Jörg Daubert
Jörg Daubert
Provadis School of International Management and Technology AG
Verified email at - Homepage
Cited by
Cited by
On the security and privacy of Internet of Things architectures and systems
E Vasilomanolakis, J Daubert, M Luthra, V Gazis, A Wiesmaier, P Kikiras
2015 International workshop on secure internet of things (SIoT), 49-57, 2015
A view on privacy & trust in IoT
J Daubert, A Wiesmaier, P Kikiras
2015 IEEE International Conference on Communication Workshop (ICCW), 2665-2670, 2015
Big data storage
M Strohbach, J Daubert, H Ravkin, M Lischka
New Horizons for a Data-Driven Economy: A Roadmap for Usage and Exploitation …, 2016
Beyond the hype: On using blockchains in trust management for authentication
N Alexopoulos, J Daubert, M Mühlhäuser, SM Habib
2017 IEEE Trustcom/BigDataSE/ICESS, 546-553, 2017
AnonPubSub: Anonymous publish-subscribe overlays
J Daubert, M Fischer, T Grube, S Schiffner, P Kikiras, M Mühlhäuser
Computer Communications 76, 42-53, 2016
Street lamps as a platform
M Mühlhäuser, C Meurisch, M Stein, J Daubert, J Von Willich, J Riemann, ...
Communications of the ACM 63 (6), 75-83, 2020
How long do vulnerabilities live in the code? a {Large-Scale} empirical measurement study on {FOSS} vulnerability lifetimes
N Alexopoulos, M Brack, JP Wagner, T Grube, M Mühlhäuser
31st USENIX Security Symposium (USENIX Security 22), 359-376, 2022
Improving the usability and ux of the swiss internet voting interface
K Marky, V Zimmermann, M Funk, J Daubert, K Bleck, M Mühlhäuser
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
Challenges and available solutions against organized cyber-crime and terrorist networks
A Tundis, F Huber, B Jäger, J Daubert, E Vasilomanolakis, M Mühlhäuser
WIT Transactions on the Built Environment 174, 429-441, 2018
Efficient privacy-preserving recommendations based on social graphs
A Wainakh, T Grube, J Daubert, M Mühlhäuser
Proceedings of the 13th ACM Conference on Recommender Systems, 78-86, 2019
HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot
J Daubert, D Boopalan, M Mühlhäuser, E Vasilomanolakis
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2018
Twitterize: Anonymous micro-blogging
J Daubert, L Böck, P Kikirasy, M Mühlhäuser, M Fischer
2014 IEEE/ACS 11th International Conference on Computer Systems and …, 2014
Exploring energy grid resilience: The impact of data, prosumer awareness, and action
R Egert, J Daubert, S Marsh, M Mühlhäuser
Patterns 2 (6), 2021
End-2-End privacy architecture for IoT
S Funke, J Daubert, A Wiesmaier, P Kikiras, M Muehlhaeuser
2015 IEEE Conference on Communications and Network Security (CNS), 705-706, 2015
Distributed and anonymous publish-subscribe
J Daubert, M Fischer, S Schiffner, M Mühlhäuser
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
Cover traffic: A trade of anonymity and efficiency
T Grube, M Thummerer, J Daubert, M Mühlhäuser
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
Cloud-based IoT analytics for the smart grid: experiences from a 3-year pilot
T Hasan, P Kikiras, A Leonardi, H Ziekow, J Daubert
EAI Endorsed Transactions on Cloud Systems 1 (2), 2015
Internal attacks in anonymous publish-subscribe P2P overlays
J Daubert, T Grube, M Mühlhäuser, M Fischer
2015 International Conference and Workshops on Networked Systems (NetSys), 1-8, 2015
Anonymous Publish-Subscribe Overlays
J Daubert
Dissertation, Darmstadt, Technische Universität Darmstadt, 2016, 2016
Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot
E Vasilomanolakis, J Daubert, D Boopalan, M Mühlhäuser
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-2, 2018
The system can't perform the operation now. Try again later.
Articles 1–20