- Privacy, Security, and Data Protection
- Complex Network Analysis Techniques
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Privacy-Preserving Technologies in Data
- RFID technology advancements
- Peer-to-Peer Network Technologies
- Blockchain Technology Applications and Security
- Spam and Phishing Detection
- Cryptography and Data Security
- Cloud Data Security Solutions
- Caching and Content Delivery
- Access Control and Trust
- Cybercrime and Law Enforcement Studies
- Digital Marketing and Social Media
- Service-Oriented Architecture and Web Services
- Hate Speech and Cyberbullying Detection
- Data Quality and Management
- Advanced Malware Detection Techniques
- IPv6, Mobility, Handover, Networks, Security
- User Authentication and Security Systems
- Social Media and Politics
- Information and Cyber Security
- Ethics and Social Impacts of AI
- Graph theory and applications
Technical University of Applied Sciences Wildau
2020-2024
Humboldt-Universität zu Berlin
2012-2024
Technical University of Cluj-Napoca
2024
Weizenbaum Institute
2021-2023
Hochschule für Telekommunikation Leipzig
2016-2021
Fraunhofer Institute for Open Communication Systems
2021
Technische Universität Berlin
2021
Detec (Norway)
2021
University of Potsdam
2018
University of Guilan
2015
In this explorative study, we examine the economy and transaction network of decentralized digital currency Bitcoin during first four years its existence. The objective is to develop insights into evolution period. For this, establish analyze a novel integrated dataset that enriches data from blockchain with off-network such as business categories geo-locations. Our analyses reveal major businesses markets. results also give on distribution by countries how evolve over time. We show there...
Online privacy policies notify users of a Website how their personal information is collected, processed and stored. Against the background rising concerns, seem to represent an influential instrument for increasing customer trust loyalty. However, in practice, consumers actually read only rare cases, possibly reflecting common assumption stating that are hard comprehend. By designing implementing automated extraction readability analysis toolset embodies diversity established measures, we...
Research on the robustness of networks, and in particular Internet, has gained critical importance recent decades because more individuals, societies firms rely this global network infrastructure for communication, knowledge transfer, business processes e-commerce. In particular, modeling structure Internet inspired several novel graph metrics assessing important topological features large complex networks. This survey provides a comparative overview these metrics, presents their strengths...
In recent decades, artificial intelligence has undergone transformative advancements, reshaping diverse sectors such as healthcare, transport, agriculture, energy, and the media. Despite enthusiasm surrounding AI’s potential, concerns persist about its potential negative impacts, including substantial energy consumption ethical challenges. This paper critically reviews evolving landscape of AI sustainability, addressing economic, social, environmental dimensions. The literature is...
In the emerging Internet of Things rich data on real-world objects and events will be generated in vast amounts stored widely distributed databases. truly global dynamic application scenarios, intermediate brokers are needed to find these data, even if exact location form storage initially unknown requester. Discovery Services aimed fill this gap: they respond requests for specific with a list corresponding providers. paper, we frame functional requirements Services, perform an overview...
The accelerated adoption of cloud computing among enterprises is due to the multiple benefits technology provides, one them simplification inter-organizational information sharing, which utmost importance in healthcare. Nevertheless, moving sensitive health records still implies severe security and privacy risks. With this background, we present a novel secure architecture for sharing electronic environment. We first conducted systematic literature review interviews with different experts...
The EPCglobal Network is an emerging global information architecture for supporting Radio-Frequency Identification (RFID) in supply chains. Discovery services the are distributed that serve following pivotal lookup function: Given identifier a real-world object, e.g., Electronic Product Code (EPC) stored on RFID tag, they return list of Internet addresses offer additional about object. Since client's interests can be used to create inventory lists and profiles his physical surroundings, as...
The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with electronic product codes (EPC). A so-called object naming service (ONS) used locate sources these in the Network. But ONS based on DNS, which suffers from well-studied weaknesses robustness, configuration complexity and security. There are promising approaches enhance performance robustness of DNS by using structured P2P systems distributed hash tables (DHT) that have high...
Introduction The "Internet of Things," once reality, will have to rely on a global IT infrastructure that provides information about all those "things" in secure and reliable manner. EPCglobal Network is proposal for widely distributed system offer such services. But it may introduce more challenges concerning security, privacy, political control than was initially anticipated. If the vision many RFID proponents becomes true, common objects soon acquire cyber presence. Objects be equipped...
Despite substantial investments, data science has failed to deliver significant business value in many companies. So far, the reasons for this problem have not been explored systematically. This study tries find possible explanations shortcoming and analyses specific challenges data-driven projects. To identify that make projects fall short of expectations, multiple rounds qualitative semi-structured interviews with domain experts different roles were carried out. was followed by a...
The Bitcoin digital currency increasingly attracts an essential number of Internet users. This study focuses on the future outlook by identifying drivers and impediments currency's adoption. For this aim, we conduct empirical survey around one hundred experts discuss results. Our research contributes to practical theoretical discussions in cryptocurrency field broadens understanding adoption perspectives Bitcoin.
Cloud computing promises essential improvements in healthcare delivery performance. However, its wide adoption is yet to be seen, one main reason being patients’ concerns for security and privacy of their sensitive medical records. These can addressed through corresponding requirements within the system engineering process. Despite a plethora related research, cloud systems services have seldomly been investigated methodically so far, whereas individual priorities increase success...
Abstract Empirical insights into promising commercial sentiment analysis solutions that go beyond the claims of their vendors are rare. Moreover, due to constant evolution in field, previous studies far from reflecting current situation. The goal this article is evaluate and compare using two experimental studies. In first part study, based on tweets about airline service quality, we test six with different market power, such as Amazon, Google, IBM, Microsoft, Lexalytics, MeaningCloud,...
Name Services for the Internet of Things (specifically, EPCglobal Network) are distributed systems that serve following fundamental lookup function: Given an identifier a real-world object, e.g., Electronic Product Code (EPC), they return list addresses services, which offer additional information about this object. Without name services acting as broker between items and their sources, could not achieve flexibility global scalability necessary to live up its vision. The currently specified...
Over the years, a drastic increase in online information disclosure spurs wave of concerns from multiple stakeholders. Among others, users resent “behind closed doors” processing their personal data by companies. Privacy policies are supposed to inform how is handled website. However, several studies have shown that rarely read privacy for various reasons, not least because limitedly readable policy texts difficult understand. Based on our survey with over 440 responses, we examine objective...