2024

 
One-Class Learning on Temporal Graphs for Attack Detection in Cyber-Physical Systems. Robin Buchta, Tobias Fritz, Carsten Kleiner, Felix Heine, and Gabi Dreo Rodosek. In NOMS 2024-2024 IEEE Network Operations and Management Symposium, pages 1--5, 2024. [ bib | DOI ]
Various domains, including critical infrastructures, industry, and the private sector, deploy cyber-physical systems (CPS). These systems integrate IT and OT components and interact with the environment and therefore differ significantly from pure IT setups. However, CPS often operate as black boxes, hindering effective attack detection. Our research addresses the challenge of detecting attacks in CPS relying on network data and learning on normal behavior. We show the performance of two methods in use for attack detection without attack knowledge. We propose new memory update strategies that can be used in practice. Specifically, we optimize for temporal graphs using graph neural networks (GNN) to capture system behavior. Negative sampling helps to use one-class learning. Our results show that a temporal graph network (TGN), combined with negative sampling, is suitable for one-class learning and can be used for attack detection. Additionally, a simple heuristic suffices for detecting basic attacks. Notably, existing benchmark datasets do not adequately support one-class learning, highlighting the need for tailored evaluation.
 
Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection. Jan Eske Gesell, Robin Buchta, Kilian Dangendorf, Pascal Franzke, Felix Heine, and Carsten Kleiner. In Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, and Joaquin Garcia-Alfaro, editors, Foundations and Practice of Security, pages 28--39, Cham, 2024. Springer Nature Switzerland. [ bib ]
Data reduction is a critical aspect of current research in advanced persistent threat attack detection. The challenge is handling the huge amount of data generated by system logging, which exposes dependencies among system entities, often depicted as provenance graphs. Data reduction methods aim to reduce the data size of provenance graphs, but their evaluation on non-public datasets limits the results' transferability and general applicability. This study compares state-of-the-art reduction methods for APT Attack Detection on publicly available provenance graph datasets, exploring their dependencies on graph characteristics and attack detection methods. One outcome of the work is that the effectiveness of many reduction methods depends highly on the underlying data. And secondly, using a reduction method does not necessarily negatively affect detection quality.

2023

 
APT Detection: An Incremental Correlation Approach. Salva Daneshgadeh Çakmakçı, Georgios Gkoktsis, Robin Buchta, Kai Oliver Detken, Felix Heine, and Carsten Kleiner. In 2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), volume 1, pages 151--156, 2023. [ bib | DOI ]

2022

 
Challenges and Peculiarities of Attack Detection in Virtual Power Plants : Towards an Advanced Persistent Threat Detection System. Robin Buchta, Felix Heine, and Carsten Kleiner. In 2022 IEEE 29th Annual Software Technology Conference (STC), pages 69--81, 2022. [ bib | DOI ]

2021

 
Detecting Attacks in Network Traffic Using Normality Models: The Cellwise Estimator. Felix Heine, Carsten Kleiner, Philip Klostermeyer, Volker Ahlers, Tim Laue, and Nils Wellermann. In Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, and Joaquin Garcia-Alfaro, editors, Foundations and Practice of Security, pages 265--282, Cham, 2022. Springer International Publishing. [ bib | DOI ]
 
Visualization of Data Cubes for Anomaly Detection in Network Traffic Data Streams. Volker Ahlers, Tim Laue, Nils Wellermann, and Felix Heine. In 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), volume 1, pages 272--277, 2021. [ bib | DOI ]

2020

 
Smart Data Analytics : Schriften des Forschungsclusters Smart Data Analytics 2020. Christian Wartena and Ralf Bruns, editors. 2020. [ bib | DOI | http ]
Das Forschungscluster Smart Data Analytics stellt in dem vorliegenden Band seine Forschung aus den Jahren 2019 und 2020 vor. In der ersten Hälfte des Bandes geben 20 Kurzporträts von laufenden oder kürzlich abgeschlossenen Projekten einen Überblick über die Forschungsthemen im Cluster. Enthalten in den Kurzporträts ist eine vollständige, kommentierte Liste der wissenschaftlichen Veröffentlichungen aus den Jahren 2019 und 2020. In der zweiten Hälfte dieses Bandes geben vier längere Beiträge exemplarisch einen tieferen Einblick in die Forschung des Clusters und behandeln Themen wie Fehlererkennung in Datenbanken, Analyse und Visualisierung von Sicherheitsvorfällen in Netzwerken, Wissensmodellierung und Datenintegration in der Medizin, sowie die Frage ob ein Computerprogramm Urheber eines Kunstwerkes im Sinne des Urheberrechts sein kann.
 
