Publikationen - Jahre

2015

Distributed Attack Graph Generation
Kerem Kaynar, Fikret Sivrikaya
In: IEEE Transactions on Dependable and Secure Computing; 2015

2014

Sensorbasierte Aktivitätserkennung im häuslichen Umfeld
Felix Rodemund, Sahin Albayrak, Harald Klaus
In: 7. Deutscher AAL-Kongress 2014, Berlin, Germany; 2014; 2014

IMA - An Adaptable and Dynamic Service Platform for Intermodal Mobility Assistance
Jan Keiser, Nils Masuch, Marco Lützenberger, Dennis Grunewald, Maximilian Kern, Frank Trollmann, Esra Acar Celik, Cigdem Avici Salma, Xuan-Thuy Dang
In: Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems (ITSC 2014), Qingdao, China.; 2014

2013

Group-based IDS Collaboration Framework: A Case Study of the Artificial Immune System
Rainer Bye
In: Technische Universität Berlin; 2013

A Tool Set for the Evaluation of Security and Reliability in Smart Grids
Joël Chinnow, Jakob Tonn, Karsten Bsufka, Thomas Konnerth, Sahin Albayrak
In: Smart Grid Security. Volume 7823 of Lecture Notes in Computer Science. Springer Berlin Heidelberg (2013) 45–57; 2013

2012

A Trusted Ecosystem For Android Applications Based On Context-Aware Access Control
Markus Herpich, Leonid Batyuk, Seyit Ahmet Camtepe, and Sahin Albayrak
In: 7th International Conference on Malicious and Unwanted Software (Malware 2012); 2012

Integration of Simulations and MAS for Smart Grid Management Systems
Thomas Konnerth, Joël Chinnow, Silvan Kaiser, Dennis Grunewald, Karsten Bsufka, Sahin Albayrak
In: Proceedings of the 3rd International Workshop on Agent Technologies for Energy Systems (ATES 2012), Valencia, Spain; 2012

A Framework for Automated Identification of Attack Scenarios on IT Infrastructures
Seyit Ahmet Camtepe, Karsten Bsufka, Leonhard Hennig, Cihan Simsek and Sahin Albayrak
In: PIK - Praxis Der Informationsverarbeitung und Kommunikation 35 (1): 25-31. doi:10.1515/pik-2012-0005piko.2012.35.1.25.; 2012

Sensor-basierte Erkennung und Reaktion im häuslichen Umfeld
Karsten Raddatz, Aubrey-Derrick Schmidt, Alexander Tiele, Joel Chinnow, Dennis Grunewald, Sahin Albayrak
In: AAL Kongress 2012, Berlin, Germany; 2012

2011

A Simulation Framework for Smart Meter Security Evaluation
Joël Chinnow, Karsten Bsufka, Aubrey-Derrick Schmidt, Rainer Bye, Seyit Ahmet Camtepe, Sahin Albayrak
In: IEEE International Conference on Smart Measurements for Future Grids, SMFG; 2011

Using Static Analysis for Automatic Assessment and Mitigation of Unwanted and Malicious Activities Within Android Applications
Leonid Batyuk, Markus Herpich, Seyit Ahmet Camtepe, Karsten Raddatz, Aubrey-Derrick Schmidt, Sahin Albayrak
In: Malware Conference 2011, Fajardo, Puerto Rico, USA; 2011

Detection of Smartphone Malware
Aubrey-Derrick Schmidt
In: Dissertation, Technische Universität Berlin, Berlin, Germany; 2011

Behavioral Biometrics for Persistent Single Sign-On
Tarik Mustafic, Arik Messerman, Seyit Ahmet Camtepe, Aubrey-Derrick Schmidt, Sahin Albayrak
In: DIM 2011 (The Seventh ACM Workshop on Digital Identity Management), October 21, 2011, Chicago, IL, USA; 2011

Continuous and Non-intrusive Identity Verification in Real-time Environments based on Free-Text Keystroke Dynamics
Arik Messerman, Tarik Mustafic, Seyit Ahmet Camtepe, Sahin Albayrak
In: IEEE International Joint Conference on Biometrics (IJCB 11): International Conference on Biometrics (ICB) and the Biometrics Theory, Application and Systems (BTAS), 10 2011, Washington DC, USA; 2011

