Björn Stelte
Björn Stelte
Verified email at
Cited by
Cited by
Thwarting attacks on ZigBee-Removal of the KillerBee stinger
B Stelte, GD Rodosek
Proceedings of the 9th International Conference on Network and Service …, 2013
Requirements for a future EWS-Cyber Defence in the internet of the future
M Golling, B Stelte
2011 3rd International Conference on Cyber Conflict, 1-16, 2011
Towards a trust computing architecture for RPL in cyber physical systems
S Seeber, A Sehgal, B Stelte, GD Rodosek, J Schönwälder
Proceedings of the 9th International Conference on Network and Service …, 2013
Attack trends in present computer networks
R Koch, B Stelte, M Golling
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-12, 2012
Toward development of high secure sensor network nodes using an FPGA-based architecture
B Stelte
Proceedings of the 6th International Wireless Communications and Mobile …, 2010
Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation
B Stelte, A Matheus
SENSORS, 2011 IEEE, 920-923, 2011
Assuring trustworthiness of sensor data for cyber-physical systems
B Stelte, GD Rodosek
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013
iNagMon Network Monitoring on the iPhone
B Stelte, I Hochstatter
2009 Third International Conference on Next Generation Mobile Applications …, 2009
Towards integrity measurement in virtualized environments—a hypervisor based sensory integrity measurement architecture (SIMA)
B Stelte, R Koch, M Ullmann
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
Concealed Integrity Monitoring for Wireless Sensor Networks
T Bühring
Wireless Sensor Network 3 (01), 10, 2011
ISP traceback-Attack path detection
B Stelte
2013 IEEE Conference on Communications and Network Security (CNS), 363-364, 2013
An event management communication system for wireless sensor networks
B Stelte
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
Evidence theory for reputation-based trust in wireless sensor networks
A Matheus, B Stelte
Proceedings of the 3rd International Conference on Computing for Geospatial …, 2012
Unidirectional traffic flow to protect wireless sensor networks against byzantine attacks
B Stelte
International Conference on E-Business and Telecommunications, 503-518, 2011
A Real-Time-Enabled, Blackboard-Based, Publish/Subscribe Architecture for Wireless Sensor Nodes
B Stelte
Wireless Sensor Network 2 (08), 612, 2010
Protection against byzantine attacks on wireless sensor networks
B Stelte
Proceedings of the International Conference on Wireless Information Networks …, 2011
State-of-the-Art Kryptoverfahren für drahtlose Sensornetze–Eine Krypto-Bibliothek für MantisOS
B Stelte, B Saxe
Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit, 2010
Mil [IS
P Hillmann, B Stelte, B Cowen, K Shafi, C Granet, J Kot, I Davis, G Pope, ...
A flexible cryptographic infrastructure for high-security SDR-based systems
P Hillmann, B Stelte
2013 Military Communications and Information Systems Conference (MilCIS), 1-6, 2013
D5. 1—Initial deliverable on network and service monitoring
A Sperotto, R Hofstede, R Schmidt, A Mayzaud, A Sehgal, B Stelte, ...
Computer Networks (LCN 2013), 2013
The system can't perform the operation now. Try again later.
Articles 1–20