On the Evaluation and Deployment of Machine Learning Approaches for Intrusion Detection. Felix Heine, Tim Laue, and Carsten Kleiner. In 2020 IEEE International Conference on Big Data (Big Data), pages 4594--4603, 2020. [ bib | DOI ]
 
A DSL for Automated Data Quality Monitoring. Felix Heine, Carsten Kleiner, and Thomas Oelsner. In Sven Hartmann, Josef Küng, Gabriele Kotsis, A. Min Tjoa, and Ismail Khalil, editors, Database and Expert Systems Applications, pages 89--105, Cham, 2020. Springer International Publishing. [ bib | DOI ]

2019

 
Automated Detection and Monitoring of Advanced Data Quality Rules. Felix Heine, Carsten Kleiner, and Thomas Oelsner. In Sven Hartmann, Josef Küng, Sharma Chakravarthy, Gabriele Anderst-Kotsis, A Min Tjoa, and Ismail Khalil, editors, Database and Expert Systems Applications - 30th International Conference, DEXA 2019, Linz, Austria, August 26-29, 2019, Proceedings, Part I, volume 11706 of Lecture Notes in Computer Science, pages 238--247. Springer, 2019. [ bib | DOI | https ]
 
Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents. Leonard Renners, Felix Heine, Carsten Kleiner, and Gabi Dreo Rodosek. Int. J. Cyber Situational Aware., 4(1):99--127, 2019. [ bib | DOI | https ]
 
Adaptive and Intelligible Prioritization for Network Security Incidents. Leonard Renners, Felix Heine, Carsten Kleiner, and Gabi Dreo Rodosek. In 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pages 1--8. IEEE, 2019. [ bib | DOI | https ]
 
Design and Evaluation of an Approach for Feedback-Based Adaptation of Incident Prioritization. Leonard Renners, Felix Heine, Carsten Kleiner, and Gabi Dreo Rodosek. In 2nd International Conference on Data Intelligence and Security, ICDIS 2019, South Padre Island, TX, USA, June 28-30, 2019, pages 28--35. IEEE, 2019. [ bib | DOI | https ]
 
A User Study of the Visualization-Assisted Evaluation and Management of Network Security Detection Events and Policies. B. Hellmann, V. Ahlers, and G. D. Rodosek. In 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pages 668--673, Sep. 2019. [ bib ]

2018

 
A Feedback-based Evaluation Approach for the Continuous Adjustment of Incident Prioritization. Leonard Renners, Carsten Kleiner, Felix Heine, and Gabi Dreo. In 2018 1st IEEE International Conference on Data Intelligence and Security (ICDIS), April 2018. [ bib ]

2017

 
IT-Sicherheitsanalyse durch NAC-Systeme mit SIEM-Funktionalität. Kai-Oliver Detken, Carsten Kleiner, Marius Rohde, and Marion Steiner. In Peter Schartner and Andrea Baumann, editors, D.A.CH Security 2017: Bestandsaufnahme, Konzepte, Anwendungen und Perspektiven. syssec-Verlag, Frechen, September 5th and September 6th 2017. http://www.syssec.at/dachsecurity2017/. [ bib ]
 
Integrating visual analysis of network security and management of detection system configurations. B. Hellmann, V. Ahlers, and G. D. Rodosek. In 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pages 1020--1025, September 2017. [ bib | DOI ]
 
Modeling and learning incident prioritization. L. Renners, F. Heine, and G. D. Rodosek. In 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), volume 1, pages 398--403, September 2017. [ bib | DOI ]
 
PopUp-Cubing: An Algorithm to Efficiently Use Iceberg Cubes in Data Streams. Felix Heine and Marius Rohde. In Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT '17, pages 11--20, New York, NY, USA, 2017. ACM. [ bib | DOI | http ]
 
