PD Dr. rer. nat. habil. Corinna Schmitt

CODE
Gebäude Carl-Wery-Str. 18, Zimmer 3809
+49 (0)1514 4821490
corinna.schmitt@unibw.de

PD Dr. rer. nat. habil. Corinna Schmitt

Head of Secure Communication Systems, Contact point for the National Coordination Centre for Cybersecurity (NCC) at RI CODE

SeCoSysv5.png



Homepage: https://www.corinna-schmitt.de



 

Open Position(s)

 

Research Assistants (m/w/d) at the Faculty of Computer Science at the Research Institute CODE for "Realization of Innovative Technical New Features and Concepts"

  • The Universität der Bundeswehr München (UniBw M) is firmly anchored in the national as well as international research landscape. The offered position is located in the NEWSROOM research project at the Research Institute CODE. The main objective of the NEWSROOM project is to overcome the current limitations of cyber situational awareness (CSA) by investigating all relevant CSA aspects and developing an integrated CSA platform that combines data insights. Furthermore, collaborative intrusion detection to classify attacks and Cyber Threat Intelligence (CTI) will be considered, taking into account military standards in terms of information security and confidentiality. Finally, the project will identify relevant applicable scenarios for CSA technologies in cyber defense that will be validated in cyber range environments to enable realistic conditions for testing CSA solutions, processes and training of military personnel. The focus of the FI CODE is on the investigation of measures in the cyber range.
  • Detailed descriptions: pdf (german only)
  • Send your application documents (cover letter, curriculum vitae, degree and work references) in PDF format (max. 10 MB) until 15.01.2024 by e-mail with the subject: "Stellenausschreibung NEWSROOM" to: PD Dr. Corinna Schmitt (Contact)



 

Office hours


  • Office hours Tuesdays and Thursdays 09:00-10:00(in-person or remote)
  • As I am not always in office, please request an appointment by sending me an email with some content hints and if the meeting be in-person or remote.



Awards since 04/2023


  • Best Paper Award in Track Cyber Security and Software @DASC 2021
  • Best Paper Award in Session Cybersecurity @DASC 2021
  • Best Paper Award in Track Cyber Security and Software @DASC 2020
  • Best Paper Award in Session Cybersecurity @DASC 2020
  • 1st Place - Best Professional Paper Competition @ ICNS 2019
  • Best Paper Award in Session Secure Communication @ DASC 2019



Teaching Overview


Below you can find direct links to the current courses in ILIAS. A short description of each course including also old lectures is available here.

The courses are regularly revised on the basis of the evaluation results reported back by the students and adapted to the current state of technical developments.

lock FT
Sichere Mobile Systeme /
Secure Mobile Systems
(MA)
FT
Sichere Mobile Systeme /
Secure Mobile Systems
(MA)
user-secret FT
Einführung in Datenbanken /
Introduction to Database Systems
(BA)
FT
Einführung in Datenbanken /
Introduction to Database Systems
(BA)
shield FT
Seminar Secure Air/Ground Communication Systems
(BA, MA)
FT
Seminar Secure Air/Ground Communication Systems
(BA, MA)

Research topics and open theses (language ENG/GER)

securewsn2.PNG


A complete list of available topics (BA/MA/Competence Trainings) and descriptions can be found here.

The content of the proposed topics will be adapted to the thesis's type and can be shifted a bit based on discussions and interest.

Another idea from your side or nothing found? No problem, get in touch and let's talk about it!



