Latest Posts
-
New website is up!
I think my first website appeared in 1998. I then wrote several websites (private and commercial ones) in PHP. My private website was at some point created by the Apache Forrest framework, which generates static HTML output. However, in 2011 or so Apache Forrest was discontinued and I switched to Blogspot.com. After having my website hosted at Blogspot services (now owned by Google) for approximately ten years, I now decided that I wanted to get rid of their cookies and scripts. For this reason, I just re-built my website with Jekyll after noting that my students used it for years – yes, I am glad to learn from my students. Jekyll provides essentially the same functionality like Apache Forrest, but better.
-
I now have my teaching allowance at FernUniversität in Hagen
Some personal news: after passing the last defense talk at the Dep. of Mathematics & Computer Science at the University of Hagen in November, I now received the permission to read (venia legendi). This allows (but also requires) me to teach 2hrs/semester (for free!). I wanted to do this because it enables me to share insights from my favorite research domain(s) with more students. Also, this status allows me to advise my own Ph.D. students (as their primary advisor – I already advise Ph.D. students as a secondary advisor since a couple of years).
-
IoT/CPS Steganography: What is it and how does it work?
Can we hide data in the Internet of Things (IoT)? Turns out: yes, we can! In this posting, I briefly summarize some of my own research conducted in last nine years. When we discuss information hiding in the IoT/CPS sector, we need to distinguish at least three different approaches:
-
Should you publish your infosec research in a journal or a conference?
There is an ongoing debate on whether journal papers or conference papers receive more citations in information security. Based on IEEEXplore, we evaluated thousands of papers’ average yearly citations (AYC) and found that journal papers significantly outperform conference papers. What’s more, they outperformed conference papers in all six sub-domains that we analyzed (cryptography, anonymity and privacy, network security, information hiding and steganography, digital forensics and incident response, and IoT/CPS security). We did not focus on top-tier events here but on AYC of all published works (around 5,000 publications per investigated sub-domain, resulting in approx. n=30,000).
-
New release of my Usenet server WendzelNNTPd!
Looking for a space-efficient and easy-to-use communications platform without HTML content? A system of forums where everybody can exchance opinions without getting the next topics highlighted based on some algorithm that violates your privacy and produces some personalized filter bubble? Well, then I have good news for you!