• Home
  • Thomas D. Wagner
Thomas D. Wagner

Thomas D. Wagner
  • Doctor of Philosophy
  • Lead Technical Officer at ETAS (Bosch Group)

About

6
Publications
2,426
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
314
Citations
Introduction
Thomas D. Wagner is currently working for the Bosch Product Security Incident Response Team (PSIRT) in Stuttgart, Germany. Thomas does research in Computer Security and Reliability. The current research focus lies on Cyber Threat Intelligence for Iot, IIoT and embedded systems.
Current institution
ETAS (Bosch Group)
Current position
  • Lead Technical Officer
Additional affiliations
September 2014 - February 2020
Birmingham City University
Position
  • PhD Student

Publications

Publications (6)
Conference Paper
Cyber Threat Intelligence (CTI) programs have gained momentum across the cybersecurity community. Whether they are vendor based or open source solutions, practitioners should be able to find an appropriate solution to enhance security for their IT infrastructure. The tangible world, i.e. (Industrial) Internet of Things (I)IoT products and embedded...
Article
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process of CTI sharing, and even the basic consumption, has raised new challenges for researchers and practitioners. This extensive literature survey explores the current state-of-the-a...
Article
Full-text available
Cyber threat intelligence sharing has become a focal point for many organizations to improve resilience against cyberattacks. The objective lies in sharing relevant information achieved through automating as many processes as possible without losing control or compromising security. The intelligence may be crowdsourced from decentralized stakeholde...
Chapter
Cyber threat intelligence sharing is an imperative process to survive current and future attacks. The received information may protect stakeholders from being attacked by utilizing the course of action to remedy on-site vulnerabilities. Automating this process has shown to be challenging because several processes have to be synchronized and orchest...

Network

Cited By