Running theses/trainings since 06/2018 (status 08/2023):


      • 4G und 5G Privacy Schwachstellen Übersicht und Kategorisierung (BA)
      • Analyse der Bluetooth LE Web-API von Tracker-Netzwerken (MA)
      • Analysis of secure data transmission possibilities for small sensors (BA)
      • Analyse und Entwicklung von Betriebsenveloppen für den sicheren Betrieb von Vertiports in Urban Air Mobility Systemen (BA)
      • Analyse und Evaluation von ML-Klassifikationsmodellen für Kommunikationsdaten (BA)
      • App Development to display different IDs of an Android Device (BA)
      • Automated Identification of Web Service Binaries in IoT Linux Firmware Samples (BA)
      • Automatisierte IT-Security-Tests im Software-Entwicklungsprozess - Einsatz von Schwachstellenscannern (BA)
      • Design and Development of an Urban Air Traffic Flow Management Module for Deconfliction (MA)
      • Enrichment of BLE device advertisements with location information in Android (BA)
      • Entwicklung einer Data Labeling Pipeline für Features aus Kommunikationsdaten (BA)
      • Evaluation des Potenzials hfürherwertiger SIBs (System Information Broadcast) in 5G und 4G Netzen (BA)
      • Evaluation eines RRC Angriffs in 5G (BA)
      • Evaluierung von Vertrauenslösungen in digitalen Luftfahrtkommunikationssystemen (MA)
      • Feature Engineering IEEE 802.15.4 Wireless Personal Area Network (WPAN) Communication Data (BA)
      • Function Fingerprinting in 5G Core Networks (BA)
      • HAIFA 2.0 - Home Automation in RUST (BA)
      • Investigation of the Interplay between Cell Morphology and Migration (BA)
      • Implementation and Analysis of the TOR protocol for Edge Cloud architecture (BA)
      • Implementation and Evaluation of an ETSI compliant MEC System (MA)
      • Implementing Obfuscations as LLVM Passes for Drop-In Obfuscation of Open-Source Projects (BA)
      • Implementation of an object recognition MEC App (MA)
      • MARTEN 2.0 - Dynamic Trust Check (BA)
      • Predicting Movement Paths from Tracking Area Update Events (BA)
      • Secure Data Transmission in Constrained Networks - Topic 1 (BA)
      • Secure routing in Aeronautical Ad-Hoc Networks (MA)
      • Single Common Information Service Provider for Constrained Networks (MA)
      • Umwandlung von proprietären Dateiformaten in 4G und 5G auf Open-Source
      • Vergleichende Analyse von BLE Tags inkl. Dissektorenentwicklung (BA)
      • Vergleich Lokalisierungsoptionen 5G (BA)
      • Waiting for you!


Concluded Ph.D. since 06/2018 (status 08/2023):

 

        Trustworthy Context-Aware Access Control in IoT Environments Based on the Fog Computing Paradigm



Concluded BA/MA theses and trainings since 06/2018 (status 08/2023):

 

