2016

 
Navigation zeitlicher Zustände von Graphen. Torben Tietze. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2016. [ bib ]
 
Implementierung eines angepassten hierarchischen 2D-Graphlayout-Verfahrens zur Darstellung der Netzwerksicherheit. Sunni Hu. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2016. [ bib ]
 
Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources. Volker Ahlers, Felix Heine, Bastian Hellmann, Carsten Kleiner, Leonard Renners, Thomas Rossow, and Ralf Steuerwald. In Sjouke Mauw, Barbara Kordy, and Sushil Jajodia, editors, Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers, pages 18--34. Springer International Publishing, Cham, 2016. [ bib | DOI | http ]
 
Darstellung von Netzwerksicherheits-Policies und Verknüpfung von Auswertungsergebnissen. Marcel Reichenbach. Master's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2016. [ bib ]

2015

 
Visualization of Network Security Policy Evaluation. Bastian Hellmann, Marcel Reichenbach, Leonard Renners, and Volker Ahlers. In Poster presented at the 12th IEEE Symposium on Visualization for Cyber Security (VizSec), Chicago, IL, USA, Chicago, October 26th 2015. IEEE. http://vizsec.org/. [ bib | .pdf ]
 
Erweiterung der 2D-Graphlayout-Verfahren einer Software zur Visualisierung der Netzwerksicherheit. Junbiao Wu. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2015. [ bib ]
 
SIEM Approach for a Higher Level of IT Security in Enterprise Networks. Kai-Oliver Detken, Thomas Rix, Carsten Kleiner, Bastian Hellmann, and Leonard Renners. In Proceedings of the 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). Institute of Electrical and Electronics Engineers, Warsaw, September 24th till September 26th 2015. http://idaacs.net/2015/. [ bib ]
 
Event-Korrelation in SIEM-Systemen auf Basis von IF-MAP. Kai-Oliver Detken, Felix Heine, Thomas Rix, and Leonard Renners. In Peter Schartner, Kerstin Lemke-Rust, and Markus Ullmann, editors, D.A.CH Security 2015: Bestandsaufnahme, Konzepte, Anwendungen und Perspektiven. syssec-Verlag, Bonn, September 8th and September 9th 2015. http://www.syssec.at/dachsecurity2015/. [ bib ]
 
Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System. Kai-Oliver Detken, Bastian Hellmann, and Dirk Scheuermann. In Y. Tan, Y. Shi, F. Buarque, A. Gelbukh, S. Das, and A. Engelbrecht, editors, The Sixth International Conference on Swarm Intelligence - The Second BRICS Congress on Computational Intelligence (ICSI-CCI) 2015, Advanced in Swarm and Computational Intelligence, Proceedings Part II, pages 439--453. Springer, Beijing, June 25th till June 28th 2015. http://www.ic-si.org/2015/. [ bib ]
 
Near real-time network security with an IF-MAP-based SIEM approach, Kai-Oliver Detken, Carsten Kleiner, Thomas Rix, Bastian Hellmann, and Leonard Renners. April 20th 2015. Demonstration at the TCG associated seminar “Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions” during the RSA conference, San Francisco, USA, with partner DECOIT GmbH, http://www.trustedcomputinggroup.org/media_room/events/182. [ bib | .pdf ]
 
BYOD solution well in hand: standards-based mobile security, Lisa Lorenzin, Kai-Oliver Detken, and Leonard Renners. April 20th 2015. Demonstration at the TCG associated seminar “Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions” during the RSA conference, San Francisco, USA, with partners Pulse Secure and DECOIT GmbH, http://www.trustedcomputinggroup.org/media_room/events/182. [ bib | .pdf ]
 
JavaScript-Frontend für die Visualisierung von IF-MAP-Metadatengraphen. Sören Grzanna. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2015. [ bib ]
 
Realisierung einer mobilen App zur gestengesteuerten Interaktion von Metadatengraphen. Daniel Hülse. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2015. [ bib ]
 
Complex Event Processing im Kontext eines IF-MAP Clients auf mobilen Geräten (Android). Michael Felchner. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2015. [ bib | .pdf ]
 
Entwicklung eines IF-MAP Clients für Nmap Portscan-Ergebnisse. Arne Loth. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2015. [ bib ]

