| | |
---|
2020 | Applicability of Security Standards for Operational Technology by SMEs and Large Enterprises Wagner, Patrick; Hansch, Gerhard; Konrad, Christoph; John, Karl-Heinz; Bauer, Jochen; Franke, Jörg | Conference Paper |
2020 | Bayesian network model for accessing safety and security of offshore wind farms Ramírez-Agudelo, Oscar Hernán; Köpke, Corinna; Sill Torres, Frank | Conference Paper |
2020 | Industrie 4.0 Virtual Automation Bus Architecture Kuhn, Thomas; Antonino, Pablo Oliveira; Schnicke, Frank | Conference Paper |
2020 | Integrating security evaluations into virtual commissioning Giehl, Alexander; Wiedermann, Norbert; Tayebi Gholamzadeh, Makan; Eckert, Claudia | Conference Paper |
2020 | A Multi-Scale and Multi-Temporal Hyperspectral Target Detection Experiment - From Design to First Results Vögtli, M.; Schreiner, S.; Boehler, J.; Groß, W.; Küster, J.; Mispelhorn, J.; Hueni, A.; Middelmann, W.; Kneubuehler, M. | Conference Paper |
2020 | Portable Trust Anchor for OPC UA Using Auto-Configuration Meier, David; Patzer, Florian; Drexler, Matthias; Beyerer, Jürgen | Conference Paper |
2020 | SDN-based security management of multiple WoT Smart Spaces El Jaouhari, Saad; Bouabdallah, Ahmed; Corici, Andreea Ancuta | Journal Article |
2020 | Securing Electric Vehicle Charging Systems through Component Binding Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria | Conference Paper |
2020 | Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective Ermakova, Tatiana; Fabian, Benjamin; Kornacka, Marta; Thiebes, Scott; Sunyaev, Ali | Journal Article |
2020 | SEPAD - Security Evaluation Platform for Autonomous Driving Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey | Conference Paper |
2020 | Towards accelerating intrusion detection operations at the edge network using FPGAs Rebahi, Yacine; Catal, Faruk; Tcholtchev, Nikolay; Maedje, Laurenz; Alkhateeb, Omar; Elangovan, Vinoth Kumar; Apostolakis, Dimitris | Conference Paper |
2020 | Using TDL for Standardised Test Purpose Definitions Makedonski, Philip; Gheorghe-Pop, Ilie-Daniel; Rennoch, Axel; Kristoffersen, Finn; Pintar, Bostjan; Ulrich, Andreas | Conference Paper |
2019 | Context-aware Security Jung, Christian : Rombach, Dieter; Pretschner, Alexander; Deßloch, S. | Dissertation |
2019 | Dealing with Non-Functional Requirements in Model-Driven Development: A Survey Ameller, David; Franch, Xavier; Gómez, Cristina; Martínez-Fernández, Silverio; Araujo, Joao; Biffl, Stefan; Cabot, Jordi; Cortellessa, Vittorio; Méndez, Daniel; Moreira, Ana; Muccini, Henry; Vallecillo, Antonio; Wimmer, Manuel; Amaral, Vasco; Bühm, Wolfgang; Bruneliere, Hugo; Burgueño, Loli; Goulão, Miguel; Teufl, Sabine; Berardinelli, Luca | Journal Article |
2019 | Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs Giehl, Alexander; Schneider, Peter; Busch, Maximilian; Schnoes, Florian; Kleinwort, Robin; Zaeh, Michael F. | Conference Paper |
2019 | A new security approach in telecom infrastructures: The RESISTO concept Belesioti, Maria; Makri, Rodoula; Fehling-Kaschek, Mirjam; Carli, Marco; Kostopoulos, Alexandros; Chochliouros, Ioannis P.; Neri, Alberto; Frosali, Federico | Conference Paper |
2019 | Orchestration of IoT Device and Business Workflow Engine on Cloud Kikuchi, Shinji; Thomas, Ian; Jallouli, Ons; Dörr, Jörg; Morgenstern, Andreas; Baccelli, Emmanuel; Schleiser, Kaspar | Conference Paper |
2019 | Securing the IoT. Utilizing conformance tessuites for fuzzing Knoblauch, Dorian; Hackel, Sascha | Conference Paper |
2018 | DEIS: Dependability Engineering Innovation for Industrial CPS Armengaud, Eric; Macher, Georg; Massoner, Alexander; Frager, Sebastian; Adler, Rasmus; Schneider, Daniel; Longo, Simone; Melis, Massimiliano; Groppo, Riccardo; Villa, Federica; O'Leary, Padraig; Bambury, Kevin; Finnegan, Anita; Zeller, Marc; Höfig, Kai; Papadopoulos, Yiannis; Hawkins, Richard; Kelly, Tim | Conference Paper |
