Nothing Special   »   [go: up one dir, main page]

Follow
Carsten Rudolph
Title
Cited by
Cited by
Year
Backdoor attacks against transfer learning with pre-trained deep learning models
S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen
IEEE Transactions on Services Computing 15 (3), 1526-1539, 2020
1172020
Towards an improved understanding of human factors in cybersecurity
J Jeong, J Mihelcic, G Oliver, C Rudolph
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
1152019
On the security of fair non-repudiation protocols
S Gürgens, C Rudolph, H Vogt
International Conference on Information Security, 193-207, 2003
1032003
Security evaluation of scenarios based on the TCG’s TPM specification
S Gürgens, C Rudolph, D Scheuermann, M Atts, R Plaga
Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007
832007
Security analysis of (un-) fair non-repudiation protocols
S Gürgens, C Rudolph
Formal Aspects of Computing, 97-114, 2003
762003
Can I trust the data I see? A Physician's concern on medical data in IoT health architectures
FT Jaigirdar, C Rudolph, C Bain
Proceedings of the Australasian computer science week multiconference, 1-10, 2019
682019
Security of digital evidence
J Richter, N Kuntze, C Rudolph
Systematic Approaches to Digital Forensic Engineering (SADFE), 2010 Fifth …, 2010
662010
Covert identity information in direct anonymous attestation (DAA)
C Rudolph
New Approaches for Security, Privacy and Trust in Complex Environments …, 2007
562007
On a formal framework for security properties
S Gürgens, P Ochsenschläger, C Rudolph
Computer Standards & Interfaces 27 (5), 457-466, 2005
532005
A user-centric privacy manager for future energy systems
HS Fhom, N Kuntze, C Rudolph, M Cupelli, J Liu, A Monti
2010 International Conference on Power System Technology, 1-7, 2010
482010
Towards a blockchain based fall prediction model for aged care
T Rupasinghe, F Burstein, C Rudolph, S Strange
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2019
432019
A business process-driven approach to security engineering
A Mana, JA Montenegro, C Rudolph, JL Vivas
14th International Workshop on Database and Expert Systems Applications …, 2003
402003
Role based specification and security analysis of cryptographic protocols using asynchronous product automata
S Gurgens, P Ochsenschlager, C Rudolph
Proceedings. 13th International Workshop on Database and Expert Systems …, 2002
352002
High impact false data injection attack against real-time pricing in smart grids
T Dayaratne, C Rudolph, A Liebman, M Salehi, S He
2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 1-5, 2019
302019
Secure digital chains of evidence
N Kuntze, C Rudolph
2011 Sixth IEEE International Workshop on Systematic Approaches to Digital …, 2011
302011
A formal notion of trust–enabling reasoning about security properties
A Fuchs, S Gürgens, C Rudolph
Trust Management IV: 4th IFIP WG 11.11 International Conference, IFIPTM 2010 …, 2010
302010
Authenticity and provability—a formal framework
S Gürgens, P Ochsenschläger, C Rudolph
Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK …, 2002
302002
Cyber attacks in transactive energy market-based microgrid systems
R Dasgupta, A Sakzad, C Rudolph
Energies 14 (4), 1137, 2021
282021
Towards semantic resolution of security in ambient environments
A Maña, C Rudolph, M Hoffmann, A Badii, S Engberg, R Nair, D Thiemert, ...
Developing Ambient Intelligence: Proceedings of the International Conference …, 2008
282008
False data injection attack detection for secure distributed demand response in smart grids
T Dayaratne, M Salehi, C Rudolph, A Liebman
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
272022
The system can't perform the operation now. Try again later.
Articles 1–20