Welkom...

dr. A. Peter (Andreas)

Universitair docent in Security & Privacy Engineering

Publicaties

Recent
Esquivel Vargas, H. T., Caselli, M., & Peter, A. (2017). Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol. In CPS'17, Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy (pp. 25-36). ACM Publishing. DOI: 10.1145/3140241.3140244
Bortolameotti, R., van Ede, T. S., Caselli, M., Everts, M. H., Hartel, P. H., Hofstede, R., ... Peter, A. (2017). DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. In ACSAC 2017, Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 373-386). DOI: 10.1145/3134600.3134605
van de Kamp, T. R., Peter, A., Everts, M. H., & Jonker, W. (2017). Multi-client Predicate-only Encryption for Conjunctive Equality Tests. Paper presented at 16th International Conference on Cryptology And Network Security 2017, Hong Kong, China.
Karvelas, N. P., Peter, A., & Katzenbeisser, S. (2017). Using Oblivious RAM in Genomic Studies. In J. Garcia-Alfaro, G. Navarro-Aribas, H. Hartenstein, & J. Herrera-Joancomarti (Eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings (pp. 35-52). (Lecture notes in computer science; Vol. 10436). Springer. DOI: 10.1007/978-3-319-67816-0_3
Bortolameotti, R., Peter, A., Everts, M. H., Jonker, W., & Hartel, P. H. (2016). Reliably determining data leakage in the presence of strong attackers. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016 (pp. 484-495). New York: Association for Computing Machinery. DOI: 10.1145/2991079.2991095
van de Kamp, T. R., Peter, A., Everts, M. H., & Jonker, W. (2016). Private Sharing of IOCs and Sightings. In 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016 (pp. 35-38). New York: Association for Computing Machinery. DOI: 10.1145/2994539.2994544
Bortolameotti, R., Peter, A., Everts, M. H., & Bolzoni, D. (2015). Indicators of Malicious SSL Connections. In 9th International Conference on Network and System Security, NSS 2015 (pp. 162-175). (Lecture Notes in Computer Science; Vol. 9408). New York: Springer. DOI: 10.1007/978-3-319-25645-0_11
Dietzel, S., Peter, A., & Kargl, F. (2015). Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks. In IEEE 81st Vehicular Technology Conference, VTC Spring 2015 (pp. 1-5). Piscataway, NJ, USA: IEEE. DOI: 10.1109/VTCSpring.2015.7146074
Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H., & Jonker, W. (2015). Publicly Verifiable Private Aggregation of Time-Series Data. In 10th International Conference on Availability, Reliability and Security, ARES 2015 (pp. 50-59). Piscataway, NJ, USA: IEEE. DOI: 10.1109/ARES.2015.82

Pure Link

Google Scholar Link

Contactgegevens

Bezoekadres

Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling (gebouwnr. 11), kamer 4063
Hallenweg 19
7522NH  Enschede

Navigeer naar locatie

Postadres

Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling  4063
Postbus 217
7500 AE Enschede