      • Certificateless DTLS in Wireless Sensor Networks (MA)
      • Control Plane Security of LDACS (MA)
      • Design and Implemetation of a Code-Staging Solution for WebMaDa (MA)
      • ID-based Signing with Group IKEv2 in Constrained Networks (MA)
      • Role/Attribute-based Privilege Management for WebMaDa (MA)
      • Quantum Secure Public-Key Encryption in IoT Networks (MA)
      • Schwachstellenanalyse Mercedes "Hermes" Head Unit (HU) und Telematic Control Unit (TCU) (MA)
      • Aggregation Support in Constrained Networks following TinyIPFIX under RIOT OS (BA)
      • Automated Identification of Proprietary Web Service Binaries (BA)
      • Benchmarking für Basisfunktionalitäten in WebMaDa (BA)
      • Code-Documentation of WebMaDa in SecureWSN (BA)
      • Controller-based Routing in Mobile Ad-hoc Networks (BA)
      • Creation of a home automation system linked to SecureWSN (BA)
      • Design & Implementation of a Raspberry Pi Gateway for SecureWSN (BA)
      • Design and Implementation of a Geospatial IoTNaming System: Database and Web Application (BA)
      • Design and Implementation of a Geospatial IoTNaming System: Geographic Polygons (BA)
      • DTLS-based Security Solution for Constrained Devices using Contiki (BA)
      • Entwicklung einer automatisierten Schwachstellenanalyse der Automotive Cloud (BA)
      • Evaluation of open-source web application vulnerability scanners (BA)
      • Indoor Localization under RIOT OS (BA)
      • Indoor Localization without GPS under RIOT OS (BA)
      • Network Ownership Transfer of WSNs Inside a Closed Network (BA)
      • Optimization of Processing and Validation of Incoming Sensor Data in an Improved Development Environment (BA)
      • Raspberry Pi CoMaDa Instance Supporting Different Operating Systems and Features in Parallel (BA)
      • Sicherheitskonzept für Fahrzeugarchitekturen mit Fokus auf ein spezifisches Angriffsscenario (BA)
      • Standard-based Threat Analysis of WebMaDa (BA)
      • TinyIPFIX-based Data Collection in Constrained Networks under RIOT OS (BA)
      • Trustworthiness Check for Environmental Measurements in CoMaDa (BA)
      • USB Port Hacking in an Automotive Setting (BA)
      • Visualization of Collector Status with Interaction Triggering in a Dynamic Floor Map (BA)
      • Bidirectional communication in constrained devices (training)
      • Data Filtering Options Extension - Part 1 (training)
      • Data Filtering Options Extension - Part 2 (training)
      • Dockerimagebildung unter RIOT-OS auf Raspberry Pi - Part 1 (training)
      • Dockerimagebildung unter RIOT-OS auf Raspberry Pi - Part 2 (training)
      • Einarbeitung in die Python Programmierung unter Linux (training)
      • Qualitätssicherung der Weboberfläche des mobilen Frameworks von SecureWSN (training)
      • Upgrading SecureWSN's Virtual Machine (training)
      • SecureWSN's Virtual Machine Migration (training)

 

Further supervised theses are listed here.



Selected Invited Panels/Talks since 06/2018 (Status 08/2023):


      Panels:

  1. CONCORDIA and Beyond. CONCORDIA Cybersecurity Summit, Stockholm, Sweden, March 20, 2023
  2. Die Zukunft der Cyber-Sicherheitsforschung in Deutschland & Europa mit anschließender Themendiskussion. BSI im Dialog, Bonn, Germany, March 7, 2023
  3. European Cybersecurity Community. CONCORDIA Open Door 2023, Munich, Germany, October 27, 2022
  4. What's next?. CONVERGENCE NEXT 2022, Brussels, Belgium, June 3, 2022
  5. Access denied? Über den erschwerten Zugang zu öffentlichen Geldern für Start-Ups. Publicpreneurship Day, Neubiberg, Germany, March 31, 2022
  6. Future trends and perspectives in maritime communications. IEEE International Conference on Cyber Security and Resilience Workshop on Maritime Cyber Security, July 27, 2021
  7. Future Priorities and EU Cybersecurity Roadmaps. Shaping the Future of Cybersecurity - Priorities, Challenges and Funding Opportunities for a More Resilient Europe, cyberwatching.eu, July 13, 2021
  8. Developing a cyber resilient business world and society. Vienna Cybersecurity Week 2019, Rethink Cybersecurity, Vienna, Austria, March 14, 2019

 

Selected Talks (details here):

