Peter Schoo Biography

[ Experiences ] | [ Publications ] | [ Projects ] | [ Books+Journals ] | [ Talks ] | [ Workshops ]

Research Focus

  • Security Engineering:
    • Security Engineering last five years
      • Cyber Resilience Act and how to implement it for industry.
      • Industrial IoT security impacted by forthcoming CRA and NIS2 regulations.
      • (Automotive) safety and security co-engineering methods.
      • Automotive security and privacy and TARA-based security engineering.
      • Certificate-enabled closed automotive groups in support of V2X mobile communications.
      • Dynamic risk management for self-adaptive architectures for autonomous vehicles.
    • Mobile Communication Systems: Specialised in network and mobility management protocols as elaborated by IETF and 3GPP.
    • Security for Emerging Technologies: Focus on Cloud Networking, SDN, and their security properties and challenges.
    • Pro-active Security: Research on malware analysis, incident detection, and collaborative procedures for critical infrastructure protection.

    Professional Experience

    • Huawei Technologies (2014-2024): Developed security technologies across various domains, including privacy, system integrity, networking protection, cloud security, and automotive security at the Munich Research Center, Cyber Security and Privacy Lab. Successfully built up and led a security research team.
    • Fraunhofer AISEC (2009-2013): Led a research group on network security and early warning systems. Successfully established a security research team within the organisation.
    • DoCoMo Euro-Labs, Munich (2001-2008): Research Director for Security Technology. Successfully built and led a security research team.
    • Fraunhofer FOKUS, Berlin (1987-2001): Senior Scientist focusing on distributed application, telecommunication services, formal description techniques and security components. Made significant contributions to DIN and ISO standardisation efforts.

    Academic Contributions

    • Lecturer at Technische University Berlin on formal description techniques and Telecommunications Information Network Architecture (1989-1991, 1995-1996).
    • Education: Dipl.-Inform. in Theoretical Computer Science, University of Hamburg (1986).

    Publications

    2024

    • Schoo, P. (2024). Navigating the CRA: A Brief Analysis of European Cyber Resilience Act and Resulting Actions for Product Development. In Proceedings of the 9th International Conference on Internet of Things, Big Data and Security, ISBN 978-989-758-699-6, ISSN 2184-4976, pages 245-251

    2020

    • I. Krontiris, T. Giannetsos, P. Schoo, F. Kargl, Buckle-up: Autonomous Vehicles Could Face Privacy Bumps in the Road Ahead,accepted for 18th ESCAR Europe 2020, Automotive Cyber Security Conference, Nov. 2020, Bonn, Germany

    2019

    • Angelo Liguori, Peter Schoo, Marcel Winandy, Mind the Shift: Secure Migration of Containerized Processes in Edge Computing,Proc. of the 5th IEEE International Conference on Edge Computing and Scalable Cloud (IEEE EdgeCom 2019), June 21st - 23rd, 2019

    2016

    • Krontiris I., Benenson Z., Girard A., Sabouri A., Rannenberg K., Schoo P. (2016) Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers. In: Berendt B., Engel T., Ikonomou D., Le Métayer D., Schiffner S. (eds) Privacy Technologies and Policy. APF 2015. Lecture Notes in Computer Science, vol 9484. Springer

    2013

    • Dennis Titze, Hans Hofinger and Peter Schoo, Using Secure Multiparty Computation for Collaborative Information Exchange, Proceed. of 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), 16-18 July, 2013, Melbourne, Australia.
    • M. Zeilinger, P. Schoo and E. Hermann, The Many Facets of IT Early Warning – Open Issues, Current Research, in M. Zeilinger, P. Schoo and E. Hermann (Eds.) Advances in IT Early Warning, Fraunhofer Verlag, 2013

