André Sekulla

André Sekulla

Master of Science

About

11
Publications
4,086
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
50
Citations

Publications

Publications (11)
Chapter
Attack trees are an established concept in threat and risk analysis. They build the basis for numerous frameworks aiming to determine the risk of attack scenarios or to identify critical attacks or attack paths. However, existing frameworks do not provide systematic analyses on the asset-level like the probability of successful or near-successful a...
Conference Paper
Attack trees are an established concept in threat and risk analysis. They build the basis for numerous frameworks aiming to determine the risk of attack scenarios or to identify critical attacks or attack paths. However, existing frameworks do not provide systematic analyses on the asset-level like the probability of (un)successful attacks per asse...
Conference Paper
Kleine und mittelständische Unternehmen haben oftmals große Probleme in der Einführung eines ISMS und einer Verbesserung der eigenen IT-Sicherheit. Besonders kritische Infrastrukturen wie Energienetzbetreiber sind gesetzlich dazu verpflichtet ein ISMS einzuführen und für eine bestmögliche Sicherheit zu sorgen. Diesen Unternehmen fehlt es jedoch oft...
Conference Paper
Full-text available
A web-based platform was developed to support the inter-organisational collaboration between small and medium-sized energy providers. Since critical infrastructures are subject to new security regulations in Germany, the platform particularly serves for the exchange of experience and for mutual support in information security. The focus of this wor...
Presentation
Full-text available
It is often argued that blockchain is a 'disintermediating' technology, which will find an application in a variety of domains because it provides for speed, low cost and the removal of layers of trustful encounters. In this paper, we want to argue that the degree to which this might be true depends very much on the kind of application envisaged. W...
Article
In this work, the influence on and application of Machine Learning tornthe domain of Additive Manufacturing or synonymously 3D printing is reviewed.rnExisting literature is identified by a literature search and grouped according to its application in 3D printing. We provide insight into this research and thernpotential of Machine Learning, Deep Lea...
Article
Full-text available
As part of the research project "Secure information networks of small- and medium-sized energy providers" (SIDATE), a survey about the IT security status of German energy providers was conducted. The project itself is focused on the IT security of small- and medium-sized energy providers. In August 2016, 881 companies listed by the Federal Network...
Technical Report
Full-text available
As part of the research project "Secure information networks of small- and medium-sized energy providers" (SIDATE), a survey about the IT security status of German energy providers was conducted. The project itself is focused on the IT security of small- and medium-sized energy providers. In August 2016, 881 companies listed by the Federal Network...

Network

Cited By

Projects

Project (1)
Project
Due to the recent German and European regulations for critical infrastructures, the concerned companies and especially energy providers are required to get certifications for their security. As a consequence in particular small and medium-sized energy providers struggle to fulfil the requirements. Compared to larger providers, there is a lack of financial and human resources which they could utilise for IT security. The aim of the SIDATE project is to develop tools and concepts in order to support small and medium-sized energy providers to continuously improve their security. Since many of them face same challenges, a natural solution to support them is to stimulate inter-organisational collaboration. This should be done by building an inter-organisational collaboration platform for energy providers. The platform should enable the energy providers to share their knowledge about IT security in a structured way. One of the platform’s modules should be a security self-assessment and benchmarking module, so the energy providers can easily assess and compare their security level.