default search action
Jan von der Assen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j4]Chao Feng, Alberto Huertas Celdrán, Jan von der Assen, Enrique Tomás Martínez Beltrán, Gérôme Bovet, Burkhard Stiller:
DART: A Solution for decentralized federated learning model robustness analysis. Array 23: 100360 (2024) - [j3]Muriel Figueredo Franco, Fabian Künzler, Jan von der Assen, Chao Feng, Burkhard Stiller:
RCVaR: An economic approach to estimate cyberattacks costs using data from industry reports. Comput. Secur. 139: 103737 (2024) - [j2]Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jan von der Assen, Timo Schenk, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT. IEEE Trans. Inf. Forensics Secur. 19: 5520-5529 (2024) - 2023
- [j1]Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jan von der Assen, Dennis Shushack, Ángel Luis Perales Gómez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Behavioral fingerprinting to detect ransomware in resource-constrained devices. Comput. Secur. 135: 103510 (2023)
Conference and Workshop Papers
- 2024
- [c15]Jan von der Assen, Alberto Huertas Celdrán, Jamo Sharif, Chao Feng, Gérôme Bovet, Burkhard Stiller:
ThreatFinderAI: Automated Threat Modeling Applied to LLM System Integration. CNSM 2024: 1-3 - [c14]Jan von der Assen, Jasmin Hochuli, Thomas Grübl, Burkhard Stiller:
The Danger Within: Insider Threat Modeling Using Business Process Models. CSR 2024: 186-192 - [c13]Jan von der Assen, Jamo Sharif, Chao Feng, Christian Killer, Gérôme Bovet, Burkhard Stiller:
Asset-Centric Threat Modeling for AI-Based Systems. CSR 2024: 437-444 - [c12]Jan von der Assen, Christian Killer, Alessandro De Carli, Burkhard Stiller:
Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds. ICBC 2024: 1-6 - [c11]Chao Feng, Jan von der Assen, Alberto Huertas Celdrán, Raffael Mogicato, Adrian Zermin, Vichhay Ok, Gérôme Bovet, Burkhard Stiller:
SecBox: a Lightweight Data Mining Platform for Dynamic and Reproducible Malware Analysis. SDS 2024: 62-67 - 2023
- [c10]Jan von der Assen, Alberto Huertas Celdrán, Nicolas Huber, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices. CSR 2023: 123-129 - [c9]Jan von der Assen, Alberto Huertas Celdrán, Janik Luechinger, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
RansomAI: AI-Powered Ransomware for Stealthy Encryption. GLOBECOM 2023: 2578-2583 - [c8]Jan von der Assen, Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jordan Cedeño, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices. ICC 2023: 6010-6015 - [c7]Jan von der Assen, Alberto Huertas Celdrán, Adrian Zermin, Raffael Mogicato, Gérôme Bovet, Burkhard Stiller:
SecBox: A Lightweight Container-based Sandbox for Dynamic Malware Analysis. NOMS 2023: 1-3 - [c6]Alberto Huertas Celdrán, Jan von der Assen, Konstantin Moser, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Early Detection of Cryptojacker Malicious Behaviors on IoT Crowdsensing Devices. NOMS 2023: 1-8 - 2022
- [c5]Jan von der Assen, Muriel Figueredo Franco, Christian Killer, Eder J. Scheid, Burkhard Stiller:
CoReTM: An Approach Enabling Cross-Functional Collaborative Threat Modeling. CSR 2022: 189-196 - [c4]Christian Killer, Moritz Eck, Bruno Rodrigues, Jan von der Assen, Roger Staubli, Burkhard Stiller:
ProvotuMN: Decentralized, Mix-Net-based, and Receipt-free Voting System. ICBC 2022: 1-9 - [c3]Katharina O. E. Müller, Jan von der Assen, Chao Feng, Burkhard Stiller:
An Overview and Ontology of Privacy to Preserve Privacy in Ultra-Wideband Networks. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2317-2324 - 2021
- [c2]Muriel Figueredo Franco, Jan von der Assen, Luc Boillat, Christian Killer, Bruno Rodrigues, Eder J. Scheid, Lisandro Zambenedetti Granville, Burkhard Stiller:
SecGrid: a Visual System for the Analysis and ML-based Classification of Cyberattack Traffic. LCN 2021: 140-147 - [c1]Muriel Figueredo Franco, Jan von der Assen, Luc Boillat, Christian Killer, Bruno Rodrigues, Eder J. Scheid, Lisandro Zambenedetti Granville, Burkhard Stiller:
Poster: DDoSGrid: a Platform for the Post-mortem Analysis and Visualization of DDoS Attacks. Networking 2021: 1-3
Data and Artifacts
- 2022
- [d1]Ramon Solo de Zaldivar, Alberto Huertas Celdrán, Jan von der Assen, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
MalwSpecSys: A Dataset Containing Syscalls of an IoT Spectrum Sensor Affected by Heterogeneous Malware. IEEE DataPort, 2022
Informal and Other Publications
- 2024
- [i15]Jan von der Assen, Chao Feng, Alberto Huertas Celdrán, Róbert Oles, Gérôme Bovet, Burkhard Stiller:
GuardFS: a File System for Integrated Detection and Mitigation of Linux-based Ransomware. CoRR abs/2401.17917 (2024) - [i14]Jan von der Assen, Muriel Figueredo Franco, Muyao Dong, Burkhard Stiller:
QuantTM: Business-Centric Threat Quantification for Risk Management and Cyber Resilience. CoRR abs/2402.14140 (2024) - [i13]Jan von der Assen, Jamo Sharif, Chao Feng, Gérôme Bovet, Burkhard Stiller:
Asset-driven Threat Modeling for AI-based Systems. CoRR abs/2403.06512 (2024) - [i12]Jan von der Assen, Christian Killer, Alessandro De Carli, Burkhard Stiller:
Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds. CoRR abs/2404.08306 (2024) - [i11]Jan von der Assen, Jasmin Hochuli, Thomas Grübl, Burkhard Stiller:
The Danger Within: Insider Threat Modeling Using Business Process Models. CoRR abs/2406.01135 (2024) - [i10]Chao Feng, Alberto Huertas Celdrán, Jan von der Assen, Enrique Tomás Martínez Beltrán, Gérôme Bovet, Burkhard Stiller:
DART: A Solution for Decentralized Federated Learning Model Robustness Analysis. CoRR abs/2407.08652 (2024) - [i9]Thomas Grübl, Jan von der Assen, Markus Knecht, Burkhard Stiller:
PACCOR4ESP: Embedded Device Security Attestation using Platform Attribute Certificates. CoRR abs/2407.14286 (2024) - [i8]Chao Feng, Alberto Huertas Celdrán, Zien Zeng, Zi Ye, Jan von der Assen, Gérôme Bovet, Burkhard Stiller:
Leveraging MTD to Mitigate Poisoning Attacks in Decentralized FL with Non-IID Data. CoRR abs/2409.19302 (2024) - [i7]Chao Feng, Hongjie Guan, Alberto Huertas Celdrán, Jan von der Assen, Gérôme Bovet, Burkhard Stiller:
FedEP: Tailoring Attention to Heterogeneous Data Distribution with Entropy Pooling for Decentralized Federated Learning. CoRR abs/2410.07678 (2024) - 2023
- [i6]Jan von der Assen, Alberto Huertas Celdrán, Janik Luechinger, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
RansomAI: AI-powered Ransomware for Stealthy Encryption. CoRR abs/2306.15559 (2023) - [i5]Jan von der Assen, Alberto Huertas Celdrán, Rinor Sefa, Gérôme Bovet, Burkhard Stiller:
MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation. CoRR abs/2306.15566 (2023) - [i4]Muriel Figueredo Franco, Fabian Künzler, Jan von der Assen, Chao Feng, Burkhard Stiller:
RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports. CoRR abs/2307.11140 (2023) - [i3]Chao Feng, Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jan Kreischer, Jan von der Assen, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation. CoRR abs/2308.05978 (2023) - 2022
- [i2]Jan von der Assen, Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jordan Cedeño, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices. CoRR abs/2210.07719 (2022) - [i1]Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jan von der Assen, Timo Schenk, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT. CoRR abs/2212.14647 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 21:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint