Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jens-Uwe Dr. Bußer is active.

Publication


Featured researches published by Jens-Uwe Dr. Bußer.


critical information infrastructures security | 2009

Cyber-critical infrastructure protection using real-time payload-based anomaly detection

Patrick Düssel; Christian Gehl; Pavel Laskov; Jens-Uwe Dr. Bußer; Christof Störmann; Jan Kästner

With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may give rise to severe damage for life and assets without the implementation of proper safeguards. Thus, we propose a method that is capable to reliably detect unknown, exploit-based attacks on cyber-critical infrastructures carried out over the network. We illustrate the effectiveness of the proposed method by conducting experiments on network traffic that can be found in modern industrial control systems. Moreover, we provide results of a throughput measuring which demonstrate the real-time capabilities of our system.


international conference on computer safety reliability and security | 2007

Electronic distribution of airplane software and the impact of information security on airplane safety

Richard Robinson; Mingyan Li; Scott Lintelman; Krishna Sampigethaya; Radha Poovendran; David von Oheimb; Jens-Uwe Dr. Bußer; Jorge Cuellar

The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network applications, in particular electronic distribution of software (EDS), and onboard collection and off-board retrieval of airplane health reports. On the other hand, airplane safety may be heavily dependent on the security of data transported in these applications. The FAA mandates safety regulations and policies for the design and development of airplane software to ensure continued airworthiness. However, data networks have well known security vulnerabilities that can be exploited by attackers to corrupt and/or inhibit the transmission of airplane assets, i.e. software and airplane generated data. The aviation community has recognized the need to address these security threats. This paper explores the role of information security in emerging information technology (IT) infrastructure for distribution of safety-critical and business-critical airplane software and data. We present our threat analysis with related security objectives and state functional and assurance requirements necessary to achieve the objectives, in the spirit of the well-established Common Criteria (CC) for IT security evaluation. The investigation leverages our involvement with FAA standardization efforts. We present security properties of a generic system for electronic distribution of airplane software, and show how the presence of those security properties enhances airplane safety.


Archive | 2006

Data transfer method for e.g. Internet, involves transmitting query for destination-peer-device from one of peer-to-peer-networks to one of peer-devices in network under information of one of network addresses of another peer-device

Markus Böhm; Jens-Uwe Dr. Bußer; Uwe Leutritz; Steffen Rusitschka


Archive | 2010

Display device for stabilization of flexible display films, particularly of display films composed of organic light emitting diode structure, has structure comprising upper and lower electrodes

Jens-Uwe Dr. Bußer; Steffen Fries


Archive | 2007

Public code authenticating method, involves producing signature from combination of public code and generated authentication characteristic, and publishing public code, authentication characteristic and produced signature

Jens-Uwe Dr. Bußer; Martin Otto


Archive | 2017

COMPUTATION APPARATUS AND METHOD FOR IDENTIFYING ATTACKS ON A TECHNICAL SYSTEM ON THE BASIS OF EVENTS OF AN EVENT SEQUENCE

Jens-Uwe Dr. Bußer; Jorge Cuellar; Michael Munzert; Heiko Patzlaff; Jan Stijohann


Archive | 2016

Verfahren, Überwachungsvorrichtung und System zur Erkennung einer Manipulation eines Datenstroms

Jens-Uwe Dr. Bußer; Jorge Cuellar; Michael Munzert; Heiko Patzlaff; Jan Stijohann


Archive | 2016

Rechenvorrichtung und Verfahren zur Mustererkennung in einer Ereignisfolge

Jens-Uwe Dr. Bußer; Jorge Cuellar; Michael Munzert; Heiko Patzlaff; Jan Stijohann


Archive | 2016

Verfahren und System zur Erkennung einer Manipulation von Datensätzen

Jens-Uwe Dr. Bußer; Jorge Cuellar; Michael Munzert; Heiko Patzlaff; Jan Stijohann


Archive | 2016

Vorrichtung und Verfahren zur Speicherung von Protokollierungsdaten

Jens-Uwe Dr. Bußer; Jorge Cuellar; Michael Munzert; Heiko Patzlaff; Jan Stijohann

Collaboration


Dive into the Jens-Uwe Dr. Bußer's collaboration.

Researchain Logo
Decentralizing Knowledge