- Blockchain Technology Applications and Security
- Image and Video Quality Assessment
- Data Visualization and Analytics
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Digital Transformation in Industry
- Virtual Reality Applications and Impacts
- Spam and Phishing Detection
- Digital and Cyber Forensics
- Cryptography and Data Security
- Complex Network Analysis Techniques
- Personal Information Management and User Behavior
- Cloud Data Security Solutions
- Access Control and Trust
- Caching and Content Delivery
- Network Security and Intrusion Detection
- Peer-to-Peer Network Technologies
- Privacy, Security, and Data Protection
- Library Science and Information Systems
- Information and Cyber Security
University of Regensburg
2019-2022
Ineffective data management practices pose serious issues to individuals and companies, e.g., risk of identity theft online exposure. Self-sovereign (SSI) is a new approach that ensures users have full control their personal data. In this work, we alleviate breach user privacy problems by showing how SSI can fit within the context established enterprise access technologies. light recent endeavors, explore use decentralized identifiers, verifiable credentials, blockchains support SSI. We...
In many organizations, permissioned blockchain networks are currently transitioning from a proof-of-concept stage to production use. A crucial part of this transition is ensuring awareness potential threats network operations. Due the plethora software components involved in distributed ledgers, may be difficult or impossible detect without structured monitoring approach. To end, we conduct survey attacks on blockchains and develop set threat indicators. gather these indicators, data...
Abstract The exchange of threat intelligence information can make a significant contribution to improving IT security in companies and has become increasingly important recent years. However, such an also entails costs risks, preventing many from participating. In addition, since legal reporting requirements were introduced various countries, certain must be taken into account the process. existing platforms neither offer incentives participate process, nor fulfill resulting obligations....
Security incidents in blockchain-based systems are frequent nowadays, which calls for more structured efforts incident reporting and response. To improve the current status quo of on blogs social media, we propose a decentralized discussion system. Our approach guides users (security novices) towards classification their observations using tiered taxonomy blockchain incidents. Questions based previous interactively support classification. Post submission security response committee then...
In 2021, enterprise distributed ledger technology has evolved beyond the proof-of-concept stage.It is now providing business value to large consortia in several successful and well documented case studies.Nevertheless, other initiatives are stuck early stages of consortium formation or conceptualization.They stand benefit from lessons learned by consortia, but an in-depth comparison not yet been conducted.Thus, this study performs first methodological DLT that have launched a product.Based...
Today, permissioned blockchains are being adopted by large organizations for business critical operations. Consequently, they subject to attacks malicious actors. Researchers have discovered and enumerated a number of that could threaten availability, integrity confidentiality blockchain data. However, currently it remains difficult detect these attacks. We argue security experts need appropriate visualizations assist them in detecting on networks. To achieve this, we develop HyperSec,...