Public Deliverables
Deliverable D1.1b: Requirements Elicitation (2020), Download PDF: D1.1b-Requirements-Elicitation-M27.pdf
Deliverable D1.2b: Toolkit Architecture M27 (2021), Download PDF: D1.2b-Toolkit-Architecture-M27.pdf
Deliverable D1.3-D1.4b: Device and Communications Architecture (2021), Download PDF: D1.3_D1.4b-Device-and-Communications-Architecture-M27.pdf
Deliverable D2.1b: IoT platform (2021), Download PDF: D2.1v5 – IoT Toolkit.pdf
Deliverable D2.2-D2.3b: IoT platform Public (2020), Download PDF: D 2.2 and 2.3 Deployment software final.pdf
Deliverable D2.4b: Security feedback components and tools (2022), Download PDF: D2.4b – Security Feedback Components and Tools.pdf
Deliverable D2.5b: The Firmware Update System (2022), Download PDF: D2.5 7-3-2022 Final.pdf
Deliverable D4.3d+e: Best Practices & Guidelines (2022), Download PDF: D4.3 7-3-2022 Final.pdf
Deliverable D5.3b: Dissemination Leaflet (2022), Download PDF: D5.3b SCRATCh Dissemination Leaflet M43.pdf
Public Document on State of the Art in Secure DevOps (2021), Download PDF: SCRATCh-Public-SotA-Document-Final-v1.0.pdf
Whitepapers
SCRATCh (2020): Creating it from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-enabled Software Development Environment. In: Proceedings of the 1st International Workshop on Underpinnings for Safe Distributed AI. International Workshop on Underpinnings for Safe Distributed AI (USDAI-2020), SAFECOMP2020 September 15-15 Online Springer 2020 [Preprint PDF]
Irdeto (2020): Mobile apps are the new endpoints, but how to address their security? www.irdeto.com
Academic Publications
C. Lipps, L. Bergkemper, H.D. Schotten, “Distinguishing Hearts: How Machine Learning identifies People based on their Heartbeat”, Sixth International Conference on Afvances in Biomedical Engineerning (ICABME), Islamic University of Lebanon, Werdanyeh Campus, Lebanon, DOI: 10.1109/ICABME53305.2021.9604855
C. Lipps, M. Laule, H. D. Schotten. (2021). “Say Who You Are: Biometric Authentication based on Characteristics of the Voice”, in 20th European Conference on Cyber Warfare and Security
C. Lipps, J. Herbst, H. D. Schotten. (2021). “How to Dance Your Passwords: A Biometric MFA-Scheme for Identification and Authentication of Individuals in IIoT Environments” in 16th International Conference on Cyber Warfare and Security
[Poster] C. Lipps, L.Bergkemper, H. D. Schotten. (2021). “I Know You by Heart: Biometric Authentication by Means of ECG Sensors” in 16th International Conference on Cyber Warfare and Security
D. Reti, D. Klaassen, S. D. Duque Anton, H. D. Schotten. (2021) “Secure (S)Hell: Introducing an SSH Deception Proxy Framework” in IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment 2021
S. D. D. Anton, D. Fraunholz, D. Krohmer, D. Reti, D. Schneider and H. D. Schotten. (2021) “The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World,” in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3081741
C. Lipps, P. Ahr, H. D. Schotten. (2020). “The PhySec Thing: About Trust and Security in Industrial IoT Systems” in Journal of Information Warfare 2020.
M. Kus, K. Sohr (2020): Practical experiences and approaches for ‘Security by Design’ based on STRIDE methodology (in German). Datenschutz & Datensicherheit – DuD, 44, 750–754 (2020). https://doi.org/10.1007/s11623-020-1361-6
F. Selgert (2020): Understanding the Nature of IoT Systems and Exploring Where in the DevOps Cycle Easy Gains Can Be Made to Increase Their Security. Springer International Publishing, 2020
M. Lagares-Lemos, Y. Perez-Gallardo, A. Lagares-Lemos, J. Miguel Gómez-Berbís (2020): ENERMONGRID: Intelligent Energy Monitoring, Visualization and Fraud Detection for Smart Grids. International Workshop on Enterprise Decision-Making Applying Artificial Intelligence Techniques (WEDMAIT 2020)
D. Krohmer, H. D. Schotten (2020): Decentralized Identifier Distribution for Moving Target Defense and Beyond. In 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), DOI 10.1109/CyberSA49311.2020.9139717
D. Reti, D. Fraunholz, D. Schneider, J. Zemitis, H. D. Schotten (2020): Deep Down the Rabbit Hole: On References in Networks of Decoy Elements. In 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), DOI 10.1109/CyberSecurity49315.2020.9138850
M. Gundall, D.Reti, H. D. Schotten (2020): Application of Virtualization Technologies in Novel Industrial Automation: Catalyst or Show-Stopper?. In 2020 IEEE 18th International Conference on Industrial Informatics (INDIN).
G. Suciu, I. Hussain, D. Vasilica Pastea, (2019): The IoT Devices and Secured Communication Architecture and Use Cases. In 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 1-5. IEEE 2019