Outlier Detection in Data Streams Using OLAP Cubes. Felix Heine. In Mār\īte Kirikova, Kjetil Nørvåg, George A. Papadopoulos, Johann Gamper, Robert Wrembel, Jérôme Darmont, and Stefano Rizzi, editors, New Trends in Databases and Information Systems, pages 29--36, Cham, 2017. Springer International Publishing. [ bib ]

2016

 
Navigation zeitlicher Zustände von Graphen. Torben Tietze. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2016. [ bib ]
 
Implementierung eines angepassten hierarchischen 2D-Graphlayout-Verfahrens zur Darstellung der Netzwerksicherheit. Sunni Hu. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2016. [ bib ]
 
Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources. Volker Ahlers, Felix Heine, Bastian Hellmann, Carsten Kleiner, Leonard Renners, Thomas Rossow, and Ralf Steuerwald. In Sjouke Mauw, Barbara Kordy, and Sushil Jajodia, editors, Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers, pages 18--34. Springer International Publishing, Cham, 2016. [ bib | DOI | http ]
 
Darstellung von Netzwerksicherheits-Policies und Verknüpfung von Auswertungsergebnissen. Marcel Reichenbach. Master's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2016. [ bib ]

2015

 
Visualization of Network Security Policy Evaluation. Bastian Hellmann, Marcel Reichenbach, Leonard Renners, and Volker Ahlers. In Poster presented at the 12th IEEE Symposium on Visualization for Cyber Security (VizSec), Chicago, IL, USA, Chicago, October 26th 2015. IEEE. http://vizsec.org/. [ bib | .pdf ]
 
Erweiterung der 2D-Graphlayout-Verfahren einer Software zur Visualisierung der Netzwerksicherheit. Junbiao Wu. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2015. [ bib ]
 
SIEM Approach for a Higher Level of IT Security in Enterprise Networks. Kai-Oliver Detken, Thomas Rix, Carsten Kleiner, Bastian Hellmann, and Leonard Renners. In Proceedings of the 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). Institute of Electrical and Electronics Engineers, Warsaw, September 24th till September 26th 2015. http://idaacs.net/2015/. [ bib ]
 
Event-Korrelation in SIEM-Systemen auf Basis von IF-MAP. Kai-Oliver Detken, Felix Heine, Thomas Rix, and Leonard Renners. In Peter Schartner, Kerstin Lemke-Rust, and Markus Ullmann, editors, D.A.CH Security 2015: Bestandsaufnahme, Konzepte, Anwendungen und Perspektiven. syssec-Verlag, Bonn, September 8th and September 9th 2015. http://www.syssec.at/dachsecurity2015/. [ bib ]
 
Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System. Kai-Oliver Detken, Bastian Hellmann, and Dirk Scheuermann. In Y. Tan, Y. Shi, F. Buarque, A. Gelbukh, S. Das, and A. Engelbrecht, editors, The Sixth International Conference on Swarm Intelligence - The Second BRICS Congress on Computational Intelligence (ICSI-CCI) 2015, Advanced in Swarm and Computational Intelligence, Proceedings Part II, pages 439--453. Springer, Beijing, June 25th till June 28th 2015. http://www.ic-si.org/2015/. [ bib ]
 
Near real-time network security with an IF-MAP-based SIEM approach, Kai-Oliver Detken, Carsten Kleiner, Thomas Rix, Bastian Hellmann, and Leonard Renners. April 20th 2015. Demonstration at the TCG associated seminar “Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions” during the RSA conference, San Francisco, USA, with partner DECOIT GmbH, http://www.trustedcomputinggroup.org/media_room/events/182. [ bib | .pdf ]
 
BYOD solution well in hand: standards-based mobile security, Lisa Lorenzin, Kai-Oliver Detken, and Leonard Renners. April 20th 2015. Demonstration at the TCG associated seminar “Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions” during the RSA conference, San Francisco, USA, with partners Pulse Secure and DECOIT GmbH, http://www.trustedcomputinggroup.org/media_room/events/182. [ bib | .pdf ]
 
JavaScript-Frontend für die Visualisierung von IF-MAP-Metadatengraphen. Sören Grzanna. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2015. [ bib ]
 
Realisierung einer mobilen App zur gestengesteuerten Interaktion von Metadatengraphen. Daniel Hülse. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2015. [ bib ]
 
Complex Event Processing im Kontext eines IF-MAP Clients auf mobilen Geräten (Android). Michael Felchner. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2015. [ bib | .pdf ]
 
