
Laurin Doerr
Publications:
Sort by: | Year | | Title | | Citations |

A resource-preserving self-regulating Uncoupled MAC algorithm to be applied in incident detection | |
Authors: | Michael Heigl, Laurin Doerr, Nicolas Tiefnig, Dalibor Fiala, Martin Schramm |
Source: | Computers & Security, vol. 85, pp. 270-287, 2019. |
ISSN: | 0167-4048 |
Download: | ![]() |
View record in Web of Science® |

Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks | |
Authors: | Laurin Doerr, Michael Heigl, Dalibor Fiala, Martin Schramm |
Source: | Proc. of the 2019 International Electronics Communication Conference, Okinawa, Japan, pp. 21-26, 2019. (ISBN 978-1-4503-7177-3) |
Download: | ![]() |

On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks | |
Authors: | Michael Heigl, Laurin Doerr, Martin Schramm, Dalibor Fiala |
Source: | Proc. 16th International Joint Conference on e-Business and Telecommunications (SECRYPT), Prague, Czech Republic, pp. 72-83, 2019. (ISBN 978-989-758-378-0) |
Download: | ![]() |
View record in Web of Science® |

Incident Reaction Based on Intrusion Detections’ Alert Analysis | |
Authors: | Michael Heigl, Laurin Doerr, Amar Almaini, Dalibor Fiala, Martin Schramm |
Source: | Proc. 23rd International Conference on Applied Electronics, Pilsen, Czech Republic, pp. 45-50, 2018. (ISBN 978-80-261-0721-7) |
Download: | ![]() |
View record in Web of Science® |

Assessment Simulation Model for Uncoupled Message Authentication | |
Authors: | Laurin Doerr, Dalibor Fiala, Michael Heigl, Martin Schramm |
Source: | Proc. 22nd International Conference on Applied Electronics, Pilsen, Czech Republic, pp. 45-48, 2017. (ISBN 978-80-261-0641-8) |
Download: | ![]() |
View record in Web of Science® |
Projects:

Data Mining for Computer Networks Security | |
Authors: | Michael Heigl, Laurin Doerr, Dalibor Fiala |
Desc.: | Novel data mining methods for the enhancement of computer networks security using advanced outlier detection techniques on streaming data are investigated. |