Lars Fischer
Lars Fischer
Hochschule Bremerhaven
Verified email at
Cited by
Cited by
Vars: A vehicle ad-hoc network reputation system
F Dotzer, L Fischer, P Magiera
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
Secure revocable anonymous authenticated inter-vehicle communication (SRAAC)
L Fischer, A Aijaz, C Eckert, D Vogt
4th Conference on Embedded Security in Cars (ESCAR 2006), Berlin, Germany 148, 2006
Measuring unlinkability revisited
L Fischer, S Katzenbeisser, C Eckert
Proceedings of the 7th ACM workshop on Privacy in the electronic society …, 2008
Adversarial resilience learning-towards systemic vulnerability analysis for large and complex systems
L Fischer, JM Memmen, E Veith, M Tröschel
arXiv preprint arXiv:1811.06447, 2018
The MANTICORE project: providing users with a logical IP network service
E Grasa, X Hesselbach, S Figuerola, V Reijs, D Wilson, JM Uzé, L Fischer, ...
TERENA Networking Conference (5/2008), 2008
Analyzing cyber-physical systems from the perspective of artificial intelligence
EMSP Veith, L Fischer, M Tröschel, A Nieße
Proceedings of the 2019 International Conference on Artificial Intelligence …, 2019
Trust, security and privacy in vanets a multilayered security architecture for c2c-communication
F Stumpf, L Fischer, C Eckert
VDI BERICHTE 2016, 55, 2007
Context-aware, trust-based access control for the di. me userware
M Heupel, L Fischer, D Kesdogan, M Bourimi, S Scerri, F Hermann, ...
2012 5th International Conference on New Technologies, Mobility and Security …, 2012
Study on the evaluation of risks of cyber-incidents and on costs of preventing cyber-incidents in the energy sector
L Fischer, M Uslar, D Morrill, M Döring, E Haesen
European Commission: Berlin, Germany 6, 41, 2018
Analyzing power grid, ICT, and market without domain knowledge using distributed artificial intelligence
E Veith, S Balduin, N Wenninghoff, M Tröschel, L Fischer, A Nieße, ...
arXiv preprint arXiv:2006.06074, 2020
Service composition with consideration of interdependent security objectives
F Karatas, L Fischer, D Kesdogan
Science of Computer Programming 97, 183-201, 2015
IT security for functional resilience in energy systems: effect-centric IT security
L Fischer, S Lehnhoff
Handbook on Resilience of Socio-Technical Systems, 316-340, 2019
Protecting integrity and secrecy of mobile agents on trusted and non-trusted agent places
L Fischer
University of Bremen, 2003
Robust and deterministic scheduling of power grid actors
E Frost, EMSP Veith, L Fischer
2020 7th International Conference on Control, Decision and Information …, 2020
Building federated research networks in Europe
L Fischer, B Belter, M Przywecki, M Cosin, P Van Daalen, M Kaat, I Golub, ...
Terena Networking Conference. Prague, Czech Republic, 1-13, 2010
Enhancing privacy in collaborative scenarios utilising a flexible proxy layer
L Fischer, M Heupel, M Bourimi, D Kesdogan, R Gimenez
The First International Conference on Future Generation Communication …, 2012
Incremental development of a co-simulation setup for testing a generation unit controller for reactive power provision
J Velasquez, K Piech, S Lehnhoff, L Fischer, S Garske
Computer Science-Research and Development 32, 3-12, 2017
Ontology-enabled access control and privacy recommendations
M Heupel, L Fischer, M Bourimi, S Scerri
International Workshop on Mining Ubiquitous and Social Environments, 35-54, 2013
A trust model in control systems to enhance and support cybersecurity
B Siemers, L Fischer, S Lehnhoff
2022 IEEE 7th International Energy Conference (ENERGYCON), 1-6, 2022
Performance testing smart grid applications using a distributed co-simulation approach
F Schloegl, M Buescher, K Diwold, S Lehnhoff, L Fischer, F Zeilinger, ...
IECON 2016-42nd Annual Conference of the IEEE Industrial Electronics Society …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20