  1. Sniffing Drone Communication using PSAT. AMIUS Workshop, Airbus Urban Mobility, Munich, Germany, July 13, 2023
  2. Vorstellung des Nationalen Koordinierungszentrums für Cybersicherheit in Industrie, Technologie und Forschung. CODE Jahrestagung, Workshop 4 - Fördermassnahmen im Bereich Cybersicherheit in den EU-Förderprogramme 'Horizont Europa' und 'Digitales Europa' - Chancen, Beteiligungsregeln und Erfahrungswerte, Neubiberg, Germany, July 12, 2023
  3. Die drei ??? der Cybersicherheit. IMPACT 2023 by SBA Research, Vienna, Austria, June 13, 2023
  4. Cyber Campuses and Similar Frameworks in Member States. NCCs WEBINAR: Cyber campuses and similar frameworks in Member States, remote, June 1, 2023
  5. ECCC and it's National Coordination Centres (NCC). CONCORDIA Cybersecurity Summit, Stockholm, Sweden, March 20, 2023
  6. The Informatics Rubik's Cube Digitization . Colloquium Department of Informatics, Universität Wien, Vienna, Austria, May 30, 2022
  7. NCC-DE Introduction. The Sparta Days 2022, Munich, Germany, March 10, 2022
  8. Teamwork - Der Schlüssel für die Digitalisierung. Colloquium Department of Applied Informatics, Universität Augsburg, Augsburg, Germany, January 17, 2022
  9. Securing Aeronautical Links. Colloquium Department of Informatics and Mathematics, Hochschule München, Munich, Germany, October 22, 2021
  10. Risikoerkennung und -minimierung in der vernetzten Welt. Inaugural Lecture, University of Zurich, Zurich, Switzerland, September 27, 2021
  11. Digitalization Curse or Blessing - Can I still trust the system?. Technische Universität Hamburg-Harburg, Hamburg, Germany, January 27, 2020
  12. A Trustable System to Monitor Constrained Devices. Airbus Cybersecurity, Lunch & Learn, Taufkirchen, Germany, December 20, 2019
  13. SecureWSN: User Request(s) Nased Mobile Access Solution. Federal Criminal Police Office (Bundeskriminalamt), Berlin, Germany, April 3, 2019

 



Publications since 06/2018 (status 08/2023):


In the following only the publications during my employment at UniBw M are mentioned. A complete list of my publications is available here.


      Book / Book Chapters:

  1. C.Schmitt, S.Siffert, B.Stiller: sTiki: A Mutual Authentication Protocol for Very Constrained Sensor Devices in Smart Home Environments. Cybersecurity for Smart Home, R. Khatoun (Ed.), Chapter 7, ISTE-Wiley Publishers, New York, NY, USA, DOI: 10.1002/9781119987451.ch7, October 2022
  2. C.Schmitt, M.Weber: Home Automation Solution for SecureWSN. Cybersecurity for Smart Home, R. Khatoun (Ed.), Chapter 1, ISTE-Wiley Publishers, New York, NY, USA, DOI: 10.1002/9781119987451.ch1, October 2022
  3. N.Mäurer, T.Gräupl, C.Schmitt: Cybersecurity for the L-band Digital Aeronautical Communications System (LDACS). Aviation Cybersecurity: Foundations, Principles, and Applications, H.Song, K.Hopkinson, T.De Cola, T.Alexandrovich, D.Liu (Eds.), Chapter 04, pp. 83-121, Stevenage, UK, DOI: 10.1049/SBRA545E_ch, December 2021 online, February 2022 printed
  4. B.Stiller, E.Schiller, C.Schmitt: An Overview of Network Communication Technologies for IoT. Handbook of Internet- of-Things, S. Ziegler, S. and M. James (Eds.), Springer, Cham, Switzerland, Chapter 12, November 2020
  5. C. Schmitt, D. Bünzli, B. Stiller: WebMaDa 2.1 - A Web-based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel. IoT Security: Advances in Authentication, M. Liyanage, A. Braeken, P. Kumar, and M. Yliantilla, Wiley Publishers, Chapter 9, pp. 159-184, New York, NY, USA, DOI: 10.1002/9781119527978.ch9, December 2019
  6. P. Porambage, A. Braeken, C.Schmitt: Public Key Based Protocols - EC Crypto. IoT Security: Advances in Authentication, M. Liyanage, A. Braeken, P. Kumar, and M. Yliantilla, Wiley Publishers, New York, NY, USA, Chapter 4, pp. 85-100, DOI: 10.1002/9781119527978.ch4, December 2019

 

Journal Articles:

  1. N.Mäurer, T.Gräupl, C.Schmitt, G.Dreo Rodosek, H.Reiser: Advancing the Security of LDACS. IEEE Transactions on Network and Service Management, Vol. 19, No. 4, pp. 5237-5251, New York, NY, USA, DOI: 10.1109/TNSM.2022.3189736, December 2022
  2. N.Mäurer, T.Guggemos, T.Ewert, T.Gräupl, C.Schmitt, S.Grundner-Culemann: Security in Digital Aeronautical Communications A Comprehensive Gap Analysis. International Journal of Critical Infrastructure Protection, Elsevier, pp. 1-21, vol. 38, Amsterdam, NL, DOI: 10.1016/j.ijcip.2022.100549, July 2022
  3. N.Mäurer, T.Gräupl, C.Schmitt, G.Dreo Rodosek, H.Reiser: Advancing the Security of LDACS. IEEE Transactions on Network and Service Management, Vol. 19, No. 4, pp. 5237-5251, New York, NY, USA, DOI: 10.1109/TNSM.2022.3189736, July 2022
  4. C.Schmitt: Standards und Sicherheitsaspekte von IoT-Netzwerken. Sichere Kommunikation als Basis für IoT, OVEaktuell Schwerpunkt GIT/IoT, Newsletter OVEaktuell, OVE Österreichischer Verband für Elektrotechnik, December 2018

 

Conference and Workshop Papers:

  1. C.Schmitt, K.Edmonds, J.Körner, S.Leuck: CerDES - Certificateless DTLS-Based Encryption Solution for IEEE 802.15.4 Drone Communications. IEEE 42th Digital Avionics Systems Conference, New York, NY, USA, pp. 1-10, October 2023
  2. C.Schmitt, J.Körner, S.Leuck: PSAT - A Package Structure Analyzation Tool to Regain Control of Hijacked Drones. IEEE 42th Digital Avionics Systems Conference, New York, NY, USA, pp. 1-10, October 2023
  3. S.Khan, G.Singh-Gaba, A.Gurtov, N.Mäurer, T.Gräupl, C.Schmtt: Enhancing Cybersecurity for LDACS: a Secure and Lightweight Mutual Authentication Protocol. IEEE 42th Digital Avionics Systems Conference, New York, NY, USA, pp. 1-10, October 2023
  4. N.Mäurer, T.Ewert, T.Gräupl, K.Morioka, N.Kanada, C.Schmitt: A Combined Link Layer Security Solution for FCI Datalink Technologies. IEEE 42th Digital Avionics Systems Conference, New York, NY, USA, pp. 1-10, October 2023
  5. L.J.A.Jansen, N.Mäurer, T.Ewert, T.Gräupl, C.Schmitt: Improving the Lifespan of LDACS Air-to-Air Multi-Hop Connections by Heading Direction. IEEE 42th Digital Avionics Systems Conference, New York, NY, USA, pp. 1-7, October 2023
  6. N.Mäurer, T.Gräupl, C.Schmitt: Efficient Control-Channel Security for the Aeronautical Communications System LDACS. 2nd Workshop on Secure and Reliable Communication and Navigation in the Aerospace (SRCNAS), IEEE, Boston, MA, USA, pp. 1-8, June 2023
  7. L.J.A. Jansen, T.Gräupl, N.Mäurer, K. Morioka, C.Schmitt: A Software Framework for Synthetic Aeronautical Data Traffic Generation in Support of LDACS Evaluation Activities. 23rd Integrated Communications, Navigation and Surveillance (ICNS), IEEE, Herdon, VA, USA, pp. 1-11, DOI: 10.1109/ICNS58246.2023.10124317, April 2023
  8. N.Mäurer, T. Ewert, L.J.A. Jansen, T.Gräupl, K. Morioka, C.Schmitt: International LDACS Security Validation Activities - A Cooperation Effort between DLR and ENRI. 23rd Integrated Communications, Navigation and Surveillance (ICNS), IEEE, Herdon, VA, USA, pp. 1-10, DOI: 10.1109/ICNS58246.2023.10124307, April 2023
  9. K.Hagenhoff, M.Tränkler, C.Schmitt, G.Dreo Rodosek: RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs. IEEE Military Communications Conference (MILCOM), Rockville, MD, USA, pp. 117-124, DOI: 10.1109/MILCOM55135.2022.10017961, November 2022
  10. C.Schmitt, P. Pfefferkorn: MARTEN: Measurement-Based Trustcheck for Constrained Networks. IEEE World Forum on Internet of Things, New York, NY, USA, pp. 1-6, DOI: 10.1109/WF-IoT54382.2022.10152058, November 2022
  11. N.Mäurer, T.Gräupl, C.Schmtt, C.Rihacek, B.Haindl: A Secure Ground Handover Protocol for LDACS. International Workshop on ATM/CNS, Tokyo, Japan, pp. 1-8, October 2022
  12. N.Mäurer, M.Caamano, D.Gerbeth, T.Gräupl, C.Schmitt: A Secure Broadcast Service for LDACS with an Application to Secure GBAS. IEEE 40th Digital Avionics Systems Conference, New York, NY, USA, pp. 1-10, DOI: 10.1109/DASC52595.2021.9594504, October 2021 - Best Paper Award in Track Cyber Security and Software (CSS) and Best Paper Award in Session Cybersecurity (CSS-3)
  13. N.Mäurer, T.Gräupl, C.Gentsch, T.Guggemos, M.Tiepelt, C.Schmitt, G.Dreo Rodosek: A Secure Cell Attachment Procedure of LDACS. 1st Workshop on Secure and Reliable Communication and Navigation in the Aerospace Domain (SRCNAS) at IEEE European Symposium on Security and Privacy, New York, NY, USA, pp. 1-10, DOI: 10.1109/EuroSPW54576.2021.00019, September 2021
  14. N.Mäurer, C.Gentsch, T.Gräupl, C.Schmitt: Formal Security Verification of the Station-to-Station based Cell-Attachment Procedure of LDACS. 18th International Conference on Security and Cryptography (SECRYPT), Lieusaint, Frankreich, pp. 1-8, DOI: 10.5220/0010580906030610, July 2021
  15. N.Mäurer, T.Gräupl, C.Schmitt, G.Dreo Rodosek: PMAKE: Physical Unclonable Function based Mutual Authentication Key Exchange scheme for Digital Aeronautical Communications. IFIP/IEEE International Symposium on Integrated Network Management, New York, NY, USA, May 2021
  16. N.Mäurer, T.Gräupl, C.Gentsch, C.Schmitt: Comparing Different Diffie-Hellman Key Exchange Flavors for LDACS. IEEE 39th Digital Avionics Systems Conference, New York, NY, USA, DOI: 10.1109/DASC50938.2020.9256746, October 2020 - Best Paper Award in Track Cyber Security and Software (CSS) and Best Paper Award in Session Cybersecurity (CSS-3)
  17. C.Perner, C.Schmitt: Security Concept for Unoccupied Aerial Systems. IEEE 39th Digital Avionics Systems Conference, New York, NY, USA, DOI: 10.1109/DASC50938.2020.9256659, October 2020
  18. C.Perner, C.Schmitt, G.Carle: Dynamic Network Reconfiguration in Safety-Critical Aeronautical Systems. IEEE 39th Digital Avionics Systems Conference, New York, NY, USA, DOI: 10.1109/DASC50938.2020.9256497, October 2020
  19. K.Streit, C.Schmitt, C.Giannelli: SDN-based regulated flow routing in MANETs. 6th IEEE International Conference on Smart Computing, New York, NY, USA, pp. 1-8, DOI: 10.1109/SMARTCOMP50058.2020.00030, September 2020
  20. K.Streit, N.Rodday, F.Steuber, C.Schmitt, G. Dreo Rodosek: Wireless SDN for Highly Utilized MANETs. 6th International Workshop on ICT Systems for Public Protection and Risk Reduction at International Conference on Wireless and Mobile Computing, Networking and Communications, New York, NY, USA, pp. 226-234, DOI: 10.1109/WiMOB.2019.8923172, October 2019
  21. R.Müller, C.Schmitt, D.Kaiser, M.Waldvogel: HomeCA: Scalable Secure IoT Network Integration. Informatik 2019, Kassel, Germany, DOI: 10.18420/inf2019_21, September 2019
  22. N.Mäurer, T.Gräupl, C. Schmitt: Evaluation of the LDACS Cybersecurity Implementation. IEEE 38th Digital Avionics Systems Conference (DACS), New York, NY, USA, DOI: 10.1109/DASC43569.2019.9081786, September 2019 - Best Paper Award in Session Secure Communication (CSS-3)
  23. R.Labaca Castro, C.Schmitt, G.Dreo-Rodosek: AIMED: Evolving Malware with Genetic Programming to Evade Detection. IEEE 18th International Conference on Trust, Security and Privacy in Computing and Communications, New York, NY, USA, DOI: 10.1109/TrustCom/BigDataSE.2019.00040, August, 2019
  24. N.Mäurer, C. Schmitt: Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat- and Risk Analysis. Integrated Communications, Navigation and Surveillance Conference (ICNS), IEEE, New York, NY, USA, DOI: 10.1109/ICNSURV.2019.8735139, April 2019 - 1st Place - Best Professional Paper Competition
  25. R.Labaca Castro, C.Schmitt, G.Dreo-Rodosek: ARMED: How Automatic Malware Modifications Can Evade Static Detection?. 5th International Conference on Information Management (ICIM), IEEE, New York, NY, USA, pp. 20-27,DOI: 10.1109/INFOMAN.2019.8714698, March 2019
  26. C.Schmitt, Y.Steiner, R.Herzog, N.Terrenghi, and B.Stiller: A 4-step Tool-Chain for IoT Business Model and Sustainability Recommendations. Workshop for Business Model Innovation (BMI) and Socio-Economic Impacts in IoT, IEEE Global Communications Conference (GLOBECOM), IEEE, New York, NY, USA, pp. 1-6, DOI: 10.1109/GLOCOMW.2018.8644451, December 2018
  27. S.Aivalioti, L.Lopez, M. Plociennik, A. Olszewski, C. Schmitt, Y. Steiner, D. Monforte: From Innovative Niches to a Cooperative IoT Ecosystem. 3rd Workshop on Interoperability and Open-Source Solutions for the Internet of Things (InterOSS-IoT), New York, NY, USA, pp.1-6, DOI: 10.1109/GIOTS.2018.8534522, June 2018