    2012

    • Anand Kannan, Gerald Q. Maguire, Jr, Ayush Sharma, Peter Schoo, Genetic Algorithm based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks, KDCloud12 IEEE workshop, Brussels, Belgium on 10 December 2012
    • P. Schoo and R. Marx, Threat model based security evaluation of Open Connectivity Services, Proc. of the 4th International Conference on Mobile Networks and Management, September 23–26, 2012 Hamburg, Germany
    • Collaboration Between Competing Mobile Network Operators to Improve CIIP, P. Schoo, M. Schäfer, A. Egners, H. Hofinger, S. Wessel, M. Kuehnel, S. Todt, M. Montag, Proc of 7th Int. Conf. on Critical Information Infrastructures Security (CRITIS 2012), September 17-18, 2012, Lillehammer, Norway
    • A. Kannan, Q. G. Maguire, Jr, A. Sharma, V. Fusenig, and P. Schoo.
      1. N-ary tree based key distribution in a network as a service provisioning model. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI ’12). ACM, New York, NY, USA, 952-960. DOI=10.1145/2345396.2345550
    • Hans Hofinger, Alexander Kiening and Peter Schoo, When Browsing Leaves Footprints - Automatically Detect Privacy Violations, EuroSys 2012 Workshop on Measurement, Privacy, and Mobility (MPM), April 10, Bern, Switzerland

    2010

    • P. Schoo, Smart-Energie: Wie viel Datenschutz und Datensicherheit wollen wir uns leisten?, Proc. of Smart Energie 2010 - Innovative, IKT-orientierte Konzepte für den Energiesektor der Zukunft, U. Großmann, I. Kunold (Eds.), Oct 2010
    • R. Bless, G. Grotewold, Chr. Haas, B. Hackstein, St. Hofmann, A. Jentzsch, A. Kiening, Chr. Krauss, J. Lamberty, M. Müter, P. Schoo, L. Völker, Chr. Werle, A Security Model for Future Vehicular Electronic Infrastructures, 8th escar Embedded Security in Cars conference, Bremen, Germany, Nov. 16, 2010
    • Infiltrating Critical infrastructures with Next-Generation Attacks, M. Brunner, H. Hofinger, Chr. Krauss, Chr. Roblee, P. Schoo, S. Todt, Technical Report, Fraunhofer AISEC, 12/2010
    • M. Brunner, M. Epah, H. Hofinger, Chr. Roblee, P. Schoo, S. Todt, The Fraunhofer SIT malware analysis laboratory - establishing a secured, honeynet-based cyber threat analysis and research environment, Technical Report, Electronic Publication, Fraunhofer SIT, Sept. 22, 2010
    • M. Brunner, H. Hofinger, Chr. Roblee, P. Schoo, S. Todt, Anonymity and Privacy in Distributed Early Warning Systems, Fifth Int. Workshop on Critical Information Infrastructure Security (CRITIS 2010), September 2010, Athens, Greece
    • P. Schoo, V. Fusenig, V. Souza, M. Melo, P. Murray, H. Debar, H. Medhioub, D. Zeghlache, Challenges for Cloud Networking Security, 2nd Intl. ICST Conf. on Mobile Networks and Management (MONAMI), Santander, Spain, 22-24 September 2010, also as HPL-2010-137, HP Laboratories
    • M. Glass, D. Herrscher, H. Meier, M. Piastowski, P. Schoo, SEIS – Security in Embedded IP-based Systems, ATZelektronik, Nr. 2010-01, Feb 2010

    2009

    • P. Schoo, Co-opetition Enabling Security for Cooperative Networks – Authorising Composition Agreement Negotiations between Ambient Networks, Wireless Personal Communication Journal, Springer Verlag, March 2009
    • P. Schoo, M. Paoluccci, Do you speak with each poster? Security and Privacy for Interactions with Web Service by means of Contact Free Tag Readings, International Workshop on Near Field Communication (NFC’09), Hagenberg, Austria, February 24th, 2009
    • P. Schoo, Co-opetition Enabling Security for Cooperative Networks – Authorising Composition Agreement Negotiations between Ambient Networks, Wireless Personal Communication Journal, Springer Verlag, publication date May 2009

    2007

    • A. Schieder, P. Schoo, J. Gebert, D. Zhou, K. Balos, M. Cano, The Reference Points of an Ambient Network, IST Mobile Summit, Budapest, Hungaria, July 2007
    • M Johnsson, B. Ohlman, A. Surtees, R. Hancock, P. Schoo, K. Ahmed, F., Pittmann, R. Rembarz, M. Brunner, A Future-Proof Network Architecture, IST Mobile Summit, Budapest, Hungaria, July 2007

    2006

    • A. Prasad, J. Laganier, A. Zugenmaier, P. Schoo, Experimental Performance Evaluation of Secure, Mobile IP-based, 3G-WLAN handover, International Symposium on Wireless Personal Multimedia Conference, Sept 2006
    • A. Prasad, J. Laganier, A. Zugenmaier, P. Schoo, Secure Mobility in Beyond 3G, International Symposium on Wireless Personal Multimedia Conference Sept. 2006

