Nils Ole Tippenhauer
Nils Ole Tippenhauer
Faculty, CISPA Helmholtz Center for Information Security
Email confirmado em - Página inicial
Citado por
Citado por
On the requirements for successful GPS spoofing attacks
NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun
Proceedings of the ACM conference on Computer and communications security …, 2011
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis
Y Meidan, M Bohadana, A Shabtai, JD Guarnizo, M Ochoa, ...
Proceedings of the Symposium on Applied Computing (SAC), 506-509, 2017
Limiting the Impact of Stealthy Attacks on Industrial Control Systems
DI Urbina, J Giraldo, AA Cardenas, NO Tippenhauer, J Valente, M Faisal, ...
Conference on Computer and Communications Security (CCS), 2016
SWaT: a water treatment testbed for research and training on ICS security
AP Mathur, NO Tippenhauer
Workshop on Cyber-physical Systems for Smart Water Networks (CySWater), 31-36, 2016
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
J Giraldo, D Urbina, A Cardenas, J Valente, M Faisal, J Ruths, ...
ACM Computing Surveys (CSUR), 2018
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
Attacks on public WLAN-based positioning systems
NO Tippenhauer, KB Rasmussen, C Pöpper, S Čapkun
Proceedings of the conference on Mobile systems, applications, and services …, 2009
Characterizing cyber-physical attacks on water distribution systems
R Taormina, S Galelli, NO Tippenhauer, E Salomons, A Ostfeld
Journal of Water Resources Planning and Management 143 (5), 04017009, 2017
Battle of the attack detection algorithms: Disclosing cyber attacks on water distribution networks
R Taormina, S Galelli, NO Tippenhauer, E Salomons, A Ostfeld, ...
Journal of Water Resources Planning and Management 144 (8), 2018
Low-Complexity Visible Light Networking with LED-to-LED Communication
D Giustiniano, NO Tippenhauer, S Mangold
IFIP Wireless Days, 2012
Siphon: Towards scalable high-interaction physical honeypots
JD Guarnizo, A Tambe, SS Bhunia, M Ochoa, NO Tippenhauer, A Shabtai, ...
Proceedings of the ACM Workshop on Cyber-Physical System Security (CPSS), 57-68, 2017
Iotscanner: Detecting privacy threats in IoT neighborhoods
S Siby, RR Maiti, NO Tippenhauer
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and …, 2017
ID-based secure distance bounding and localization
NO Tippenhauer, S Capkun
European Symposium on Research in Computer Security (ESORICS), 621-636, 2009
MiniCPS: A toolkit for security research on CPS Networks
D Antonioli, NO Tippenhauer
Proceedings of the ACM Workshop on Cyber-Physical Systems-Security and/or …, 2015
Investigation of signal and message manipulations on the wireless channel
C Pöpper, NO Tippenhauer, B Danev, S Capkun
European Symposium on Research in Computer Security (ESORICS), 40-59, 2011
On Limitations of Friendly Jamming for Confidentiality
NO Tippenhauer, L Malisa, A Ranganathan, S Capkun
IEEE Symposium on Security & Privacy, 2013
Integrity Regions: Authentication through presence in wireless networks
S Capkun, M Cagalj, G Karame, NO Tippenhauer
Mobile Computing, IEEE Transactions on 9 (11), 1608-1621, 2010
On attacker models and profiles for cyber-physical systems
M Rocchetto, NO Tippenhauer
European Symposium on Research in Computer Security (ESORICS), 427-449, 2016
On ladder logic bombs in industrial control systems
N Govil, A Agrawal, NO Tippenhauer
Proceedings of the Workshop on the Security of Industrial Control Systems …, 2017
BIAS: bluetooth impersonation attacks
D Antonioli, NO Tippenhauer, K Rasmussen
2020 IEEE Symposium on Security and Privacy (SP), 549-562, 2020
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20