2018 | Digitalization for (Green and) Efficient Operations in Ports Bosse, Claudia | Presentation |
2018 | A reference architecture for integrating safety and security applications on railway command and control systems Birkholz, Henk; Zhdanova, Maria; Krauß, Christoph; Arul, Tolga; Heinrich, Markus; Katzenbeisser, Stefan; Vateva-Gurova, Tsvetoslava; Suri, Neeraj; Kuzhiyelil, Don; Schlehuber, Christian | Conference Paper |
2018 | Resilience quantification of urban areas Fischer, Kai : Hiermaier, Stefan (Hrsg.) | Dissertation |
2018 | Security Verification of Third Party Design Files in Manufacturing Giehl, Alexander; Wiedermann, Norbert | Conference Paper |
2018 | Technologievorausschau für Verteidigung und Sicherheit Neupert, Ulrik | Journal Article |
2018 | Test of industrial Internet of Things. Opening the black box Jaekel, Frank-Walter; Torka, Jan | Conference Paper |
2018 | Towards a compact, portable, handheld device for contactless real-time standoff detection of hazardous substances Carson, Christopher; Macarthur, John; Warden, Matthew; Stothard, David; Butschek, Lorenz; Hugger, Stefan; Jarvis, Jan-Philip; Härtelt, Marko; Ostendorf, Ralf; Merten, André; Schwarzenberg, Markus; Grahmann, Jan; Ratajczyk, Marcin | Conference Paper |
2018 | Zusatzversicherung - Bitdefender Hypervisor-based Memory Introspection Knermann, Christian | Journal Article |
2017 | Data residency challenges and opportunities for standardization Abramson, Mike; Arbuckle, Brian; Baudoin, Claude; Dani, Jayant; DiPaula-Coyle, Michael; Gawade, Preetam; Gharote, Mangesh; Harris, David; Iyengar, Sridhar; Jung, Christian; Kumar Nutheti, Kiran; O'Neill, Dennis; Scaduto, Justin; Schalk, Karolyn; Schwarz, Reinhard; Stavros, Nick; Tessier, Denise; Tumashov, Alex; Wales, Char | Report |
2017 | Efficient distribution of certificate chains in VANETs Bittl, Sebastian; Roscher, Karsten | Conference Paper |
2017 | Efficient security zones implementation through hierarchical group key management at NoC-based MPSoCs Sepulveda, J.; Flórez, D.; Immler, V.; Gogniat, G.; Sigl, G. | Journal Article |
2017 | IT-Sicherheit für Bankenrechenzentren: Cyberrisiken bis in die Kern-Geschäftsprozesse analysieren Großmann, Jürgen; Viehmann, Johannes | Journal Article |
2017 | Modellbasiertes Security-Testen Großmann, Jürgen; Schneider, Martin; Viehmann, Johannes | Book Article |
2017 | Mutual influence of certificate distribution and pseudonym change strategies in vehicular ad-hoc networks Bittl, Sebastian; Roscher, Karsten | Journal Article |
2017 | Smart Everything - welche Macht hat IT? Liggesmeyer, Peter | Book Article |
2017 | Towards a generic resilience management, quantification and development process Häring, Ivo; Sansavini, Giovanni; Bellini, Emanuele; Martyn, Nick; Kovalenko, Tatyana; Kitsak, Maksim; Vogelbacher, Georg; Ross, Katharina; Bergerhausen, Ulrich; Barker, Kash; Linkov, Igor | Book Article |
2017 | A User-Centered Model for Usable Security and Privacy Feth, Denis; Maier, Andreas; Polst, Svenja | Report |
2017 | A User-Centered Model for Usable Security and Privacy Feth, Denis; Maier, Andreas; Polst, Svenja | Conference Paper |
2016 | Context-aware mobile security Jung, Christian; Feth, Denis | Report |
2016 | The context-dependence of citizens’ attitudes and preferences regarding privacy and security Friedewald, Michael; Lieshout, Marc van; Rung, Sven; Ooms, Merel | Book Article |
2016 | Efficient authorization authority certificate distribution in VANETs Bittl, Sebastian; Roscher, Karsten | Conference Paper |