    2005

    • A.R. Prasad, A. Zugenmaier and P. Schoo, Next gerneration Communications and Secure Seamless Handovers, SecQoS 2005 Workshop, Athens, Greece, September 9, 2005
    • M. Matthes, C. O. Krauß, K. M. Bayarou, C. Eckert, A.R. Prasad and P. Schoo, Identification of Security Requirements on WLAN-WLAN Inter Domain Handovers based on Threat and Risk Analysis, WPMC 2005, Aalborg, Denamrk, September 18-22, 2005

    2004

    • H. Wang, A.R. Prasad, P. Schoo, K.M. Bayarou, S. Rohr, Security Mechanisms and Security Analysis: Hotspot WLANs and Inter-Operator Roaming, VTC’04-Spring 2004, Milan, Italy, April 11-14, 2004
    • H. Wang, A.R. Prasad, P. Schoo, Research Issues for Fast Authentication in Inter-Domain Handover, Wireless World Research Forum (WWRF) Conference, Beijing, China, February 2004
    • K.M. Bayarou, C. Eckert, S. Rohr A.R. Prasad, P. Schoo and H. Wang, 3G and WLAN Interworking: Towards a Secure Solution for Tight Coupling, WPMC 2004
    • M.S. Bargh, R.J. Hulsebosch, E.H. Eertink, A. Prasad, H. Wang, P. Schoo, Fast Authentication Methods for Handovers between IEEE 802.11 Wireless LANs, WMASH 2004, Philadelphia, USA, Oct 2004
    • A.R. Prasad, P. Schoo, H. Wang, An Evolutionary Approach towards Ubiquitous Communications: A Security Perspective, SAINT 2004, Tokyo, Japan

    2003

    • A. Prasad, H. Wang, P. Schoo, Network Operator’s Security Requirements on Systems Beyond 3G, WWRF Conference #8, Beijing, China, April 2003
    • A.R. Prasad, H. Wang, P. Schoo, Infrastructure Security for Future Mobile Communications System, WPMC 2003, Yokosuka, Japan
    • S. Rohr, K. M. Bayarou, C. Eckert, A.R. Prasad, P. Schoo, H. Wang, Feasible and Meaningful Combinations of Access and Network Technologies for Future Mobile Communications, WWRF Conference #10, New York, USA, Oct 2003

    2002

    • A. Kassler, T. Guenkova-Luy, D. Mandato, P. Schoo, I. Armuelles, T. Robles, P. Ruiz, A. Bascuñana, Enabling Mobile Heterogeneous Networking Environments with Ent-to-End User Perceived QoS – The BRAIN Vision and the MIND Approach, European Wireless 2002 Conference/ Florence/ Italy, Feb. 2002
    • O. Tirla, A. Bascuñana MuÒoz, P. Schoo, S. Tessier, Accounting management in heterogeneous mobile access networks: The MIND Approach, The 13th IEEE Int. Symposium on Personal, Indoor and Mobile Radio Communicatins, Lisbon, Portugal, Sept. 15-18, 2002
    • T. Walter, P. Schoo, J. Haller, P. Robinson, WiTness - Wireless Trust for Mobile Business, PAMPAS’02, Workshop on Requirements for Mobile Privacy & Security, Sept. 2002
    • P. Schoo, O. Tirla, A. Bascuñana, S. Tessier, Data Accounting Management in Heterogenous Mobile Access Networks: The MIND Approach, Jornadas Telecom I+D 2002, Madrid, 19-21 Nov.2002
    • H. Wang, A. Prasad, P. Schoo, S. Tessier, O. Tirla, A domain model approach to network security, IST project MIND, London, UK, 7 Oct. 2002
    • A. Prasad, P. Schoo, IP Security for Beyond 3G towards 4G, WWRF #7, Eindhoven, Netherlands, 3-4 Dec. 2002

    2001

    • Tonghong Li, Peter Schoo, Andrea Ingallinera, Orazio Tomarchio, Service Subscription in a VHE Environment, IEEE International Conference on Telecommunications, June 2001, Bucharest, Romania

    2000

    • Peter Schoo, Service Creation Techniques for Software Development and Deployment, Int. Conference on Intelligence and Services in Networks, IS&N 2000, Athens, Greece, February 23-25, 2000

