Stephan Schmidt

Dipl.- Inform.
Stephan SchmidtTelefon - Stephan Schmidt +49 30 - 314-74046
E-Mail - Stephan Schmidt E-Mail


Organizational IT Risk Management
Network Algorithms, Optimization
Risk Analysis/Risk Mitigation
Decision Theory, Utility Theory, Game Theory, MDPs

Aktuelle Projektbeteiligung

Decision Cockpit/IT Risk Management

Persönliche Angaben

Dipl-Inform. Stephan Schmidt received his diploma degree in computer science in 2005 at the Technische Universität Berlin specializing in operating and communication systems. Additionally, he received a minor degree in mathematics. He is working as a scientific researcher at the DAI laboratories in the Malware Filtering project. His main areas of interest are network algorithms, game theory, optimization techniques and their application to the network security domain.



Application-level simulation for network security
Stephan Schmidt, Rainer Bye, Joel Chinnow, Karsten Bsufka, Ahmet Camtepe, Sahin Albayrak
In: Simulation: Transactions of The Society for Modeling and Simulation International; 2010

Spectral Analysis of Signed Graphs for Clustering, Prediction and Visualization
Jérôme Kunegis, Stephan Schmidt, Andreas Lommatzsch, Jürgen Lerner, Ernesto W. De Luca, Sahin Albayrak
In: Proc. SIAM Int. Conf. on Data Mining; 2010

Agent-based Decision Support: A Case-Study on DSL Access Networks
Karsten Bsufka, Rainer Bye, Joël Chinnow, Stephan Schmidt, and Leonid Batyuk
In: Proceedings of the Twenty-Second Innovative Applications of Artificial Intelligence Conference (IAAI-10), Association for the Advancement of Artificial Intelligence, 2010, pp. 1757-1762; 2010

A Hierarchical Framework for Quantitative Corporate IT Risk Management
Stephan Schmidt, Sahin Albayrak
In: Future Security, 5th Security Research Conf., Berlin 2010; 2010

A Quantitative Framework for Dependency-Aware Organizational IT Risk Management
Stephan Schmidt, Sahin Albayrak
In: Proc. of the 10th Int. Conf. on Intelligent System Design and Applications (ISDA 2010); 2010


An Extensible Simulation Framework for Critical Infrastructure Security
Joël Chinnow, Rainer Bye, Stephan Schmidt, Karsten Bsufka, Seyit Ahmet Camtepe, Sahin Albayrak


Application-level simulation for network security
Rainer Bye, Stephan Schmidt, Katja Luther, Sahin Albayrak
In: First International Conference on Simulation Tools and Techniques for Communications, Networks and Systems, SimuTools 2008; 2008

Autonomous Security - Eine neuartige Architektur f?r netzwerkbasierte Intrusion Detection und Response
Sahin Albayrak, Katja Luther, Rainer Bye, Stephan Schmidt, Aubrey-Derrick Schmidt, Karsten Bsufka
In: 15. DFN Workshop Sicherheit in vernetzten Systemen; 2008

Modeling Collaborative Similarity with the Signed Resistance Distance Kernel
Jérôme Kunegis, Stephan Schmidt, Şahin Albayrak, Christian Bauckhage, Martin Mehlitz
In: 18th European Conference on Artificial Intelligence (ECAI 2008); 2008

A hierarchical approach to intrusion detection and response in MANETs
Stephan Schmidt
In: Proceedings of the Third GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING); 2008


A Malware Detector Placement Game for Intrusion Detection
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tamer Basar, Achim Müller
In: CRITIS, 2nd International Workshop on Critical Information Infrastructures Security; 2007

Collaborative Filtering using Electrical Resistance Network Models with Negative Edges
Jérôme Kunegis, Stephan Schmidt
In: Industrial Conference on Data Mining 2007; 2007

Malware Filtering for Network Security Using Weighted Optimality Measures
Michael Bloem, Tansu Alpcan, Stephan Schmidt, Tamer Basar
In: IEEE Multi-conference on Systems and Control 2007; 2007