Nils Ole Tippenhauer
Nils Ole Tippenhauer
Faculty, CISPA Helmholtz Center for Information Security
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
On the requirements for successful GPS spoofing attacks
NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun
Proceedings of the ACM conference on Computer and communications security …, 2011
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis
Y Meidan, M Bohadana, A Shabtai, JD Guarnizo, M Ochoa, ...
Proceedings of the Symposium on Applied Computing (SAC), 506-509, 2017
Limiting the Impact of Stealthy Attacks on Industrial Control Systems
DI Urbina, J Giraldo, AA Cardenas, NO Tippenhauer, J Valente, M Faisal, ...
Conference on Computer and Communications Security (CCS), 2016
Attacks on public WLAN-based positioning systems
NO Tippenhauer, KB Rasmussen, C Pöpper, S Čapkun
Proceedings of the conference on Mobile systems, applications, and services …, 2009
SWaT: a water treatment testbed for research and training on ICS security
AP Mathur, NO Tippenhauer
Workshop on Cyber-physical Systems for Smart Water Networks (CySWater), 31-36, 2016
Low-Complexity Visible Light Networking with LED-to-LED Communication
D Giustiniano, NO Tippenhauer, S Mangold
IFIP Wireless Days, 2012
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
J Giraldo, D Urbina, A Cardenas, J Valente, M Faisal, J Ruths, ...
ACM Computing Surveys (CSUR), 2018
ID-based secure distance bounding and localization
NO Tippenhauer, S Capkun
European Symposium on Research in Computer Security (ESORICS), 621-636, 2009
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
Characterizing cyber-physical attacks on water distribution systems
R Taormina, S Galelli, NO Tippenhauer, E Salomons, A Ostfeld
Journal of Water Resources Planning and Management 143 (5), 04017009, 2017
On Limitations of Friendly Jamming for Confidentiality
NO Tippenhauer, L Malisa, A Ranganathan, S Capkun
IEEE Symposium on Security & Privacy, 2013
Investigation of signal and message manipulations on the wireless channel
C Pöpper, NO Tippenhauer, B Danev, S Capkun
European Symposium on Research in Computer Security (ESORICS), 40-59, 2011
Integrity Regions: Authentication through presence in wireless networks
S Capkun, M Cagalj, G Karame, NO Tippenhauer
Mobile Computing, IEEE Transactions on 9 (11), 1608-1621, 2010
Siphon: Towards scalable high-interaction physical honeypots
JD Guarnizo, A Tambe, SS Bhunia, M Ochoa, NO Tippenhauer, A Shabtai, ...
Proceedings of the ACM Workshop on Cyber-Physical System Security (CPSS), 57-68, 2017
Iotscanner: Detecting privacy threats in IoT neighborhoods
S Siby, RR Maiti, NO Tippenhauer
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and …, 2017
MiniCPS: A toolkit for security research on CPS Networks
D Antonioli, NO Tippenhauer
Proceedings of the ACM Workshop on Cyber-Physical Systems-Security and/or …, 2015
Battle of the attack detection algorithms: Disclosing cyber attacks on water distribution networks
R Taormina, S Galelli, NO Tippenhauer, E Salomons, A Ostfeld, ...
Journal of Water Resources Planning and Management 144 (8), 04018048, 2018
Hamids: Hierarchical monitoring intrusion detection system for industrial control systems
HR Ghaeini, NO Tippenhauer
Proceedings of the ACM Workshop on Cyber-Physical Systems Security and …, 2016
Advanced Security Testbed Framework for Wearable IoT Devices
S Siboni, A Shabtai, NO Tippenhauer, J Lee, Y Elovici
Transactions on Internet Technology, 2016
Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed
D Urbina, J Giraldo, NO Tippenhauer, A Cárdenas
Singapore Cyber Security Conference (SG-CRC), 2016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20