    1999

    • Tim O. Eckardt, Christian Egelhaaf, Peter Schoo, On the design of interworking reference points for information networking, Second IFIP WG 6.1 Int. Working Conference on Distributed Applications and Interoperable Systems, June 28 - July 1, 1999, Helsinki, Finland
    • Peter Schoo, Christian Egelhaaf, Tim O. Eckardt, Nazim Agoulmine, Michael Tschichholz, Modularization of TINA Reference Points for Information Networking, Int. Conference on Intelligence and Services in Networks, IS&N’99, Barcelona, Spain, April 27-29, 1999
    • Christian Egelhaaf, Peter Schoo, A. Zisowsky, M. Fisher, Integration of a Legacy Application into a TINA Retailer Environment, 4. Int. Symposium on Autonomous Decentralised Systems (ISADS’99), Tokyo, Japan, March 1999

    1998

    • P. Kielhöfer, T. Magedanz, U. Scholz, P. Schoo, A TINA Service Node for IN Environments, Proc. of ICIN’98, Bordeaux, France, pp.133-138, May 1998

    1997

    • Klaus-Peter Eckert, Peter Schoo, Engineering Frameworks: A Prerequisite for the Design and Implementation of Distributed Enterprise Objects, 1st International Enterprise Distributed Object Computing Conference (EDOC ’97), p. 170
    • E. Moeller, K.-P. Eckert, P. Schoo, G. Schürmann, Kundenorientierte Telekommunikationsdienste und Middleware-Plattformen, Der GMD-Spiegel, ISSN 0724-4339, No 4, 1997, pp 28 - 32
    • K.-P. Eckert, M. Festini, P. Schoo, G. Schürmann, TANGRAM: Development of Object-Oriented Frameworks for TINA-C-based Multimedia Telecommunication Applications, Proceedings of the 3rd International Symposium on Autonomous Decentralized Systems ISADS, Berlin, Germany, April, 1997
    • J. Dittrich, P. Schoo, Implementation of a Multimedia Collaboration Service for an Environment of Distributed Platforms, submitted to HICSS-30 Conference, Hawaii, January 1997

    1996

    • Chr. Egelhaaf, E. Moeller, P. Schoo, Developing Distributed Multimedia Applications, IEEE MultiMedia , Volume 3 Issue 4, December 1996
    • P. Schoo, M. Vodslon, J. Dittrich, Stream Binding for Audio/Video Transfer of a Multimedia Communication Service in an Environment of Distributed Platforms, submitted to the third COST 237 Workshop Multimedia Telecommunications and Applications, Barcelona, Spain, November 25-27, 1996
    • M.K. Durmosch, Chr. Egelhaaf, K.-D. Engel, P. Schoo, Design and Implementation of a Multimedia Communication Service in a Distributed Environment based on the TINA-C Architecture, Int. Workshop Trends in Distributed Systems 1996 (TreDS’96), Aachen, Germany, October 1-2, 1996
    • K.-P. Eckert, P. Schoo, A CORBA2 Based Distributed Processing Environment for Telecommunication Applications, abstract submitted to Workshop on Distributed Object-Oriented Computing, DOOC’96, Frankfurt/Main (Ger), September 1996
    • K.-P. Eckert, G. Schürmann, P. Schoo, Open Distributed Processing Platforms for Support of Telecommunication Applications and their Management, IEEE Int. Conf. on Distributed Platforms, Dresden, Germany, February 1996

    1995

    • P. Schoo, J. Dittrich, Tangram - a visionary project on information networking, Technical Report BERKOM Project TANGRAM, Release 1.2, GMD Forschungszentrum Informationstechnik, St. Augustin, 1995, 56 pp.
    • J. Dittrich, K.-P. Eckert, P. Schoo, Design of a Multimedia Collaboration Service for an Environment of Distributed Processing Platforms, Int. Workshop on Distributed Object Oriented Computing - DOOC’95, Frankfurt/ Main, Germany, October 11, 1995
    • H. Berndt, M. Chapman, P. Schoo, I. Tönnby, A Comparison of Architectures for Future Telecommunication Services, 3rd Int. Conf. on Intelligence in Broadband Services and Networks, Heraklion, Crete, Greece, October 1995
    • P. Schoo, M. Brachwitz, Open service architectural framework for integrated service engineering, RACE 2049 Project CASSIOPEIA; Release 4.0, GMD Forschungszentrum Informationstechnik, St. Augustin, 1995, 160 pp.