 

Standards:

  1. M.Waldburger, P.Poullie, C.Schmitt, B.Stiller (Eds.): Y.3013: Socio-economic Assessment of Future Networks by Tussle Analysis. ITU-T Recommendation, Geneva, Switzerland, August 2014
  2. N.Mäurer, T.Gräupl, C.Schmitt: L-band Digital Aeronautical Communications System (LDACS). IETF, Fremont, CA, USA, RFC 9372, March 2023
  3. For further IETF Internet Drafts see here.

 

Posters:

  1. R. Labaca Castro, C. Schmitt, G. Dreo Rodosek: Applying GAN to Generate Adversarial Malware Examples. Machine Learning Summer School (MLSS) 2019, Moscow, Russia, August 26 - September 6, 2019
  2. R. Labaca Castro, C. Schmitt, G. Dreo Rodosek: Training GANs to Generate Adversarial Examples Against Malware Classification. 40th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 20, 2019
  3. R. Labaca Castro, C. Schmitt, G. Dreo Rodosek: AIMED: Genetic Programming to Evade Static Malware Detection. Annual Computer Security Applications Conference, San Juan, Puerto Rico, USA, December 6, 2018

 

Demonstrator:

  1. N.Mäurer, T.Gräupl, C. Schmitt: FACTS2: Framework for Aeronautical Communications and Traffic Simulations 2. 22nd ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), Miami Beach, FL, USA, November 25-29, 2019