Entwicklung eines IF-MAP Clients für Nmap Portscan-Ergebnisse. Arne Loth. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2015. [ bib ]

2014

 
SIEM-Ansätze zur Erhöhung der IT-Sicherheit auf Basis von IF-MAP. Kai-Oliver Detken, Thomas Rossow, and Ralf Steuerwald. In Peter Schartner and Peter Lipp, editors, D.A.CH Security 2014: Bestandsaufnahme, Konzepte, Anwendungen und Perspektiven. syssec-Verlag, Graz, September 16th and September 17th 2014. [ bib ]
 
Replicable Security Monitoring: Visualizing time-variant Graphs of Network Metadata. Volker Ahlers, Felix Heine, Bastian Hellmann, Carsten Kleiner, Leonard Renners, Thomas Rossow, and Ralf Steuerwald. In Jim Burton, Gem Stapleton, and Karsten Klein, editors, Joint Proceedings of the Fourth International Workshop on Euler Diagrams (ED 2014) and the First International Workshop on Graph Visualization in Practice (GViP 2014) co-located with Diagrams 2014, number 1244 in CEUR Workshop Proceedings, pages 32--41, Melbourne, July 28th and 1st August 2014. http://ceur-ws.org/. [ bib | .pdf ]
 
Near Real-time Security with Open Source Tools, Josef von Helden, Bastian Hellmann, Thomas Rossow, Ralf Steuerwald, Andreas Steffen, Kai-Oliver Detken, and Dennis Dunekacke. February 24th 2014. Demonstration at the TCG associated seminar “Get proactive with security” during the RSA conference, San Francisco, USA, with partners DECOIT GmbH and University of Applied Sciences in Rapperswil, http://www.trustedcomputinggroup.org/resources/rsa_conference_2014_get_proactive_with_security. [ bib | .pdf ]
 
Bewegungssteuerung einer Anwendung zur Visualisierung der Sicherheit mobiler IT-Infrastrukturen. Oleg Wetzler. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2014. [ bib ]
 
MAP-Client für generische Logging-Ausgaben. Johannes Busch. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2014. [ bib ]

2013

 
Trust@FHH - IF-MAP Research Projects and Open Source Software. Josef von Helden. Talk given at the TCG Members Meeting 2013, Dublin, 2013. [ bib | .pdf ]
 
TPM 2.0, UEFI and their Impact on Security and Users’ Freedom. Thomas Rossow. Master's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2013. [ bib | .pdf ]
 
Eine GUI für irondetect auf Android-Smartphones. Marcel Reichenbach. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2013. [ bib ]
 
Überprüfung der Gültigkeit von IF-MAP-Graphen. Anton Saenko. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2013. [ bib | .pdf ]
 
Analyse des Zusammenspiels von IF-MAP und OpenFlow. Till Gigla. Bachelor's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2013. [ bib ]
 
Konzeption und Realisierung eines Labors für Trusted Computing Technologien. Alexander Subbotin. Master's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2013. [ bib ]

2012

 
Developement Of An Android Usage Study System. Tobias Ruhe. Master's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2012. [ bib | .pdf ]
 
A Component-Based Trojan Framework for Android. Waldemar Bender. Master's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2012. [ bib | .pdf ]
 
Analyse und Implementierung des IF-MAP 2.1 Protokolls. Joram Knaack. Bachelors's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2012. [ bib | .pdf ]
 
Trusted service access with dynamic security infrastructure configuration. Ronald Marx, Nicolai Kuntze, Carsten Rudolph, Ingo Bente, and Joerg Vieweg. In Communications (APCC), 2012 18th Asia-Pacific Conference on, pages 730--735. IEEE, 2012. [ bib ]
 
Trust@FHH - IF-MAP Research Projects and Open Source Software. Josef von Helden. Talk given at the TCG Members Meeting 2012, Madrid, 2012. [ bib | .pdf ]
 
On Remote Attestation for Google Chrome OS. Ingo Bente, Bastian Hellmann, Thomas Rossow, Joerg Vieweg, and Josef von Helden. In Network-Based Information Systems (NBiS), 2012 15th International Conference on, pages 376--383. IEEE, 2012. [ bib ]
 