2016 | The EMC2 project on embedded microcontrollers: Technical progress after two years Weber, Werner; Hoess, Alfred; Deventer, Jan van; Oppenheimer, Frank; Ernst, Rolf; Kostrzewa, Adam; Doré, Philippe; Goubier, Thierry; Isakovic, Haris; Druml, Norbert; Wuchner, Egon; Schneider, Daniel; Schoitsch, Erwin; Armengaud, Eric; Soederqvist, Thomas; Traversone, Massimo; Uhrig, Sascha; Pérez-Cortés, Juan Carlos; Saez, Sergio; Kuusela, Juha; Helvoort, Mark van; Cai, Xing; Nordmoen, Björn; Paulsen, Geir Yngve; Dahle, Hans Petter; Geissel, Michael; Salecker, Jürgen; Tummeltshammer, Peter | Conference Paper |
2016 | Feasibility of Verify-on-Demand in VANETs Bittl, Sebastian; Roscher, Karsten | Conference Paper |
2016 | A framework for a uniform quantitative description of risk with respect to safety and security Beyerer, Jürgen; Geisler, Jürgen | Journal Article |
2016 | Global IT-Player Google, Facebook & Co: Fluch oder Segen? Bantes, René | Presentation |
2016 | Industrial Data Space. Digital Souvereignity Over Data Otto, Boris; Jürjens, Jan; Schon, Jochen; Auer, Sören; Menz, Nadja; Wenzel, Sven; Cirullies, Jan : Cirullies, Jan (Redaktion) | Report |
2016 | Industrial Data Space. Digitale Souveränität über Daten Otto, Boris; Jürjens, Jan; Schon, Jochen; Auer, Sören; Menz, Nadja; Wenzel, Sven; Cirullies, Jan : Cirullies, Jan (Redaktion) | Report |
2016 | Knowledge-driven scenario development for critical infrastructure protection Xie, Jingquan; Theocharidou, Marianthi; Barbarin, Yohan | Conference Paper |
2016 | Modelling the relationship between privacy and security perceptions and the acceptance of surveillance practices Friedewald, Michael; Lieshout, Marc van; Rung, Sven | Conference Paper |
2016 | Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures Krauß, D.; Thomalla, Christoph | Conference Paper |
2016 | Quantitative IT-Sicherheitsbewertung von Authentifizierungs- und Autorisierungsverfahren Hofbauer, Brigitte : Handel, Peter (Erstbegutachter); Hudler, Peter (Zweitbegutachter) | Master Thesis |
2016 | Secure and interoperable communication infrastructures for PPDR organisations Müller, Wilmuth; Marques, H.; Pereira, L.; Rodriguez, J.; Brouwer, F.; Bouwers, B.; Politis, I.; Lykourgiotis, A.; Ladas, A.; Adigun, O.; Jelenc, D. | Conference Paper |
2016 | Security patterns modeling and formalization for pattern-based development of secure software systems Hamid, Brahim; Gürgens, Sigi; Fuchs, Andreas | Journal Article |
2016 | Working and living in interactive environments - requirements for security and privacy Krempel, Erik; Birnstill, Pascal; Beyerer, Jürgen | Conference Paper |
2015 | Automatic derivation of context descriptions Jung, Christian; Feth, Denis; Elrakaiby, Yehia | Conference Paper |
2015 | Civilizing drones - military discourses going civil? Braun, Sven; Friedewald, Michael; Valkenburg, G. | Journal Article |
2015 | Dealing with uncertainty in context-aware mobile applications Jung, Christian; Eitel, Andreas; Feth, Denis; Rudolph, Manuel | Conference Paper |
2015 | Distribution of pseudonym certificates via bursts for VANETs with low and medium mobility Bittl, Sebastian; Aydinli, Berke; Roscher, Karsten | Conference Paper |
2015 | Effective certificate distribution in ETSI ITS VANETs using implicit and explicit requests Bittl, Sebastian; Aydinli, Berke; Roscher, Karsten | Conference Paper |
2015 | Efficient distribution of static or slowly changing configuration parameters in VANETs Bittl, Sebastian | Conference Paper |
2015 | Efficient rate-adaptive certificate distribution in VANETs Bittl, Sebastian; Aydinli, Berke; Roscher, Karsten | Conference Paper |
2015 | Emerging attacks on VANET security based on GPS time spoofing Bittl, Sebastian; Gonzalez, Arturo A.; Myrtus, Matthias; Beckmann, Hanno; Sailer, Stefan; Eissfeller, Bernd | Conference Paper |
2015 | Five major reasons why safety and security haven't married (yet) Amorim, Tiago Luiz Buarque de; Schneider, Daniel; Nguyen, Viet Yen; Schmittner, Christoph; Schoitsch, Erwin | Journal Article |