User Facilitated Congestion and Attack Mitigation
Mürsel Yildiz, Ahmet Cihat Toker, Fikret Sivrikaya, Seyit Ahmet Camtepe, Sahin Albayrak
In: Third International Conference on Mobile Networks and Management (MONAMI '11); 2011

Multi-Device Key Management Using Visual Side Channels in Pervasive Computing Environments
Leonid Batyuk, Seyit Ahmet Camtepe and Sahin Albayrak
In: Proceedings of the Sixth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011); 2011

Context-Aware Device Self-Configuration Using Self-Organizing Maps
Leonid Batyuk, Christian Scheel, Seyit Ahmet Camtepe and Sahin Albayrak
In: Workshop Organic Computing as part of ICAC 2011; 2011

Evaluation of Attacks and Countermeasures in Large Scale Networks
Joël Chinnow, Rainer Bye, Ahmet Camtepe, Karsten Bsufka, Sahin Albayrak
In: Workshop über IT-Sicherheit in kollaborativen und stark vernetzten Systemen KSVS 2011; Berlin, Germany; 2011

Framework for Evaluating Collaborative Intrusion Detection Systems
Dennis Grunewald, Joël Chinnow, Rainer Bye, Ahmet Camtepe, Sahin Albayrak
In: Workshop über IT-Sicherheit in kollaborativen und stark vernetzten Systemen KSVS 2011; Berlin, Germany; 2011

From Simulation to Emulation - An Integrated Approach for Network Security Evaluation
Martin Möller, Rainer Bye, Karsten Bsufka, Ahmet Camtepe and Sahin Albayrak
In: Workshop über IT-Sicherheit in kollaborativen und stark vernetzten Systemen (KSVS); 2011

Agent-based Network Security Simulation
Dennis Grunewald, Marco Lützenberger, Joël Chinnow, Rainer Bye, Karsten Bsufka and Sahin Albayrak
In: Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems 2011, Taipei, Taiwan, pp. 1325-1326; 2011

2010

A Framework for the Evaluation of Collaborative Intrusion Detection
Dennis Grunewald
In: Berlin, Germany; 2010

A Generic Framework and Runtime Environment for Development and Evaluation of Behavioral Biometrics Solutions
Arik Messerman, Tarik Mustafic, Seyit Ahmet Camtepe, Sahin Albayrak
In: IEEE ISDA 2010 (10 th International Conference on Intelligent Systems, Design and Applications), 11 2010, Cairo, Egypt; 2010

Secure context-aware reconfiguration for mobile devices
Leonid Batyuk, Sahin Albayrak
In: Proceedings of the 5th Future Security Research Conference, Berlin; 2010

An Android Application Sandbox System for Suspicious Software Detection
Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, Sahin Albayrak
In: 5th International Conference on Malicious and Unwanted Software (Malware 2010), Nancy, France; 2010

Teams Rather Than Individuals: Collaborative Intrusion Detection (Extended Abstract)
Rainer Bye, Seyit Ahmet Camtepe, Sahin Albayrak
In: Future Security, 5th Security Research Conference, Berlin; 2010; 2010

Non-Intrusive Continuous User Behavior Analysis Using Computerized Systems
Arik Messerman, Tarik Mustafic, Seyit Ahmet Camtepe, Sahin Albayrak
In: Future Security, 5th Security Research Conference, Berlin; 2010

Static Smartphone Malware Detection
Aubrey-Derrick Schmidt, Ahmet Camtepe and Sahin Albayrak
In: In proceedings of the 5th Security Research Conference (Future Security 2010), Berlin, Germany; 2010

Teamworking for Security with CIMD: A Collaborative Approach to Intrusion Detection
Rainer Bye, Seyit Ahmet Camtepe, Sahin Albayrak
In: Poster Session, 19th USENIX Security Symposium, Washington D.C., http://www.usenix.org/events/sec10/poster.html; 2010

Collaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities and Countermeasures
Rainer Bye, Seyit Ahmet Camtepe, Sahin Albayrak
In: CollSec 2010: Usenix Workshop on Collaborative Methods for Security and Privacy, http://www.usenix.org/events/collsec10/tech/full_papers/Bye.pdf; 2010

