Article PDF
Avoid common mistakes on your manuscript.
References
Angermeier D, Eichler J (2016) Risk-driven security engineering in the automotive domain. Embedded Security in Cars (escar USA)
Backes M, Buxmann P, Eckert C, Holz T, Müller-Quade J, Raabe O, Waidner M (2016) Key Challenges in IT Security Research, Discussion Paper for the Dialogue on IT Security 2016. SecUnity. https://it-security-map.eu
Beyerer J, Eckert C, Martini P, Waidner M (2014) Strategie- und Positionspapier Cyber-Sicherheit 2020, Herausforderungen für die IT-Sicherheitsforschung. Fraunhofer-Gesellschaft. https://www.aisec.fraunhofer.de/content/dam/aisec/Dokumente/Publikationen/Studien_TechReports/Fraunhofer-Strategie-und_Positionspapier_Cyber-Sicherheit2020.pdf
Eckert C (2014) IT-Sicherheit: Konzepte – Verfahren – Protokolle, 9. Aufl. De Gruyter
Eckert C (2017) Cyber-Sicherheit in der Industrie 4.0. In: Reinhart G (Hrsg) Handbuch Industrie 4.0: Geschäftsmodelle, Prozesse, Technik. Carl-Hanser Verlag (im Druck)
Eckert C, Fallenbeck N (2015) Industrie 4.0 meets IT-Sicherheit: eine Herausforderung! Informatik-Spektrum
Huber M, Horsch J, Velten M, Weiß M, Wessel S (2015) A Secure Architecture for Operating System-Level Virtualization on Mobile Devices. In: 11th International Conference on Information Security and Cryptology Inscrypt 2015.
Ibing A (2016) Dynamic Symbolic Execution with Interpolation Based Path Merging. In: Int Conf Advances and Trends in Software Engineering.
Kolosnjaji B, Zarras A, Lengyel T, Webster G, Eckert C (2016) Adaptive Semantics-Aware Malware Classification. In: 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment.
Lengyel T, Kittel T, Eckert C (2015) Virtual Machine Introspection with Xen on ARM. In: 2nd Workshop on Security in Highly Connected IT Systems (SHCIS).
Leukert B, Kubach T, Eckert C et al. IoT 2020: Smart and Secure IoT Platform. http://www.iec.ch/whitepaper/pdf/iecWP-loT2020-LR.pdf
Merli D, Sigl G, Eckert C (2013) Identities for embedded systems enabled by physical unclonable functions. Number Theory Cryptogr 8260:125–138
Muntean P, Adnan R, Ibing A, Eckert C (2015) Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code. In: International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE Computer Society, Vancouver, Canada
Otto B et al. Industrial Data Space. Whitepaper. https://www.fraunhofer.de/de/forschung/fraunhofer-initiativen/industrial-data-space.htm
Pfoh J (2013) Leveraging Derivative Virtual Machine Introspection Methods for Security Applications. Doctoral Thesis, Technische Universität München
Schimmel O, Hennig M (2014) Kopier- und Manipulationsschutz für eingebettete Systeme. Datenschutz Datensicherheit – DuD 38(11):742–746
Schütte J, Brost G (2016) A Data Usage Control System Using Dynamic Taint Tracking. In: Proceedings of the International Conference on Advanced Information Network and Applications (AINA).
Teichmann C, Renatus S, Eichler J (2016) Agile threat assessment and mitigation: an approach for method selection and tailoring. Int J Sec Software Eng (IJSSE) 7(1)
Titze D, Stephanow P, Schütte J (2014) App-Ray: User-Driven and Fully Automated Android App Security Assessment. Fraunhofer AISEC TechReport
Xiao H, Eckert C (2013) Indicative Support Vector Clustering with Its Application on Anomaly Detection. In: IEEE 12th International Conference on Machine Learning and Applications.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Eckert, C. Cybersicherheit beyond 2020!. Informatik Spektrum 40, 141–146 (2017). https://doi.org/10.1007/s00287-017-1025-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00287-017-1025-6