What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Stefan Rass
Google Scholar
ORCID:
0000-0003-2821-2489
12
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
Koney: A Cyber Deception Orchestration Framework for Kubernetes.
Mario Kahlhofer
Matteo Golinelli
Stefan Rass
2024
journals/tifs
Metricizing the Euclidean Space Toward Desired Distance Relations in Point Clouds.
Stefan Rass
Sandra König
Shahzad Ahmad
Maksim Goman
2024
conf/uss
PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing.
Gelei Deng
Yi Liu
Víctor Mayoral Vilches
Peng Liu
Yuekang Li
Yuan Xu
Martin Pinzger
Stefan Rass
Tianwei Zhang
Yang Liu
2024
conf/eurosp
Application Layer Cyber Deception Without Developer Interaction.
Mario Kahlhofer
Stefan Rass
2023
journals/compsec
Game-theoretic APT defense: An experimental study on robotics.
Stefan Rass
Sandra König
Jasmin Wachter
Víctor Mayoral Vilches
Emmanouil Panaousis
2022
journals/compsec
Supervised Machine Learning with Plausible Deniability.
Stefan Rass
Sandra König
Jasmin Wachter
Manuel Egger
Manuel Hobisch
2022
conf/cns
Towards Cost-Benefit-Aware Adaptive Monitoring for Cyber-Physical Systems.
Michael Vierhauser
Rebekka Wohlrab
Stefan Rass
2020
journals/compsec
Computer & security special issue editorial.
Stefan Rass
Quanyan Zhu
2020
journals/istr
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems.
Florian Skopik
Max Landauer
Markus Wurzenberger
Gernot Vormayr
Jelena Milosevic
Joachim Fabini
Wolfgang Prüggler
Oskar Kruschitz
Benjamin Widmann
Kevin Truckenthanner
Stefan Rass
Michael Simmer
Christoph Zauner
2018
conf/ccs
Game Theory Meets Network Security: A Tutorial.
Quanyan Zhu
Stefan Rass
2015
conf/cns
Licensed processing of encrypted information.
Stefan Rass
Peter Schartner
2014
conf/latincrypt
On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages.
Fabrizio De Santis
Stefan Rass
Coauthors
Benjamin Widmann
(1)
Christoph Zauner
(1)
Emmanouil Panaousis
(1)
Fabrizio De Santis
(1)
Florian Skopik
(1)
Gelei Deng
(1)
Gernot Vormayr
(1)
Jasmin Wachter
(2)
Jelena Milosevic
(1)
Joachim Fabini
(1)
Kevin Truckenthanner
(1)
Maksim Goman
(1)
Manuel Egger
(1)
Manuel Hobisch
(1)
Mario Kahlhofer
(2)
Markus Wurzenberger
(1)
Martin Pinzger
(1)
Matteo Golinelli
(1)
Max Landauer
(1)
Michael Simmer
(1)
Michael Vierhauser
(1)
Oskar Kruschitz
(1)
Peng Liu
(1)
Peter Schartner
(1)
Quanyan Zhu
(2)
Rebekka Wohlrab
(1)
Sandra König
(3)
Shahzad Ahmad
(1)
Stefan Rass
(12)
Tianwei Zhang
(1)
Víctor Mayoral Vilches
(2)
Wolfgang Prüggler
(1)
Yang Liu
(1)
Yi Liu
(1)
Yuan Xu
(1)
Yuekang Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to