default search action
Sebastian Obermeier 0001
Person information
- affiliation: Hochschule Luzern, Switzerland
Other persons with the same name
- Sebastian Obermeier 0002 — University of Duisburg-Essen, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c34]Philip Zimmermann, Sebastian Obermeier:
Evaluating Digital Forensic Readiness: A Honeypot Approach. SECRYPT 2024: 615-621 - [c33]Sebastian Obermeier, Giorgio Tresoldi, Bernhard Tellenbach, Vincent Lenders:
HydroLab: A Versatile Hydroelectric Power Lab for Security Research and Education. SECRYPT 2024: 622-627 - 2023
- [j8]Sebastian Obermeier, Thomas Jösler, Stephan Renggli, Maurus Unternährer, Bernhard M. Hämmerli:
Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures. IEEE Secur. Priv. 21(5): 43-54 (2023)
2010 – 2019
- 2018
- [c32]Apala Ray, Vipin Raj, Manuel Oriol, Aurelien Monot, Sebastian Obermeier:
Bluetooth Low Energy Devices Security Testing Framework. ICST 2018: 384-393 - [c31]Thomas Locher, Sebastian Obermeier, Yvonne-Anne Pignolet:
When Can a Distributed Ledger Replace a Trusted Third Party? iThings/GreenCom/CPSCom/SmartData 2018: 1069-1077 - [i3]Thomas Locher, Sebastian Obermeier, Yvonne-Anne Pignolet:
When Can a Distributed Ledger Replace a Trusted Third Party? CoRR abs/1806.10929 (2018) - 2017
- [j7]Irfan Ahmed, Sebastian Obermeier, Sneha Sudhakaran, Vassil Roussev:
Programmable Logic Controller Forensics. IEEE Secur. Priv. 15(6): 18-24 (2017) - [j6]Roman Schlegel, Sebastian Obermeier, Johannes Schneider:
A security evaluation of IEC 62351. J. Inf. Secur. Appl. 34: 197-204 (2017) - 2016
- [c30]Johannes Schneider, Bin Lu, Thomas Locher, Yvonne-Anne Pignolet, Matús Harvan, Sebastian Obermeier:
Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance. SECRYPT 2016: 49-60 - 2015
- [c29]Alexandru Vlad Serbanescu, Sebastian Obermeier, Der-Yeuan Yu:
A Scalable Honeynet Architecture for Industrial Control Systems. ICETE (Selected Papers) 2015: 179-200 - [c28]Roman Schlegel, Sebastian Obermeier, Johannes Schneider:
Assessing the Security of IEC 62351. ICS-CSR 2015 - [c27]Johannes Schneider, Sebastian Obermeier, Roman Schlegel:
Cyber Security Maintenance for SCADA Systems. ICS-CSR 2015 - [c26]Alexandru Vlad Serbanescu, Sebastian Obermeier, Der-Yeuan Yu:
ICS Threat Analysis Using a Large-Scale Honeynet. ICS-CSR 2015 - [c25]Roman Schlegel, Sebastian Obermeier, Johannes Schneider:
Structured system threat modeling and mitigation analysis for industrial automation systems. INDIN 2015: 197-203 - [c24]Alexandru Vlad Serbanescu, Sebastian Obermeier, Der-Yeuan Yu:
A Flexible Architecture for Industrial Control System Honeypots. SECRYPT 2015: 16-26 - [c23]Roman Schlegel, Ana Hristova, Sebastian Obermeier:
A Framework for Incident Response in Industrial Control Systems. SECRYPT 2015: 178-185 - 2014
- [c22]Sebastian Obermeier, Michael Wahler, Thanikesavan Sivanthi, Roman Schlegel, Aurelien Monot:
Automatic attack surface reduction in next-generation industrial control systems. CICS 2014: 42-49 - [c21]Sebastian Obermeier, Ragnar Schierholz, Ana Hristova:
Securing industrial automation and control systems using application whitelisting. ETFA 2014: 1-4 - [c20]Robin Chapas, Ana Hristova, Thomas Locher, Sebastian Obermeier:
Securing Industrial Control Systems through Autonomous Hardening. ICS-CSR 2014 - 2013
- [c19]Ana Hristova, Sebastian Obermeier, Roman Schlegel:
Secure design of engineering software tools in Industrial Automation and Control Systems. INDIN 2013: 695-700 - 2012
- [j5]Irfan Ahmed, Sebastian Obermeier, Martin Naedele, Golden G. Richard III:
SCADA Systems: Challenges for Forensic Investigators. Computer 45(12): 44-51 (2012) - 2011
- [j4]Sebastian Obermeier, Stefan Böttcher:
Protecting a Distributed Voting Schema for Anonymous and Secure Voting Against Attacks of Malicious Partners. Int. J. E Serv. Mob. Appl. 3(3): 31-48 (2011) - 2010
- [c18]Sebastian Obermeier, Stefan Böttcher:
Constraint Checking for Non-blocking Transaction Processing in Mobile Ad-hoc Networks. ICEIS (1) 2010: 166-175
2000 – 2009
- 2009
- [j3]Sebastian Obermeier, Stefan Böttcher, Martin Hett, Panos K. Chrysanthis, George Samaras:
