The Nextlevel Blog logo
  • About 
  • Research 
  • Tags 
  • Blog 
  1.   Home
  1. Home
  2. Research

Research

2 min read • 338 words
Share via
The Nextlevel Blog
Link copied to clipboard

While the main purpose of this blog is to share valuable insights on how everyday tasks may be simplified, I also want to share here some of my recent research works.

If you are interested in obtaining a CV feel free to contact me via any channel.

Papers  

  • Peter Schneider. Do’s and Don’ts of Distributed Intrusion Detection for Industrial Network Topologies. 2019 IEEE International Conference on Big Data (Big Data), 2019.
  • Alexander Giehl, Peter Schneider, Maximilian Busch, Florian Schnoes, Robin Kleinwort, Michael F. Zaeh, Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs, 2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019.
  • Gerhard Hansch, Peter Schneider, Kai Fischer, Konstantin Böttinger. A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications. 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 2019.
  • Hansch, Gerhard, Peter Schneider, and Gerd Stefan Brost. Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT. Proceedings of the 5th on Cyber-Physical System Security Workshop. ACM, 2019.
  • Schneider P., Giehl A. (2019) Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations. In: Katsikas S. et al. (eds) Computer Security. SECPRE 2018, CyberICPS 2018. Lecture Notes in Computer Science, vol 11387. Springer, Cham
  • Peter Schneider and Konstantin Böttinger. 2018. High-Performance Unsupervised Anomaly Detection for Cyber-Physical System Networks. In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC ’18). ACM, New York, NY, USA, 1-12. DOI: https://doi.org/10.1145/3264888.3264890
  • A. Giehl and P. Schneider, Sichere Prozesse für moderne Geschäftsmodelle, Article in Industrie 4.0 Management, Schwerpunkt “Fabriksicherheit”, 01/2018.
  • Gerhard Hansch, Peter Schneider, and Sven Plaga. Packet-wise compression and forwarding of industrial network captures. Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017 9th IEEE International Conference on. Vol. 1. IEEE, 2017.
  • Velten M., Schneider P., Wessel S., Eckert C. (2015) User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts. In: Lopez J., Wu Y. (eds) Information Security Practice and Experience. ISPEC 2015. Lecture Notes in Computer Science, vol 9065. Springer, Cham
Services 
Nextlevel v/Peter Schneider

I work on everything cyber security and development, CVR: 42051993, mail: info@nextlevel-blog.de, phone: 60 59 76 35

Copyright © 2025 Peter Schneider. | Powered by Hinode.
The Nextlevel Blog
Code copied to clipboard