2014

 
SIEM-Ansätze zur Erhöhung der IT-Sicherheit auf Basis von IF-MAP. Kai-Oliver Detken, Thomas Rossow, and Ralf Steuerwald. In Peter Schartner and Peter Lipp, editors, D.A.CH Security 2014: Bestandsaufnahme, Konzepte, Anwendungen und Perspektiven. syssec-Verlag, Graz, September 16th and September 17th 2014. [ bib ]
 
Replicable Security Monitoring: Visualizing time-variant Graphs of Network Metadata. Volker Ahlers, Felix Heine, Bastian Hellmann, Carsten Kleiner, Leonard Renners, Thomas Rossow, and Ralf Steuerwald. In Jim Burton, Gem Stapleton, and Karsten Klein, editors, Joint Proceedings of the Fourth International Workshop on Euler Diagrams (ED 2014) and the First International Workshop on Graph Visualization in Practice (GViP 2014) co-located with Diagrams 2014, number 1244 in CEUR Workshop Proceedings, pages 32--41, Melbourne, July 28th and 1st August 2014. http://ceur-ws.org/. [ bib | .pdf ]
 
Near Real-time Security with Open Source Tools, Josef von Helden, Bastian Hellmann, Thomas Rossow, Ralf Steuerwald, Andreas Steffen, Kai-Oliver Detken, and Dennis Dunekacke. February 24th 2014. Demonstration at the TCG associated seminar “Get proactive with security” during the RSA conference, San Francisco, USA, with partners DECOIT GmbH and University of Applied Sciences in Rapperswil, http://www.trustedcomputinggroup.org/resources/rsa_conference_2014_get_proactive_with_security. [ bib | .pdf ]
 
Bewegungssteuerung einer Anwendung zur Visualisierung der Sicherheit mobiler IT-Infrastrukturen. Oleg Wetzler. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2014. [ bib ]
 
MAP-Client für generische Logging-Ausgaben. Johannes Busch. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2014. [ bib ]

2013

 
Trust@FHH - IF-MAP Research Projects and Open Source Software. Josef von Helden. Talk given at the TCG Members Meeting 2013, Dublin, 2013. [ bib | .pdf ]
 
TPM 2.0, UEFI and their Impact on Security and Users’ Freedom. Thomas Rossow. Master's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2013. [ bib | .pdf ]
 
Eine GUI für irondetect auf Android-Smartphones. Marcel Reichenbach. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2013. [ bib ]
 
Überprüfung der Gültigkeit von IF-MAP-Graphen. Anton Saenko. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2013. [ bib | .pdf ]
 
Analyse des Zusammenspiels von IF-MAP und OpenFlow. Till Gigla. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2013. [ bib ]
 
Konzeption und Realisierung eines Labors für Trusted Computing Technologien. Alexander Subbotin. Master's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2013. [ bib ]

2012

 
Developement Of An Android Usage Study System. Tobias Ruhe. Master's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2012. [ bib | .pdf ]
 
A Component-Based Trojan Framework for Android. Waldemar Bender. Master's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2012. [ bib | .pdf ]
 
Analyse und Implementierung des IF-MAP 2.1 Protokolls. Joram Knaack. Bachelors's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2012. [ bib | .pdf ]
 
Trusted service access with dynamic security infrastructure configuration. Ronald Marx, Nicolai Kuntze, Carsten Rudolph, Ingo Bente, and Joerg Vieweg. In Communications (APCC), 2012 18th Asia-Pacific Conference on, pages 730--735. IEEE, 2012. [ bib ]
 
Trust@FHH - IF-MAP Research Projects and Open Source Software. Josef von Helden. Talk given at the TCG Members Meeting 2012, Madrid, 2012. [ bib | .pdf ]
 
On Remote Attestation for Google Chrome OS. Ingo Bente, Bastian Hellmann, Thomas Rossow, Joerg Vieweg, and Josef von Helden. In Network-Based Information Systems (NBiS), 2012 15th International Conference on, pages 376--383. IEEE, 2012. [ bib ]
 