Blocking reduction for distributed transaction processing within MANETs. Distributed Parallel Databases 25(3): 165-192 (2009) - [j2]Sebastian Obermeier, Stefan Böttcher, Dominik Kleine:
A cross-layer atomic commit protocol implementation for transaction processing in mobile ad-hoc networks. Distributed Parallel Databases 26(2-3): 319-351 (2009) - [c17]Hanh Quyen Nguyen, Friedrich Köster, Michael Klaas, Walter Brenner, Sebastian Obermeier, Markus Brändle:
Tool Support for Achieving Qualitative Security Assessments of Critical Infrastructures - The ESSAF Framework for Structured Qualitative Analysis. SECRYPT 2009: 297-304 - [c16]Friedrich Köster, Michael Klaas, Hanh Quyen Nguyen, Walter Brenner, Markus Brändle, Sebastian Obermeier:
Collaborative Security Assessments in Embedded Systems Development - The ESSAF Framework for Structured Qualitative Analysis. SECRYPT 2009: 305-312 - 2008
- [b1]Sebastian Obermeier:
Database transaction management in mobile ad-hoc networks. University of Paderborn, Germany, 2008, pp. 1-119 - [j1]Stefan Böttcher, Sebastian Obermeier:
Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants. J. Softw. 3(1): 9-17 (2008) - [c15]Sebastian Obermeier, Stefan Böttcher:
XML fragment caching for large-scale mobile commerce applications. ICEC 2008: 26:1-26:7 - [c14]Sebastian Obermeier, Stefan Böttcher, Martin Hett, Panos K. Chrysanthis, George Samaras:
Adjourn State Concurrency Control Avoiding Time-Out Problems in Atomic Commit Protocols. ICDE 2008: 1477-1479 - [c13]Sebastian Obermeier, Stefan Böttcher, Dominik Kleine:
CLCP - A Distributed Cross-Layer Commit Protocol for Mobile Ad Hoc Networks. ISPA 2008: 361-370 - [c12]Stefan Böttcher, Sebastian Obermeier, Adelhard Türling, Jan Henrik Wiesner:
Segmentation-Based Caching for Mobile Auctions. TAMoCo 2008: 20-31 - 2007
- [c11]Stefan Böttcher, Sebastian Obermeier:
Secure Anonymous Union Computation Among Malicious Partners. ARES 2007: 128-138 - [c10]Stefan Böttcher, Sebastian Obermeier, Thomas Wycisk:
XML Query Result Size Estimation for Small Bandwidth Devices. BNCOD 2007: 172-175 - [c9]Stefan Böttcher, Sebastian Obermeier:
Dynamic commit tree management for service oriented architectures. ICEIS (1) 2007: 95-101 - [c8]Stefan Böttcher, Sebastian Obermeier:
Reliable Intersection Computation within Malicious Environments. ICETE (Selected Papers) 2007: 239-253 - [c7]Sebastian Obermeier, Stefan Böttcher:
Avoiding Infinite Blocking of Mobile Transactions. IDEAS 2007: 63-71 - [c6]Sebastian Obermeier, Stefan Böttcher, Thomas Wycisk:
XPath Selectivity Estimation for a Mobile Auction Application. IDEAS 2007: 251-262 - [c5]Stefan Böttcher, Le Gruenwald, Sebastian Obermeier:
A Failure Tolerating Atomic Commit Protocol for Mobile Environments. MDM 2007: 158-165 - [c4]Sebastian Obermeier, Stefan Böttcher:
Secure Computation of Common Data among Malicious Partners. SECRYPT 2007: 345-354 - 2006
- [c3]Stefan Böttcher, Le Gruenwald, Sebastian Obermeier:
Reducing Sub-transaction Aborts and Blocking Time Within Atomic Commit Protocols. BNCOD 2006: 59-72 - [c2]Stefan Böttcher, Sebastian Obermeier:
Sovereign Information Sharing Among Malicious Partners. Secure Data Management 2006: 18-29 - [i2]Peter A. Boncz, Angela Bonifati, Joos-Hendrik Böse, Stefan Böttcher, Panos K. Chrysanthis, Le Gruenwald, Arantza Illarramendi, Peter Janacik, Birgitta König-Ries, Wolfgang May, Anirban Mondal, Sebastian Obermeier, Aris M. Ouksel, George Samaras:
06431 Working Group Summary: P2P, Ad Hoc and Sensor Networks - All the Different or All the Same?. Scalable Data Management in Evolving Networks 2006 - [i1]Sebastian Obermeier, Joos-Hendrik Böse, Stefan Böttcher, Panos K. Chrysanthis, Alex Delis, Le Gruenwald, Anirban Mondal, Aris M. Ouksel, George Samaras, Stratis Viglas:
06431 Working Group Summary: Atomicity in Mobile Networks. Scalable Data Management in Evolving Networks 2006 - 2005
- [c1]Joos-Hendrik Böse, Stefan Böttcher, Le Gruenwald, Sebastian Obermeier, Heinz Schweppe, Thorsten Steenweg:
An Integrated Commit Protocol for Mobile Network Databases. IDEAS 2005: 244-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint