@INPROCEEDINGS{SigComm:2020:iLab-Home, author = {Pahl, Marc-Oliver}, title = {iLab@Home: Hands-On Networking Classes without Lab Access}, booktitle = {Sigcomm 2020 Education}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_SigComm_iLab_at_home.pdf}}

@INPROCEEDINGS{SigComm:2020:iLab-Home, author = {Pahl, Marc-Oliver}, title = {iLab@Home: Hands-On Networking Classes without Lab Access}, booktitle = {Sigcomm 2020 Education}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_SigComm_iLab_at_home.pdf}}

@INPROCEEDINGS{ETFA:2020:OpenSource_OPC-UA, author = {Mühlbauer, Nikolas and Kirdan, Erkin and Pahl, Marc-Oliver and Carle, Georg}, title = {Open-Source OPC UA Security and Scalability}, booktitle = {ETFA 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ETFA_Open-Source_OPC-UA.pdf}}

@INPROCEEDINGS{ETFA:2020:OpenSource_OPC-UA, author = {Mühlbauer, Nikolas and Kirdan, Erkin and Pahl, Marc-Oliver and Carle, Georg}, title = {Open-Source OPC UA Security and Scalability}, booktitle = {ETFA 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ETFA_Open-Source_OPC-UA.pdf}}

@INPROCEEDINGS{ISCC:2020:Group-Key, author = {Piccoli, Alessandro and Pahl, Marc-Oliver and Wüstrich, Lars}, title = {Group Key Management in Constraint IoT Settings}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Group-Key.pdf}}

@INPROCEEDINGS{ISCC:2020:Group-Key, author = {Piccoli, Alessandro and Pahl, Marc-Oliver and Wüstrich, Lars}, title = {Group Key Management in Constraint IoT Settings}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Group-Key.pdf}}

@INPROCEEDINGS{ISCC:2020:Deep_Replace_Domain, author = {Lübben, Christian and Pahl, Marc-Oliver and Khan, Mohammad Irfan}, title = {Using Deep Learning to Replace Domain Knowledge}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Deep_Domain_Knowledge.pdf}}

@INPROCEEDINGS{ISCC:2020:Deep_Replace_Domain, author = {Lübben, Christian and Pahl, Marc-Oliver and Khan, Mohammad Irfan}, title = {Using Deep Learning to Replace Domain Knowledge}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Deep_Domain_Knowledge.pdf}}

@INPROCEEDINGS{ISCC:2020:Security_Taxonomy, author = {Wüstrich, Lars and Pahl, Marc-Oliver and Liebald, Stefan}, title = {An extensible IoT Security Taxonomy}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Security_Taxonomy.pdf}}

@INPROCEEDINGS{ISCC:2020:Security_Taxonomy, author = {Wüstrich, Lars and Pahl, Marc-Oliver and Liebald, Stefan}, title = {An extensible IoT Security Taxonomy}, booktitle = {IEEE ISCC 2020}, year = {2020}, webpdf = {https://s2labs.org/download/publications/2020_ISCC_Security_Taxonomy.pdf}}

@article{pahl:2019:Commag, author = {Pahl, Marc-Oliver}, title = {Learning by Teaching: Professional Skills and New Technologies for University Education}, journal = {{IEEE} Communications Magazine}, volume = {57}, number = {11}, pages = {74--80}, year = {2019}, url = {https://doi.org/10.1109/MCOM.001.1900248}, doi = {10.1109/MCOM.001.1900248}, timestamp = {Wed, 27 Nov 2019 08:28:22 +0100}, biburl = {https://dblp.org/rec/bib/journals/cm/Pahl19}, bibsource = {dblp computer science bibliography, https://dblp.org}, webpdf = {https://s2labs.org/download/publications/2019_Commag_LearningByTeaching.pdf}}

@article{pahl:2019:Commag, author = {Pahl, Marc-Oliver}, title = {Learning by Teaching: Professional Skills and New Technologies for University Education}, journal = {{IEEE} Communications Magazine}, volume = {57}, number = {11}, pages = {74--80}, year = {2019}, url = {https://doi.org/10.1109/MCOM.001.1900248}, doi = {10.1109/MCOM.001.1900248}, timestamp = {Wed, 27 Nov 2019 08:28:22 +0100}, biburl = {https://dblp.org/rec/bib/journals/cm/Pahl19}, bibsource = {dblp computer science bibliography, https://dblp.org}, webpdf = {https://s2labs.org/download/publications/2019_Commag_LearningByTeaching.pdf}}

@MISC{pahl:2019GIRegioPrivacy-video, author = {Pahl, Marc-Oliver}, title = {[Video] Über die Vereinbarkeit von Digitaler Transformation und Privatsphäre im Internet der Dinge}, howpublished = {Invited talk at the German Informatics (GI) society regional group meeting, Jun 3, 2019}, month = {Jun}, year = {2019}, webpdf = {https://youtu.be/qRhzDXwnt-c}, abstract={Die Digitale Transformation ist unumkehrbar, überall und betrifft jeden von uns. Mit den neuen Diensten geht unzertrennbar ein neues Sammeln von Daten einher. Ein smarter Lautsprecher in Ihrem Zuhause kann beispielsweise aktuell nur funktionieren, indem er Ihre Sprache zu einem Anbieter ins Internet hochlädt. Was dann mit Ihren Daten geschieht liegt außerhalb Ihrer Entscheidung.Ausgehend von aktuellen Beispielen aus den Bereichen autonomes Fahren und Industrielles Internet der Dinge (IIoT) werde ich zunächst beispielhaft aufzeigen, wo Gefahren für die Wahrung unserer Privatsphäre lauern. Anschließend werde ich auf die Verantwortung von Informatikern eingehen, ethische Grundsätze zu beachten und zu verinnerlichen wenn sie Anwendungen bereitstellen. Schließlich werde ich Möglichkeiten aufzeigen, wie zukünftige IT Systeme aus verteilten vernetzen Dingen in Zukunft sicherer werden könnten.Ich hoffe auf eine rege Diskussion während und insbesondere nach dem Vortrag zu diesem für uns alle wichtigen Thema.?}}