While the main purpose of this blog is to share valuable insights on how everyday tasks may be simplified, I also want to share here some of my recent research works.
If you are interested in obtaining a CV feel free to contact me via any channel.
Papers
- Peter Schneider. Do’s and Don’ts of Distributed Intrusion Detection for Industrial Network Topologies. 2019 IEEE International Conference on Big Data (Big Data), 2019.
- Alexander Giehl, Peter Schneider, Maximilian Busch, Florian Schnoes, Robin Kleinwort, Michael F. Zaeh, Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs, 2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019.
- Gerhard Hansch, Peter Schneider, Kai Fischer, Konstantin Böttinger. A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications. 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 2019.
- Hansch, Gerhard, Peter Schneider, and Gerd Stefan Brost. Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT. Proceedings of the 5th on Cyber-Physical System Security Workshop. ACM, 2019.
- Schneider P., Giehl A. (2019) Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations. In: Katsikas S. et al. (eds) Computer Security. SECPRE 2018, CyberICPS 2018. Lecture Notes in Computer Science, vol 11387. Springer, Cham
- Peter Schneider and Konstantin Böttinger. 2018. High-Performance Unsupervised Anomaly Detection for Cyber-Physical System Networks. In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC ’18). ACM, New York, NY, USA, 1-12. DOI: https://doi.org/10.1145/3264888.3264890
- A. Giehl and P. Schneider, Sichere Prozesse für moderne Geschäftsmodelle, Article in Industrie 4.0 Management, Schwerpunkt “Fabriksicherheit”, 01/2018.
- Gerhard Hansch, Peter Schneider, and Sven Plaga. Packet-wise compression and forwarding of industrial network captures. Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017 9th IEEE International Conference on. Vol. 1. IEEE, 2017.
- Velten M., Schneider P., Wessel S., Eckert C. (2015) User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts. In: Lopez J., Wu Y. (eds) Information Security Practice and Experience. ISPEC 2015. Lecture Notes in Computer Science, vol 9065. Springer, Cham