TCADS: Trustworthy, Context-Related Anomaly Detection for Smartphones. Ingo Bente, Bastian Hellmann, Joerg Vieweg, Josef von Helden, and Gabi Dreo. In Network-Based Information Systems (NBiS), 2012 15th International Conference on, pages 247--254. IEEE, 2012. [ bib ]
 
Trustworthy Anomaly Detection for Smartphones. Ingo Bente, Gabi Dreo, Bastian Hellmann, Joerg Vieweg, and Josef von Helden. In Poster presented at the 13th International Workshop on Mobile Computing Systems and Applications (ACM HotMobile), San Diego, CA, USA, 2012. [ bib ]

2011

 
Anbindung von Open Vulnerability Assesment System (OpenVAS) an eine Metadata Access Point (MAP)-Infrastruktur. Ralf Steuerwald. Bachelors's thesis, Hochschule Hannover (University of Applied Sciences and Arts), 2011. [ bib | .pdf ]
 
ESUKOM: Smartphone Security for Enterprise Networks. Ingo Bente, Josef von Helden, Bastian Hellmann, Joerg Vieweg, and Kai-Oliver Detken. In Norbert Pohlmann, Helmut Reimer, and Wolfgang Schneider, editors, ISSE 2011 Securing Electronic Business Processes. Springer Fachmedien Wiesbaden GmbH, 2011. [ bib ]
 
Towards permission-based attestation for the android platform. Ingo Bente, Gabi Dreo, Bastian Hellmann, Stephan Heuser, Joerg Vieweg, Josef von Helden, and Johannes Westhuis. In Jonathan M. McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, and Angela Sasse, editors, Proceedings of the 4th international conference on Trust and trustworthy computing (TRUST'11), pages 108--115. Springer, 2011. Talk: /download/publications/talks/2011-06-22-peba-trust-pit.pdf, LNCS 6740. [ bib ]
 
Interoperable device identification in Smart-Grid environments. Nicolai Kuntze, Carsten Rudolph, Ingo Bente, Joerg Vieweg, and Josef von Helden. In Power and Energy Society General Meeting, 2011 IEEE, pages 1--7. IEEE, 2011. doi: 10.1109/PES.2011.6039416. [ bib ]
 
Towards Trustworthy Networks with Open Source Software. Ingo Bente, Joerg Vieweg, and Josef von Helden. In T. S. Clary, editor, Horizons in Computer Science, volume 3. Nova Science Publishers Inc., 1611228077, 9781611228076. [ bib ]
 
Interoperable remote attestation for VPN environments. Ingo Bente, Bastian Hellmann, Joerg Vieweg, Josef von Helden, and Arne Welzel. In L. Chen and M. Yung, editors, Proceedings of the 2nd International Conference on Trusted Systems (INTRUST 2010), pages 302--315. Springer, 2011. LNCS 6802. [ bib ]

2010

 
Integration von Trusted Computing Technologien in die Android-Plattform. Johannes Westhuis. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2010. [ bib | .pdf ]
 
Entwicklung eines IF-MAP Clients für die Android Plattform. Waldemar Bender. Bachelor's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2010. [ bib | .pdf ]
 
Visualisierung von Informationen einer zentralen Netzwerk-Datenbank. Tobias Ruhe. Bachelor's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2010. [ bib | .pdf ]
 
tNAC - Trusted Network Access Control. Ingo Bente, Joerg Vieweg, Josef von Helden, Marian Jungbauer, and Norber Pohlmann. In Poster presented at the 19th Usenix Security Symposium (USENIX '10), Washington D.C., 2010. [ bib ]
 
Countering Phishing with TPM-bound Credentials. Ingo Bente, Joerg Vieweg, and Josef von Helden. In Norbert Pohlmann, Helmut Reimer, and Wolfgang Schneider, editors, ISSE 2010 Securing Electronic Business Processes, pages 236--246, 2011. [ bib ]
 
IRON: Intelligent Reaction on Network Events. Ingo Bente and Joerg Vieweg. In Talk given at Talk given at EWNS2010 (4. Essener Workshop zur Netzsicherheit), 2010. [ bib | .pdf ]
 
Privacy enhanced Trusted Network Connect. Ingo Bente, Joerg Vieweg, and Josef von Helden. In L. Chen and M. Yung, editors, Proceedings of the International Conference on Trusted Systems (INTRUST 2009), Beijing, pages 129--145, 2010. LNCS 6163. [ bib ]