Agent-based Decision Support: A Case-Study on DSL Access Networks
Karsten Bsufka, Rainer Bye, Joël Chinnow, Stephan Schmidt, and Leonid Batyuk
In: Proceedings of the Twenty-Second Innovative Applications of Artificial Intelligence Conference (IAAI-10), Association for the Advancement of Artificial Intelligence, 2010, pp. 1757-1762; 2010

Concept of a Sensor based Emergency Detection in a Home Environment (Ein Konzept zur sensorbasierten Erkennung von Notsituationen im häuslichen Umfeld)
Tarik Mustafic, Jan Hendrik Clausen, Arik Messerman, Joël Chinnow
In: Ambient Assisted Living - AAL, 3. Deutscher Kongress mit Ausstellung - Assistenzsysteme im Dienste des Menschen: zuhause und unterwegs, Berlin, Germany; 2010

A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Christian Bauckhage, Tansu Alpcan, Aubrey-Derrick Schmidt
In: Fourth International Workshop in Information Security Theory and Practice 2010 (WISTP'10), Passau, Germany; 2010

Optimization and Early-Warning in DSL Access Networks based on Simulation
Rainer Bye, Joël Chinnow, Jan Clausen, Karsten Bsufka, Sahin Albayrak
In: Third International Conference on Simulation Tools and Techniques for Communications, Networks and Systems, SimuTools 2010; 2010

Application-level simulation for network security
Stephan Schmidt, Rainer Bye, Joel Chinnow, Karsten Bsufka, Ahmet Camtepe, Sahin Albayrak
In: Simulation: Transactions of The Society for Modeling and Simulation International; 2010

2009

Continuous User Verification through Behavioral Biometrics
Arik Messerman
In: Proceedings of the Fourth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), SR-2009-01 (Technical Reports), 15 September 2009, Stuttgart, Germany; 2009

[Abstract] Smartphone Malware Evolution Revisited
Aubrey-Derrick Schmidt
In: Proceedings of the Fourth GI Graduate Workshop on Reactive Security (SPRING), number SR-2009-01 in GI SIG SIDAR Technical Reports, Stuttgart, Germany, 15 September 2009, GI SIG SIDAR; 2009

An Extensible Simulation Framework for Critical Infrastructure Security
Joël Chinnow, Rainer Bye, Stephan Schmidt, Karsten Bsufka, Seyit Ahmet Camtepe, Sahin Albayrak
2009

Teamworking for Security: The Collaborative Approach
Rainer Bye,Seyit Ahmet Camtepe, Sahin Albayrak
In: Information Science Reference; 2009

Smartphone Malware Evolution Revisited: Android Next Target?
Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Leonid Batyuk, Jan Hendrik Clausen, Seyit Ahmet Camtepe, Sahin Albayrak, Can Yildizli
In: 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), Montreal, Quebec, Canada; 2009

Detecting Symbian OS Malware through Static Function Call Analysis
Aubrey-Derrick Schmidt, Jan Hendrik Clausen, Seyit Ahmet Camtepe, Sahin Albayrak
In: 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), Montreal, Quebec, Canada; 2009

Identity Theft, Computers and Behavioral Biometrics
Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Seyit Ahmet Camtepe, Bernhard Löhlein, Ulrich Heister, Sebastian Möller, Lior Rokach, Yuval Elovici
In: IEEE Intelligence and Security Informatics 2009 (ISI2009), Dallas, TX, USA; 2009

Design and Modeling of Collaboration Architecture for Security
Rainer Bye, Seyit Ahmet Camtepe, Sahin Albayrak
In: International Symposium on Collaborative Technologies and Systems; 2009

Google Android - A Comprehensive Introduction
Hans-Gunther Schmidt, Karsten Raddatz, Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, and Sahin Albayrak
In: Berlin; 2009

Developing and Benchmarking Native Linux Applications on Android
Leonid Batyuk, Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Seyit Ahmet Camtepe, and Sahin Albayrak
In: Second International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications (Mobilware 2009), Berlin; 2009

Solving inherent problems of Anomaly Detection by Cooperation
Rainer Bye, Katja Luther,Seyit Ahmet Camtepe, Sahin Albayrak
2009

