization MOSFET’s (I-MOS) performance
    • Laser Activated Radical Generation in Rapid Thermal Processing
    • The role of atomic hydrogen in pre-epitaxial silicon substrate cleaning
  • Courses
    • Digitale Forensik
    • Einführung in die IT-Sicherheit
    • Applied Cryptanalysis
    • Kryptografie
    • Computernetzwerke
    • Grundlagen der Codierungstheorie und Kryptologie
    • Informationssicherheit
    • Mathematik für Ingenieure 1
    • Mathematik für Ingenieure 3
    • Kryptographie
    • Mathematik für Ingenieure 2
    • Moderne Anwendungen der Kryptographie
  • Experience
  • Projects
  • Teaching
  • Projects
    • Studieren im Vereinigten Königreich
    • ADACORSA
    • Intelligente Security für elektrische Stellantriebe und Stromrichter in kritischen Infrastrukturen
    • AutoDrive
    • Multi-Core Safe and Software-intensive Systems Improvement Community
  • Contact
  • Legal Notice (Impressum)
  • Privacy Policy (Datenschutzerklärung)

Cloud Computing 2024, The Fifteenth International Conference on Cloud Computing, GRIDs, and Virtualization

Monday, 01 Apr 2024·
Andreas Aßmuth (Ed.)
,
Sebastian Fischer (Ed.)
,
Christoph P. Neumann (Ed.)
· 0 min read
Cite URL
Type
Book
Publication
IARIA
Last updated on Monday, 01 Apr 2024

← DDoS attack detection techniques in IoT networks: a survey Monday, 01 Jul 2024
Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis Monday, 01 Apr 2024 →

Privacy Policy (Datenschutzerklärung) · Legal Notice (Impressum)

© 2025 by Andreas Aßmuth. This work is licensed under CC BY NC ND 4.0

Published with Hugo Blox Builder — the free, open source website builder that empowers creators.