Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Julien Broisin
Claudia Calabrese
Rommert Dekker
Hao Mao
Peter Malec
Keith Hansen
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
SEBASTIAN BIEDERMANN
Author Info
Open Visualization
Name
Affiliation
Papers
SEBASTIAN BIEDERMANN
Security Engineering Group, Technische Universität Darmstadt, Darmstadt, Germany
17
Collaborators
Citations
PageRank
20
82
7.98
Referers
Referees
References
270
553
200
Search Limit
100
553
Publications (17 rows)
Collaborators (20 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Covert channels using mobile device's magnetic field sensors
7
0.49
2016
Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors.
8
0.55
2015
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
3
0.37
2014
Hot-hardening: getting more out of your security settings.
2
0.36
2014
Data-centric phishing detection based on transparent virtualization technologies
0
0.34
2014
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
6
0.53
2014
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation
20
1.13
2014
Leveraging virtual machine introspection for hot-hardening of arbitrary cloud-user applications
2
0.38
2014
SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection.
1
0.35
2014
Lightweight energy consumption-based intrusion detection system for wireless sensor networks
8
0.47
2013
Event-based isolation of critical data in the cloud.
0
0.34
2013
Improving security of virtual machines during live migrations.
7
0.52
2013
On the Application of Supervised Machine Learning to Trustworthiness Assessment
4
0.40
2013
Fast dynamic extracted honeypots in cloud computing
6
0.51
2012
On Data-Centric Intrusion Detection in Wireless Sensor Networks
0
0.34
2012
Trustable outsourcing of business processes to cloud computing environments.
4
0.41
2011
Detecting computer worms in the cloud
4
0.51
2011
1