    1994

    • Peter Schoo, Component Models and Service Creation - Introduction, IS&N ’94: Proceedings of the Second International Conference on Intelligence in Broadband Services and Networks: Towards a Pan-European Telecommunication Service Infrastructure, September 1994, Aachen, Germany

    1993

    • J. Insulander, P. Schoo, I. Tönnby, S. Trigila, An Architectural Approach to Integrated Service Engineering for an Open Telecommunication Service Market, International RACE IS&N Conference on Intelligence in Broadband Services and Networks, Paris, France, November 23 - 25, 1993

    1992

    • M. Chapman, I. Tönnby, P. Schoo, Suggestions for Object-Oriented Modelling from ROSA, Third Telecommunications Informations Networking Architecture Workshop (TINA’92), Narita, Japan, January 21 - 23, 1992
    • P. Schoo, I. Tönnby, The ROSA Object Model, Proceedings of the IFIP TC6/WG6.4 International Workshop on Open Distributed Processing, Berlin, October, 1991, North-Holland, 1992

    1991

    • P. Schoo, J. de Meer, Tools for the Formal Description Language LOTOS, Journal Systems Analysis Modelling Simulation __8__(1991) 4/5, 343 - 451

    1990

    • P. Schoo, Die LOTOS tools, Arbeitsberichte der GMD No.437, ISSN 0723-0508, Sankt Augustin, 1990

    1989

    • P. Boehm, J. de Meer, P. Schoo, PERLON - Persistency Checker for Data Type Definitions, in: P.H.J. van Eijk, C.A. Vissers and M. Diaz (Eds), The Formal Description Technique LOTOS - Results of the ESPRIT/SEDOS Project, North-Holland, Amsterdam, 1989

    1988

    • P. Schoo, Verifikation mit PROLOG in einem verteilten Entwicklungs- und Derivationssystem, 1. IF/Prolog User Day, June 10th, 1988, Munich

    As of Google Scholar, as of DBLP.

    Projects

    • Buntes Bug Bounty, Teilprojekt im Dialog für Cyber-Sicherheit im Auftrag des Bundesamts für Sicherheit in der Informationstechnik (BSI), Sept 2022 - Sept 2023, Report
    • SASER: Safe and Secure European Routing, mitigate security vulnerabilities of today’s IP-layer networks and to propose a new architecture, funded by German Federal Ministry of Education and Research (BMBF), Jul 2012 - Jul 2015
    • SCALA: Industrial Research Project “Permanent Activity Monitoring and Attack Localisation (SCALA)” of the French-German cooperation in security research, by means of the research action “preventive and advanced IT security measures for the protection of industrial control systems in water production”, partially funded by the German Federal Ministry of Education and Research (BMBF), 2012 - 21015.
    • ASMONIA - Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchAnge, partially funded by the German Federal Ministry of Education and Research (BMBF), Sept 2010 - Mai 2013
    • SAIL, an ICT project about the Future Internet, 7th Framework Programme, August 2010 - January 2013
    • SEIS – Security in Embedded IP-based Systems, partially funded by the German Federal Ministry of Education and Research (BMBF), July 2009
      • June 2012
    • Ambient Networks Phase 1 and 2, Information Society Technologies (IST) 6th Framework Programme, January 2004 - December 2007
    • Mobile IP based Network Developments (MIND), Information Society Technologies (IST) 5th Framework Programme, June 2001 - November 2002
    • TINA Open Service Creation Architecture (TOSCA), European’s Advanced Communications Technologies and Services (ACTS) Programme, April 1997 - December 1997
    • Distributed, Integrated Platforms for Multimedia Telecommunications, Management, Mobility and Security, TANGRAM, DeTeBerkom, April 1995 - March 1997
    • Integrated Service Engineering (CASSIOPEIA, R2049) RACE II Programme, March 1992 - December 1994
    • RACE Open Service Architecture (ROSA, R1093), RACE I Programme, April 1990 - 1992
    • LOTOSPHERE (R2304), ESPRIT Phase II Programme, April 1989 - March 1992
    • RACE Open Service Architecture (ROSA, R1068), Research and Development in Advanced Communication Technology for Europe (RACE) I Programme, January 1989 - January 1990
    • Software Environment for the Design of Open Distributed Systems (SEDOS), European Strategic Programme for Research in Information Technologies (ESPRIT), Phase I Programme, March 1987 - March 1988

    Talks

    • AI Security Challenges and Mitigations in 5G for Automotive, VDE Tec Summit 2020, February 26, Berlin, Germany
    • Business Opportunities and their Security And Privacy Challenges in IoT - with or without 5G, Innogy Workshop, Essen, Germany, July 2019
    • Privacy and Privacy Enhancing Technologies, Huawei Security Conference 2014, Shenzhen, China, Dec 2014
    • Huawei Cybersecurity Perspectives, ISF and Munich Industry Forum, Ottobrun, Germany, June 2014
    • Advances on Cyber Security and the Protection of Critical Infrastructures in Germany, IPA Forum 2012, Tokyo, Japan, Oct 25th, 2012
    • Cyberangriffe auf die Versorgungsnetze der Zukunft – Vision oder Realität, Expertenforum “Vom sicheren Umgang mit Daten im Smart Metering”, November 2010, Kloster Eberbach, Germany
    • IT-Sicherheit: Impulse aus der Forschung für den praktischen Einsatz, IT-Konferenz “Sicherheitslücken schliessen - IT-Sicherheit schützt Mittelstand und öffentliche Institutionen”, May 19, 2010, Passau, Germany
    • P.Schoo, Security Metrics - No pain, no gain, 3rd Athens International Forum on Security (AIFS), January 27-28, 2010, Athens, Greece
    • IT Sicherheitstrends für den industriellen Einsatz, Discuss & Discover Conference, October 20-22, 2009, Munich, Germany
    • On the Future of Security in Future Internet, 9th Würzburg Workshop on IP: Joint ITG and EuroNF Workshop “Visions of Future Generation Networks” (EuroView2009), July 27th - July 28th 2009, Würzburg, Germany
    • Praktische SOA Security - Automation im Einsatz, SOA Security 2008 - Sicherheit in Service-orientierten Architekturen, 3.-4. Juli 2008, Hasso-Plattner-Institut, Potsdam, Germany
    • Ambient Networks Security Principles - Improving towards Dynamic Internetworking, 10th Strategic Workshop, May 29-30, 2008, Madeira, Portugal
    • Security Issues in Operator Cooperation, WWI Innovaton Day, Nov 13th, 2007, Brussels, Belgium
    • Enabling Secure Composition between Ambient Networks, Emerging Technologies for Operator Cooperation, Düsseldorf, Germany, November 10th, 2006
    • Top 5 mobile and wireless security issues, Joint SecurIST & Mobile and Wireless Workshop, Brussels, Belgium, May 2006
    • Key Security Solutions in WWI, WWI Mocca workshop, Yokosuka, Japan, March 30th, 2006
    • Key Security Solutions in Ambient Networking, WWI Symposium, Paris, France, December 6th, 2005
    • Secure Seamless Mobility in Future Mobile Communication Systems, University of Hamburg, Oberseminar on Advanced IT-Security, Hamburg, Germany, November 17, 2005
    • Secure Mobility Research fir Communication Systems Beyond 3G, French-Japanse-Seminar on Wireless Communications, Sept. 2005, Paris, France
    • Security and Privacy in Mobile and Ad-Hoc Networks - A Necessity for Future Acceptance and Business, SUN’2005 Workshop, August 2005, Kopenhagen, Denmark
    • Trust management by means of AN agreements, WWI Symposium, Paris, France, December 9th, 2004
    • Security in Heterogeneous Network Scenarios, FACE Project Workshop, Alborg, Denmark, Dec. 2002

    Patents

    Several patents related to IP-based secure and seamless handovers in mobile communication systems, and privacy enhancing technologies.

    Books and Journals

    • M. Zeilinger, P. Schoo, E. Hermann, Advances in IT Early Warning, Fraunhofer Verlag , Germany, 2013, ISBN:3839604745 9783839604748
    • Norbert Niebert, Andreas Schieder, Jens Zander, Robert Hancock, “Ambient Networks - Co-operative Mobile Networking for the Wireless World”, John Wiley & Sons, 2007 (Contribution to Chapter 5 - Security in Ambient Networks)
    • Guest editor for special issues of the journal Computer Communications on Beyond Intelligent Networks, November 1995

    Workshops

    • Created in 2011 a workshop on ASMONIA project topics that turned since than in the regular event of the Telco Sec Day during the Troopers conference, Heidelberg.
    • First International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM), Co-located with ARES 2013, International Conference on Availability, Reliability and Security, September 2-6, 2013, Regensburg, Germany
    • 3rd International Expert Workshop on IT Early Warning Systems, November 8.-9., 2011, Vienna, Austria,organised by Fraunhofer AISEC Garching near Munich, Germany, and Department for Secure Information Systems, Upper Austria University of Applied Sciences Hagenberg, Austria
    • 2nd Expert Workshop on IT Early Warning Systems, October 21.-22., 2010, Linz, Austria, organised by Fraunhofer Security in Information Technology, Garching near Munich, Germany, and Department for Secure Information Systems, Upper Austria University of Applied Sciences Hagenberg, Austria
    • 1st Expert Workshop on IT Early Warning Systems, December 14.-15. 2009, at Technical University Munich, organised by Fraunhofer Security in Information Technology, Garching near Munich, Germany, and Department for Secure Information Systems, Upper Austria University of Applied Sciences Hagenberg, Austria

    Committees

    Steering Committee

    • First Ambient Networks Workshop on Mobility, Multiaccess, and Network Management, October 2007, Sydney, Australia

    TPC member

    • IEEE Communication and Information Systems Security (CISS) Symposium at IEEE ICC 2009 – 2025
    • IEEE International Automated Vehicle Validation Conference (IAVVC) 2023 – 2024
    • IEEE International Conference on Connected Vehicles and Expo (ICCVE) 2013 – 2022
    • 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS’2011), Paris, France, February 2011
    • Second International ICST Conference on Mobile Networks and Management (MONAMI), Santander, Spain, 22-24 September 2010
    • IFIP Networking 2009 Workshop Mobile and Wireless Networks Security (MWNS’09), Aachen, Germany, May 2009
    • IEEE Globecom 2008 Symposium on Computer and Communications Network Security (CCNS), New Orleans, LA, USA, November 2008
    • International Symposium on Computer Science and its Applications 2008 (CSA-08), Hobart, Australia, October, 2008
    • Advances in Internet Symposium of Chinacom 2008, Hangzhou, China, August, 2008
    • IFIP Networking 2008 Workshop Mobile and Wireless Networks Security (MWNS’08), Singapore, May 2008
    • ACM Int. Workshop on Quality of Protection (QoP 2007), Alexandria VA, USA, October 2007
    • Int. Workshop on Security and Trust Management (STM 2007), Dresden, Germany, September 2007
    • Advances in Internet Symposium of Chinacomm’2007, Shanghai, China, August 2007
    • ICC07 CCN Symposium, Glasgow, Scotland, June 2007, SECC
    • Third Annual VoIP Security Workshop, Berlin, 2006
    • OOPSLA Mid-Year Telecommunication Workshop, New Jersey, 1995
    • 2nd International Conference on Intelligence in Services and Networks (IS&N’94), September 1994, Aachen

    Organisation Committee

    • IFIP International Conference on Open Distributed Processing (IWODP), October 1993, Berlin
    • First IFIP International Workshop on Open Distributed Processing (IWODP), October 1991, Berlin
    • Second IFIP International Workshop on Protocol Test Systems (IWPTS), October 1989, Berlin

    Associate Editor

    • Journal Security and Communication Networks, John Wiley & Sons

    Reviewing

    • IEEE Internet Computing
    • IET Information Security
    • IEEE Globecom 2009-2012 Communications and Information Security Symposium
    • IEEE Globecom 2008 - Next Generation Networks, Protocols, and Services Symposium
    • IEICE Trans. Communication, Japan
    • Journal of Network and Systems Management, Special Issue on Distributed Management
    • ACM Multimedia 2002
    • WCNC ’04
    • Wireless Personal Multimedia Communications, 2004 (WPMC2004)
    • IST Mobile Summit 2005, 2006, 2007
    • IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005
    • IEEE Globecom 2006 - Network Security Systems
    • Wireless Personal Communications 2006
    • Int. Symposium on Protocol Testing and Verification (ISPTV)
    • Int. Workshop on Open Distributed Processing (IWODP)
    • Int. Conference on Open Distributed Processing (ICODP)
    • Int. Workshop on interactive Distributed Multimedia Systems and Telecommunicaton Services (IDMS’97 and 98)
    • Intelligence in Services and Networks (IS&N’95)
    • Int. Conference on Distributed Platforms (ICDP’96)
    • Trends in Distributed Systems (TreDS’96)
    • Computer Communications Journals
    • Journal of Theory and Practice of Object Systems (TAPOS)