TCADS: Trustworthy, Context-Related Anomaly Detection for Smartphones. Ingo Bente, Bastian Hellmann, Joerg Vieweg, Josef von Helden, and Gabi Dreo. In Network-Based Information Systems (NBiS), 2012 15th International Conference on, pages 247--254. IEEE, 2012. [ bib ]
 
Trustworthy Anomaly Detection for Smartphones. Ingo Bente, Gabi Dreo, Bastian Hellmann, Joerg Vieweg, and Josef von Helden. In Poster presented at the 13th International Workshop on Mobile Computing Systems and Applications (ACM HotMobile), San Diego, CA, USA, 2012. [ bib ]

2011

 
Anbindung von Open Vulnerability Assesment System (OpenVAS) an eine Metadata Access Point (MAP)-Infrastruktur. Ralf Steuerwald. Bachelors's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2011. [ bib | .pdf ]
 
ESUKOM: Smartphone Security for Enterprise Networks. Ingo Bente, Josef von Helden, Bastian Hellmann, Joerg Vieweg, and Kai-Oliver Detken. In Norbert Pohlmann, Helmut Reimer, and Wolfgang Schneider, editors, ISSE 2011 Securing Electronic Business Processes. Springer Fachmedien Wiesbaden GmbH, 2011. [ bib ]
 
Towards permission-based attestation for the android platform. Ingo Bente, Gabi Dreo, Bastian Hellmann, Stephan Heuser, Joerg Vieweg, Josef von Helden, and Johannes Westhuis. In Jonathan M. McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, and Angela Sasse, editors, Proceedings of the 4th international conference on Trust and trustworthy computing (TRUST'11), pages 108--115. Springer, 2011. Talk: /download/publications/talks/2011-06-22-peba-trust-pit.pdf, LNCS 6740. [ bib ]
 
Interoperable device identification in Smart-Grid environments. Nicolai Kuntze, Carsten Rudolph, Ingo Bente, Joerg Vieweg, and Josef von Helden. In Power and Energy Society General Meeting, 2011 IEEE, pages 1--7. IEEE, 2011. doi: 10.1109/PES.2011.6039416. [ bib ]
 
Towards Trustworthy Networks with Open Source Software. Ingo Bente, Joerg Vieweg, and Josef von Helden. In T. S. Clary, editor, Horizons in Computer Science, volume 3. Nova Science Publishers Inc., 1611228077, 9781611228076. [ bib ]
 
Interoperable remote attestation for VPN environments. Ingo Bente, Bastian Hellmann, Joerg Vieweg, Josef von Helden, and Arne Welzel. In L. Chen and M. Yung, editors, Proceedings of the 2nd International Conference on Trusted Systems (INTRUST 2010), pages 302--315. Springer, 2011. LNCS 6802. [ bib ]

2010

 
Integration von Trusted Computing Technologien in die Android-Plattform. Johannes Westhuis. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2010. [ bib | .pdf ]
 
Entwicklung eines IF-MAP Clients für die Android Plattform. Waldemar Bender. Bachelor's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2010. [ bib | .pdf ]
 
Visualisierung von Informationen einer zentralen Netzwerk-Datenbank. Tobias Ruhe. Bachelor's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2010. [ bib | .pdf ]
 
tNAC - Trusted Network Access Control. Ingo Bente, Joerg Vieweg, Josef von Helden, Marian Jungbauer, and Norber Pohlmann. In Poster presented at the 19th Usenix Security Symposium (USENIX '10), Washington D.C., 2010. [ bib ]
 
Countering Phishing with TPM-bound Credentials. Ingo Bente, Joerg Vieweg, and Josef von Helden. In Norbert Pohlmann, Helmut Reimer, and Wolfgang Schneider, editors, ISSE 2010 Securing Electronic Business Processes, pages 236--246, 2011. [ bib ]
 
IRON: Intelligent Reaction on Network Events. Ingo Bente and Joerg Vieweg. In Talk given at Talk given at EWNS2010 (4. Essener Workshop zur Netzsicherheit), 2010. [ bib | .pdf ]
 
Privacy enhanced Trusted Network Connect. Ingo Bente, Joerg Vieweg, and Josef von Helden. In L. Chen and M. Yung, editors, Proceedings of the International Conference on Trusted Systems (INTRUST 2009), Beijing, pages 129--145, 2010. LNCS 6163. [ bib ]

2009

 
On the integration of Trusted Platform Module (TPM) with Trusted Network Connect (TNC). Josef von Helden, Ingo Bente, and Joerg Vieweg. In Talk given at the IT-Security Workshop, Universität der Bundeswehr München, 2009. [ bib ]
 
Trusted Network Connect (TNC). Josef von Helden, Ingo Bente, and Joerg Vieweg. In Talk given at the 4th European Trusted Infrastructures Summerschool (ETISS), Graz, 2009. [ bib | .pdf ]
 
Trusted Network Access Control - Experiences from Adoption. Josef von Helden, Ingo Bente, and Joerg Vieweg. In Talk given at the Linuxtag, Berlin, 2009. [ bib | .pdf ]
 
Verwendung von Remote Attestation in Trusted Network Connect. Mike Steinmetz. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2009. [ bib | .pdf ]
 
Open-Source-Lösungen zur Wahrung der Datensicherheit und glaubhaften Abstreitbarkeit in typischen Notebook-Szenarien. Jussi Salzwedel. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2009. [ bib | .pdf ]
 
Analyzing and Integrating TNC and VPN Technologies. Alexander Reich. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2009. [ bib | .pdf ]
 
Analysis and evaluation of property-based NAC policies within the context of TNC. Á. C. Benito. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2009. [ bib | .pdf ]
 
Entwicklungsperspektiven der IT-Sicherheit. Josef von Helden, Ingo Bente, and Joerg Vieweg. In H. Müller-Enbergs S. M. Litzcke and D. Ungerer, editors, Sicherheit in Organisationen, pages 113--134. Verlag für Polizeiwissenschaft, 2009. [ bib ]
 
Towards Trusted Network Access Control. Josef von Helden and Ingo Bente. In A.-R. Sadeghi D. Grawrock, H. Reimer and C. Vishik, editors, Future of Trust in Computing, pages 157--167, 2009. [ bib ]

2008

 
tNAC: Vertrauenswürdige Zugriffssteuerung in Netzwerken auf Basis von Trusted Network Connect. Josef von Helden, Ingo Bente, and Joerg Vieweg. spectrum - Zeitschrift der Fachhochschule Hannover, 2008. [ bib ]
 
Analyse und Demonstration der Wirksamkeit von Trusted Network Connect in realen Szenarien eines Unternehmens mit dem Schwerpunkt der sicheren Anbindung mobiler Endgeräte in das lokale Netz. Ingo Bente. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2008. [ bib ]
 
Entwicklung eines Konzepts für den Einsatz von Trusted Network Connect im Zusammenhang mit der VPN-Anbindung eines Unternehmens. Joerg Vieweg. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2008. [ bib ]
 
Trusted Network Connect (TNC). Josef von Helden, Ingo Bente, Joerg Vieweg, and Bastian Hellmann. In Talk given at the 3rd European Trusted Infrastructures Summerschool (ETISS), Oxford, 2008. [ bib | .pdf ]
 
Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect. Josef von Helden and Ingo Bente. In Norbert Pohlmann, Helmut Reimer, and Wolfgang Schneider, editors, ISSE 2008 Securing Electronic Business Processes, pages 152--162, 2008. [ bib ]

2006

 
Trusted Network Connect (TNC). Josef von Helden, Daniel Wuttke, and Martin Schmiedel. In Talk given at the European Trusted Infrastructures Summerschool (ETISS), Oxford, 2006. [ bib | .pdf ]
 
Erweiterung sicherheitsrelevanter Software für die automatische Integritätsprüfung von Endgeräten. Daniel Wuttke. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2006. [ bib | .pdf ]
 
Entwicklung einer Client-/Server-basierten Software für die Prüfung der Vertrauenswürdigkeit von Netzwerkkomponenten. Martin Schmiedel. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2006. [ bib | .pdf ]
TrustAtHsH-logo
HsH-F4-logo
Trust@HsH
Hochschule Hannover
University of Applied Sciences and Arts
Faculty IV, Dept. of Computer Science
Ricklinger Stadtweg 120
30459 Hannover, Germany
f4-i-trust@lists.hs-hannover.de
Google+ Twitter Youtube Atom-Feed