default search action
Stefan Marksteiner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Stefan Marksteiner, Marjan Sirjani, Mikael Sjödin:
Automated Passport Control: Mining and Checking Models of Machine Readable Travel Documents. ARES 2024: 171:1-171:8 - 2023
- [c19]Stefan F. Marksteiner, Christoph Schmittner, Korbinian Christl, Dejan Nickovic, Mikael Sjödin, Marjan Sirjani:
From TARA to Test: Automated Automotive Cybersecurity Test Generation Out of Threat Modeling. CSCS 2023: 5:1-5:10 - [c18]Stefan Marksteiner, Marjan Sirjani, Mikael Sjödin:
Using Automata Learning for Compliance Evaluation of Communication Protocols on an NFC Handshake Example. ECBS 2023: 170-190 - [c17]Masoud Ebrahimi, Stefan Marksteiner, Dejan Nickovic, Roderick Bloem, David Schögler, Philipp Eisner, Samuel Sprung, Thomas Schober, Sebastian Chlup, Christoph Schmittner, Sandra König:
A Systematic Approach to Automotive Security. FM 2023: 598-609 - [c16]Dayu Zhang, Nasser Lashgarian Azad, Sebastian Fischmeister, Stefan Marksteiner:
Zeroth-Order Optimization Attacks on Deep Reinforcement Learning-Based Lane Changing Algorithms for Autonomous Vehicles. ICINCO (1) 2023: 665-673 - [i16]Masoud Ebrahimi, Stefan Marksteiner, Dejan Nickovic, Roderick Bloem, David Schögler, Philipp Eisner, Samuel Sprung, Thomas Schober, Sebastian Chlup, Christoph Schmittner, Sandra König:
A Systematic Approach to Automotive Security. CoRR abs/2303.02894 (2023) - 2021
- [c15]Christian Wolschke, Stefan Marksteiner, Tobias Braun, Markus Wolf:
An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case. ARES 2021: 55:1-55:9 - [c14]Christian Wolschke, Behrooz Sangchoolie, Jacob Simon, Stefan Marksteiner, Tobias Braun, Hayk Hamazaryan:
SaSeVAL: A Safety/Security-Aware Approach for Validation of Safety-Critical Systems. DSN Workshops 2021: 27-34 - [c13]Stefan Marksteiner, Slava Bronfman, Markus Wolf, Eddie Lazebnik:
Using Cyber Digital Twins for Automated Automotive Cybersecurity Testing. EuroS&P Workshops 2021: 123-128 - [c12]Stefan Marksteiner, Peter Priller:
A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation. EuroS&P Workshops 2021: 129-135 - [c11]Omar Veledar, Eric Armengaud, Leo Happ Botler, Violeta Damjanovic-Behrendt, Christian Derler, Stefan Jaksic, Lukas Krammer, Christian Lettner, Georg Macher, Stefan Marksteiner, Andreas Martin, Martin Matschnig, Peter Priller, Sebastian Ramacher, Kay Römer, Christoph Schmittner, Christina Tiefnig, Heribert Vallant, Heinz Weiskirchner, Mario Drobics:
Steering Drivers of Change: Maximising Benefits of Trustworthy IoT. EuroSPI 2021: 663-674 - [c10]Nadja Marko, Joaquim Maria Castella Triginer, Christoph Striecks, Tobias Braun, Reinhard Schwarz, Stefan Marksteiner, Alexandr Vasenev, Joerg Kemmerich, Hayk Hamazaryan, Lijun Shan, Claire Loiseaux:
Guideline for Architectural Safety, Security and Privacy Implementations Using Design Patterns: SECREDAS Approach. SAFECOMP Workshops 2021: 39-51 - [c9]Stefan Marksteiner, Nadja Marko, Andre Smulders, Stelios Karagiannis, Florian Stahl, Hayk Hamazaryan, Rupert Schlick, Stefan Kraxberger, Alexandr Vasenev:
A Process to Facilitate Automated Automotive Cybersecurity Testing. VTC Spring 2021: 1-7 - [i15]Stefan Marksteiner, Nadja Marko, Andre Smulders, Stelios Karagiannis, Florian Stahl, Hayk Hamazaryan, Rupert Schlick, Stefan Kraxberger, Alexandr Vasenev:
A Process to Facilitate Automated Automotive Cybersecurity Testing. CoRR abs/2101.10048 (2021) - [i14]Christian Wolschke, Behrooz Sangchoolie, Jacob Simon, Stefan Marksteiner, Tobias Braun, Hayk Hamazaryan:
SaSeVAL: A Safety/Security-Aware Approach for Validation of Safety-Critical Systems. CoRR abs/2106.13499 (2021) - [i13]Stefan Marksteiner, Bernhard Jandl-Scherf, Harald Lernbeiß:
Automatically Determining a Network Reconnaissance Scope Using Passive Scanning Techniques. CoRR abs/2106.14484 (2021) - [i12]Christian Wolschke, Stefan Marksteiner, Tobias Braun, Markus Wolf:
An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case. CoRR abs/2107.02916 (2021) - [i11]Stefan Marksteiner, Peter Priller:
A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation. CoRR abs/2107.06024 (2021) - [i10]Stefan Marksteiner, Slava Bronfman, Markus Wolf, Eddie Lazebnik:
Using Cyber Digital Twins for Automated Automotive Cybersecurity Testing. CoRR abs/2107.07355 (2021)
2010 – 2019
- 2019
- [j1]Stefan Marksteiner, Heribert Vallant, Kai Nahrgang:
Cyber security requirements engineering for low-voltage distribution smart grid architectures using threat modeling. J. Inf. Secur. Appl. 49 (2019) - [c8]Ralph Ankele, Stefan Marksteiner, Kai Nahrgang, Heribert Vallant:
Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing. ARES 2019: 102:1-102:8 - [c7]Stefan Marksteiner, Zhendong Ma:
Approaching the Automation of Cyber Security Testing of Connected Vehicles. CECC 2019: 22:1-22:3 - [c6]Stefan Marksteiner, Rudolf Ramler, Hannes Sochor:
Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing. CECC 2019: 25:1-25:3 - [c5]Stefan Marksteiner, Bernhard Jandl-Scherf, Harald Lernbeiß:
Automatically Determining a Network Reconnaissance Scope Using Passive Scanning Techniques. ICICT (2) 2019: 117-127 - [i9]Ralph Ankele, Stefan Marksteiner, Kai Nahrgang, Heribert Vallant:
Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing. CoRR abs/1906.10416 (2019) - [i8]Stefan Marksteiner, Zhendong Ma:
Approaching the Automation of Cyber Security Testing of Connected Vehicles. CoRR abs/1911.06589 (2019) - [i7]Stefan Marksteiner, Rudolf Ramler, Hannes Sochor:
Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing. CoRR abs/1911.06594 (2019) - 2018
- [c4]Mario Pichler, Marcus Meisel, Andrija Goranovic, Kurt Leonhartsberger, Georg Lettner, Georgios C. Chasparis, Heribert Vallant, Stefan Marksteiner, Hemma Bieser:
Decentralized Energy Networks Based on Blockchain: Background, Overview and Concept Discussion. BIS (Workshops) 2018: 244-257 - [c3]Stefan Marksteiner:
Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers. CBI (2) 2018: 110-113 - [c2]Stefan Marksteiner:
Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective. CBI (2) 2018: 140-143 - [i6]Stefan Marksteiner, Benjamin Rainer, Oliver Maurhart:
On the Resilience of a QKD Key Synchronization Protocol for IPsec. CoRR abs/1801.01710 (2018) - [i5]Stefan Marksteiner, Víctor Juan Expósito Jiménez, Heribert Vallant, Herwig Zeiner:
An Overview of Wireless IoT Protocol Security in the Smart Home Domain. CoRR abs/1801.07090 (2018) - [i4]Stefan Marksteiner:
Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective. CoRR abs/1809.00464 (2018) - [i3]Stefan Marksteiner:
Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers. CoRR abs/1809.00469 (2018) - 2017
- [i2]Stefan Marksteiner, Harald Lernbeiß, Bernhard Jandl-Scherf:
An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks. CoRR abs/1710.01026 (2017) - [i1]Stefan Marksteiner, Heribert Vallant:
Towards a Secure Smart Grid Storage Communications Gateway. CoRR abs/1710.03017 (2017) - 2016
- [c1]Stefan Marksteiner, Harald Lernbeiß, Bernhard Jandl-Scherf:
An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks. SafeConfig@CCS 2016: 37-43
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint