Frank Kargl
Universität Ulm
H-index: 51
Europe-Germany
Top articles of Frank Kargl
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Network Attack Detection and Defense-AI-Powered Threats and Responses (Dagstuhl Seminar 23431) | Sven Dietrich Frank Kargl Hartmut König Pavel Laskov Artur Hermann | 2024 | |
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats | ACM Transactions on Privacy and Security | Florian Sommer Mona Gierl Reiner Kriesten Frank Kargl Eric Sax | 2024 |
Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242) | Frank Kargl Ioannis Krontiris Jason Millar André Weimerskirch Kevin Gomez | 2024 | |
Zero Trust Score-based Network-level Access Control in Enterprise Networks | arXiv preprint arXiv:2402.08299 | Leonard Bradatsch Oleksandr Miroshkin Natasa Trkulja Frank Kargl | 2024/2/13 |
The Internet of Vehicles (IoV)—Security, Privacy, Trust, and Reputation Management for Connected Vehicles | IEEE Internet of Things Magazine | Adam Drobot Tao Zhang Mary Lynn Buonarosa Frank Kargl Steve Schwinke | 2023/6/6 |
Survey of model-based security testing approaches in the automotive domain | IEEE Access | Florian Sommer Reiner Kriesten Frank Kargl | 2023/6/2 |
Privacy of Smart Traffic Lights Systems | Artur Hermann Michael Wolf Nataša Trkulja Ines Ben Jemaa Anis Bkakria | 2023/4/26 | |
Evaluation of Free and Open Source Tools for Automated Software Composition Analysis | Laura Bottner Artur Hermann Jeremias Eppler Thomas Thüm Frank Kargl | 2023/12/5 | |
Survey of Air, Sea, and Road Vehicles Research for Motion Control Security | Oliver Pöllny Albert Held Frank Kargl | 2023/4/14 | |
ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture | IEEE Access | Leonard Bradatsch Oleksandr Miroshkin Frank Kargl | 2023/11/7 |
In-vehicle trust assessment framework | Nataša Trkulja Artur Hermann Ana Petrovska Alexander Kiening Anderson Ramon Ferraz de Lucena | 2023/10/25 | |
Network Message Field Type Classification and Recognition for Unknown Binary Protocols | arXiv preprint arXiv:2301.03584 | Stephan Kleber Milan Stute Matthias Hollick Frank Kargl | 2022/11/7 |
Mitigation lost in translation: leveraging threat information to improve privacy solution selection | Ala'a Al-Momani Christoph Bösch Kim Wuyts Laurens Sion Wouter Joosen | 2022/4/25 | |
Defining Privacy | Journal of Social Philosophy | Adam D Moore | 2008 |
Feasibility of adversarial attacks on real-world lane detection systems | Gabriel Geck Dominik Fisch Vasileios Belagiannis Frank Kargl | 2022/10/21 | |
Why make it hard?-usage of aggregated statistical data for risk assessment of damage scenarios in the context of iso/sae 21434 | Procedia CIRP | Sergej Japs Frank Kargl Harald Anacker Roman Dumitrescu | 2022/1/1 |
Privacy in Mobile Sensing | Frank Kargl Rens W van der Heijden Benjamin Erb Christoph Bösch | 2019 | |
Refining network message segmentation with principal component analysis | Stephan Kleber Frank Kargl | 2022/10/3 | |
Network message field type clustering for reverse engineering of unknown binary protocols | Stephan Kleber Frank Kargl Milan Stute Matthias Hollick | 2022/6/27 | |
Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices | Pascal Oser Felix Engelmann Stefan Lüders Frank Kargl | 2022/9/29 |