2009

 
On the integration of Trusted Platform Module (TPM) with Trusted Network Connect (TNC). Josef von Helden, Ingo Bente, and Joerg Vieweg. In Talk given at the IT-Security Workshop, Universität der Bundeswehr München, 2009. [ bib ]
 
Trusted Network Connect (TNC). Josef von Helden, Ingo Bente, and Joerg Vieweg. In Talk given at the 4th European Trusted Infrastructures Summerschool (ETISS), Graz, 2009. [ bib | .pdf ]
 
Trusted Network Access Control - Experiences from Adoption. Josef von Helden, Ingo Bente, and Joerg Vieweg. In Talk given at the Linuxtag, Berlin, 2009. [ bib | .pdf ]
 
Verwendung von Remote Attestation in Trusted Network Connect. Mike Steinmetz. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2009. [ bib | .pdf ]
 
Open-Source-Lösungen zur Wahrung der Datensicherheit und glaubhaften Abstreitbarkeit in typischen Notebook-Szenarien. Jussi Salzwedel. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2009. [ bib | .pdf ]
 
Analyzing and Integrating TNC and VPN Technologies. Alexander Reich. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2009. [ bib | .pdf ]
 
Analysis and evaluation of property-based NAC policies within the context of TNC. Á. C. Benito. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2009. [ bib | .pdf ]
 
Entwicklungsperspektiven der IT-Sicherheit. Josef von Helden, Ingo Bente, and Joerg Vieweg. In H. Müller-Enbergs S. M. Litzcke and D. Ungerer, editors, Sicherheit in Organisationen, pages 113--134. Verlag für Polizeiwissenschaft, 2009. [ bib ]
 
Towards Trusted Network Access Control. Josef von Helden and Ingo Bente. In A.-R. Sadeghi D. Grawrock, H. Reimer and C. Vishik, editors, Future of Trust in Computing, pages 157--167, 2009. [ bib ]

2008

 
tNAC: Vertrauenswürdige Zugriffssteuerung in Netzwerken auf Basis von Trusted Network Connect. Josef von Helden, Ingo Bente, and Joerg Vieweg. spectrum - Zeitschrift der Fachhochschule Hannover, 2008. [ bib ]
 
Analyse und Demonstration der Wirksamkeit von Trusted Network Connect in realen Szenarien eines Unternehmens mit dem Schwerpunkt der sicheren Anbindung mobiler Endgeräte in das lokale Netz. Ingo Bente. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2008. [ bib ]
 
Entwicklung eines Konzepts für den Einsatz von Trusted Network Connect im Zusammenhang mit der VPN-Anbindung eines Unternehmens. Joerg Vieweg. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2008. [ bib ]
 
Trusted Network Connect (TNC). Josef von Helden, Ingo Bente, Joerg Vieweg, and Bastian Hellmann. In Talk given at the 3rd European Trusted Infrastructures Summerschool (ETISS), Oxford, 2008. [ bib | .pdf ]
 
Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect. Josef von Helden and Ingo Bente. In Norbert Pohlmann, Helmut Reimer, and Wolfgang Schneider, editors, ISSE 2008 Securing Electronic Business Processes, pages 152--162, 2008. [ bib ]

2006

 
Trusted Network Connect (TNC). Josef von Helden, Daniel Wuttke, and Martin Schmiedel. In Talk given at the European Trusted Infrastructures Summerschool (ETISS), Oxford, 2006. [ bib | .pdf ]
 
Erweiterung sicherheitsrelevanter Software für die automatische Integritätsprüfung von Endgeräten. Daniel Wuttke. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2006. [ bib | .pdf ]
 
Entwicklung einer Client-/Server-basierten Software für die Prüfung der Vertrauenswürdigkeit von Netzwerkkomponenten. Martin Schmiedel. Master's thesis, Fachhochschule Hannover (University of Applied Sciences and Arts), 2006. [ bib | .pdf ]
TrustAtHsH-logo
Data|H
HsH-F4-logo
Trust@HsH
Hochschule Hannover
University of Applied Sciences and Arts
Faculty IV, Dept. of Computer Science
Ricklinger Stadtweg 120
30459 Hannover, Germany
trust-at-hsh@listserv.dfn.de