Static Analysis of Executables for Collaborative Malware Detection on Android
Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Jan Hendrik Clausen, Osman Kiraz, Kamer A. Yüksel, Seyit Ahmet Camtepe, and Sahin Albayrak
In: IEEE International Conference on Communications (ICC) 2009, Dresden, Germany; 2009

2008

Monitoring Smartphones for Anomaly Detection
Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Christian Scheel, Seyit Ahmet Camtepe, Sahin Albayrak
In: Mobile Networks and Applications; 2008

[Abstract] CIMD- Collaborative Intrusion and Malware Detection
Rainer Bye
In: Proceedings of the Third GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING) 2008; 2008

Enhancing Security of Linux-based Android Devices
Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Jan Hendrik Clausen, Kamer Ali Yüksel, Osman Kiraz, Seyit Ahmet Camtepe, Sahin Albayrak
In: 15th International Linux Kongress, 2008, Hamburg, Germany; 2008

[Abstract] Anomaly Detection on Smartphones
Aubrey-Derrick Schmidt
In: Proceedings of the Third GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING) 2008; 2008

Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft
Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Kamer Ali Yüksel, Osman Kiraz, Jan Hendrik Clausen, Karsten Raddatz, Seyit Ahmet Camtepe, and Sahin Albayrak
2008

CIMD-Collaborative Intrusion and Malware Detection
Rainer Bye, Sahin Albayrak
2008

Malicious Software for Smartphones
Aubrey-Derrick Schmidt, Sahin Albayrak
In: Berlin; 2008

Autonomous Security - Eine neuartige Architektur f?r netzwerkbasierte Intrusion Detection und Response
Sahin Albayrak, Katja Luther, Rainer Bye, Stephan Schmidt, Aubrey-Derrick Schmidt, Karsten Bsufka
In: 15. DFN Workshop Sicherheit in vernetzten Systemen; 2008

Monitoring Smartphones for Anomaly Detection
Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Sahin Albayrak
In: Mobilware 2008, Innsbruck, Österreich; 2008

Artificial Cell Communication in Distributed Systems
Michael Hilker, Katja Luther
In: Ginowan, Okinawa, Japan; 2008

Application-level simulation for network security
Rainer Bye, Stephan Schmidt, Katja Luther, Sahin Albayrak
In: First International Conference on Simulation Tools and Techniques for Communications, Networks and Systems, SimuTools 2008; 2008

2007

Analyse und Bewertung von vertraulichkeits-, integritäts- und authentizitätsbasierter Kommunikation mittels steganographischer Kryptologie
Arik Messerman
In: Berlin, Germany (Technische Universität Berlin); 2007

Decentralized Detector Generation in Cooperative Intrusion Detection Systems
Rainer Bye, Katja Luther, Seyit Ahmet Camtepe, Tansu Alpcan, Sahin Albayrak, Bülent Yener
In: Lecture Notes in Computer Science , Vol. 4838; 2007

A Cooperative AIS Framework for Intrusion Detection
Katja Luther, Rainer Bye, Tansu Alpcan, Sahin Albayrak, Achim Müller
In: IEEE International Conference on Communications (ICC 2007); 2007

2006

Intelligent Network-Based Early Warning Systems
Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak
In: In: Critical Information Infrasturctures Security First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006. Lecture Notes in Computer Science (LNCS) 4347. Editor Javier Lopez.. 2006. Springer.; 2006

Public Key Infrastrukturen in Agentenarchitekturen zur Realisierung dienstbasierter Anwendungen
Karsten Bsufka
In: Dissertation Technische Universität Berlin; 2006

2003

Automatische Verifikation von Statecharts durch Anbindung eines Model Checkers an einen Theorembeweiser
Tuvshintur Tserendorj
2003

2001

Integration von Public-Key-Infrastruktur-Funktionalitäten in Agenten-Toolkits
Sahin Albayrak, Karsten Bsufka
In: in Verteile Informationssysteme auf der Grundlage von Objekten, Komponenten und Agenten. PROCEEDINGS der Verbundtagung VertIS 2001; 2001

Agent-based Telematic Services and Telecom Applications
Stefan Fricke, Karsten Bsufka, Jan Keiser, Torge Schmidt, Ralf Sesseler, Sahin Albayrak
In: Communications of the ACM 44 (4), 2001, S. 43-48; 2001