M. Kus,  K. Sohr (2020): Practical experiences and approaches for ‘Security by Design’ based on STRIDE methodology (in German). Datenschutz & Datensicherheit – DuD, 44, 750–754 (2020). https://doi.org/10.1007/s11623-020-1361-6

F. Selgert (2020): Understanding the Nature of IoT Systems and Exploring Where in the DevOps Cycle Easy Gains Can Be Made to Increase Their Security. Springer International Publishing, 2020

Irdeto (2020): Mobile apps are the new endpoints, but how to address their security? www.irdeto.com

M. Lagares-Lemos, Y. Perez-Gallardo, A. Lagares-Lemos, J. Miguel Gómez-Berbís (2020): ENERMONGRID: Intelligent Energy Monitoring, Visualization and Fraud Detection for Smart Grids. International Workshop on Enterprise Decision-Making Applying Artificial Intelligence Techniques (WEDMAIT 2020)

S. Duque Antón, D. Fraunholz, D. Krohmer, D. Reti, H. D. Schotten, F. Selgert, M. Marosvölgyi, M. Larsen, K. Sudhakar, T. Koch, T. Witt, C. Bassem (2020): Creating it from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-enabled Software Development Environment. In: Proceedings of the 1st International Workshop on Underpinnings for Safe Distributed AI. International Workshop on Underpinnings for Safe Distributed AI (USDAI-2020), SAFECOMP2020 September 15-15 Online Springer 2020

D. Krohmer, H. D. Schotten (2020): Decentralized Identifier Distribution for Moving Target Defense and Beyond. In 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), DOI 10.1109/CyberSA49311.2020.9139717

D. Reti, D. Fraunholz, D. Schneider, J. Zemitis, H. D. Schotten (2020): Deep Down the Rabbit Hole: On References in Networks of Decoy Elements. In 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), DOI 10.1109/CyberSecurity49315.2020.9138850

M. Gundall, D.Reti, H. D. Schotten (2020): Application of Virtualization Technologies in Novel Industrial Automation: Catalyst or Show-Stopper?. In 2020 IEEE 18th International Conference on Industrial Informatics (INDIN).

G. Suciu, I. Hussain, D. Vasilica Pastea, (2019): The IoT Devices and Secured Communication Architecture and Use Cases. In 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 1-5. IEEE 2019

Public Deliverables

Deliverable D1.1b: Requirements Elicitation (2020), Download PDF: D1.1b-Requirements-Elicitation-M27.pdf

Deliverable D1.2a: Toolkit Architecture (2020), Download PDF: D1.2a-Toolkit-Architecture-UPDATED.pdf

Deliverable D1.3-D1.4b: Device and Communications Architecture (2021), Download PDF: D1.3_D1.4b-Device-and-Communications-Architecture-M27.pdf

Public Document on State of the Art in Secure DevOps (2021), Download PDF: SCRATCh-Public-SotA-Document-Final-v1.0.pdf