Vars: A vehicle ad-hoc network reputation system F Dotzer, L Fischer, P Magiera Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005 | 252 | 2005 |
Secure revocable anonymous authenticated inter-vehicle communication (SRAAC) L Fischer, A Aijaz, C Eckert, D Vogt 4th Conference on Embedded Security in Cars (ESCAR 2006), Berlin, Germany 148, 2006 | 62 | 2006 |
Measuring unlinkability revisited L Fischer, S Katzenbeisser, C Eckert Proceedings of the 7th ACM workshop on Privacy in the electronic society …, 2008 | 39 | 2008 |
The MANTICORE project: providing users with a logical IP network service E Grasa, X Hesselbach, S Figuerola, V Reijs, D Wilson, JM Uzé, L Fischer, ... TERENA Networking Conference (5/2008), 2008 | 27 | 2008 |
Adversarial resilience learning-towards systemic vulnerability analysis for large and complex systems L Fischer, JM Memmen, E Veith, M Tröschel arXiv preprint arXiv:1811.06447, 2018 | 26 | 2018 |
Analyzing cyber-physical systems from the perspective of artificial intelligence EMSP Veith, L Fischer, M Tröschel, A Nieße Proceedings of the 2019 International Conference on Artificial Intelligence …, 2019 | 25 | 2019 |
Trust, security and privacy in vanets a multilayered security architecture for c2c-communication F Stumpf, L Fischer, C Eckert VDI BERICHTE 2016, 55, 2007 | 20 | 2007 |
Context-aware, trust-based access control for the di. me userware M Heupel, L Fischer, D Kesdogan, M Bourimi, S Scerri, F Hermann, ... 2012 5th International Conference on New Technologies, Mobility and Security …, 2012 | 16 | 2012 |
Study on the evaluation of risks of cyber-incidents and on costs of preventing cyber-incidents in the energy sector L Fischer, M Uslar, D Morrill, M Döring, E Haesen European Commission: Berlin, Germany 6, 41, 2018 | 14 | 2018 |
Analyzing power grid, ict, and market without domain knowledge using distributed artificial intelligence E Veith, S Balduin, N Wenninghoff, M Tröschel, L Fischer, A Nieße, ... arXiv preprint arXiv:2006.06074, 2020 | 12 | 2020 |
Service composition with consideration of interdependent security objectives F Karatas, L Fischer, D Kesdogan Science of Computer Programming 97, 183-201, 2015 | 11 | 2015 |
IT security for functional resilience in energy systems: effect-centric IT security L Fischer, S Lehnhoff Handbook on Resilience of Socio-Technical Systems, 316-340, 2019 | 10 | 2019 |
Protecting integrity and secrecy of mobile agents on trusted and non-trusted agent places L Fischer University of Bremen, 2003 | 10 | 2003 |
Robust and deterministic scheduling of power grid actors E Frost, EMSP Veith, L Fischer 2020 7th International Conference on Control, Decision and Information …, 2020 | 9 | 2020 |
Building federated research networks in Europe L Fischer, B Belter, M Przywecki, M Cosin, P Van Daalen, M Kaat, I Golub, ... Terena Networking Conference. Prague, Czech Republic, 1-13, 2010 | 7 | 2010 |
Enhancing privacy in collaborative scenarios utilising a flexible proxy layer L Fischer, M Heupel, M Bourimi, D Kesdogan, R Gimenez The First International Conference on Future Generation Communication …, 2012 | 6 | 2012 |
Incremental development of a co-simulation setup for testing a generation unit controller for reactive power provision J Velasquez, K Piech, S Lehnhoff, L Fischer, S Garske Computer Science-Research and Development 32, 3-12, 2017 | 5 | 2017 |
Ontology-enabled access control and privacy recommendations M Heupel, L Fischer, M Bourimi, S Scerri International Workshop on Mining Ubiquitous and Social Environments, 35-54, 2013 | 5 | 2013 |
A trust model in control systems to enhance and support cybersecurity B Siemers, L Fischer, S Lehnhoff 2022 IEEE 7th International Energy Conference (ENERGYCON), 1-6, 2022 | 4 | 2022 |
Performance testing smart grid applications using a distributed co-simulation approach F Schloegl, M Buescher, K Diwold, S Lehnhoff, L Fischer, F Zeilinger, ... IECON 2016-42nd Annual Conference of the IEEE Industrial Electronics Society …, 2016 | 4 | 2016 |