2015 | Multi-level user and role concept for a secure plug-and-work based on OPC UA and AutomationML Schleipen, Miriam; Selyansky, E.; Henssen, Robert; Bischoff, Tino | Conference Paper |
2015 | Privacy and security perceptions of European citizens: A test of the trade-off model Friedewald, Michael; Lieshout, Marc van; Rung, Sven; Ooms, Merel; Ypma, Jelmer | Conference Paper |
2015 | Privacy endangerment from protocol data sets in VANETs and countermeasures Bittl, Sebastian; Gonzalez, Arturo A. | Conference Paper |
2015 | Privacy issues and pitfalls in VANET standards Bittl, Sebastian; Gonzalez, Arturo A. | Conference Paper |
2015 | A quantitative risk model for a uniform description of safety and security Beyerer, Jürgen; Geisler, Jürgen | Conference Paper |
2015 | SafetyPIN: Secure PIN entry through eye tracking Seetharama, Mythreya; Paelke, Volker; Röcker, Carsten | Conference Paper |
2015 | Security overhead and its impact in VANETs Bittl, Sebastian; Roscher, Karsten; Gonzalez, Arturo A. | Conference Paper |
2015 | Towards the next generation training system for crisis management Xie, Jingquan; Vullings, Erik; Theocharidou, Marianthi | Presentation |
2015 | User-centric security. Optimization of the security-usability trade-off Feth, Denis | Conference Paper |
2014 | Advanced certificate distribution strategies for secure car-to-X communication with realistic simulations Aydinli, Berke : Sigl, Georg (Betreuer); Bittl, Sebastian (Betreuer) | Master Thesis |
2014 | An asset to security modeling? Analyzing stakeholder collaborations instead of threats to assets Poller, Andreas; Türpe, Sven; Kinder-Kurlanda, Katharina | Conference Paper |
2014 | Attack potential and efficient security enhancement of automotive bus networks using short MACs with rapid key change Bittl, Sebastian | Conference Paper |
2014 | Automatic derivation of context descriptions Jung, Christian; Feth, Denis; Elrakaiby, Yehia | Report |
2014 | Efficient construction of infinite length hash chains with perfect forward secrecy using two independent hash functions Bittl, Sebastian | Conference Paper |
2014 | EMC² AIPP, ARTEMIS CALL 2013 Schneider, Daniel; Armengaud, Eric; Schoitsch, Erwin; Hufeld, Knut | Journal Article |
2014 | Enhancing cloud security with context-aware usage control policies Jung, Christian; Eitel, Andreas; Schwarz, Reinhard | Report |
2014 | Enhancing cloud security with context-aware usage control policies Jung, Christian; Eitel, Andreas; Schwarz, Reinhard | Conference Paper |
2014 | Future threat scenarios for identifying societal security needs - the methodological approach based on European Project Ettis Dönitz, Ewa; Shala, Erduana; Leimbach, Timo | Conference Paper |
2014 | More safety for football events. Improving the communication of stakeholders and the dialogue with supporters Moßgraber, Jürgen; Kubera, T.; Werner, A. | Conference Paper |
2014 | OrchSec Demo: Demonstrating the Capability of an Orchtestrator-based Architecture for Network Security Zaalouk, Adel; Khondoker, Rahamatullah; Marx, Ronald; Bayarou, Kpatcha | Presentation |
2014 | Risk management for outsourcing to the cloud. Security risks and safeguards as selection criteria for extern cloud services Viehmann, Johannes | Conference Paper |
2014 | Schwachstellenanalyse mittels klassischer Internet-Suchmaschinen Opp, Axel : Diehl, Norbert (Supervisor); Simon, Kai (Supervisor) | Master Thesis |
2014 | Taking in-network security to the next level with software-defined networking Zaalouk, Adel : Wehrle, Klaus; Hummen, Rene; Waidner, Michael; Khondoker, Rahamatullah; Marx, Ronald | Master Thesis |
2014 | Towards trust assurance and certification in cyber-physical systems Schneider, Daniel; Armengaud, Eric; Schoitsch, Erwin | Conference Paper |
2014 | User-friendly and tailored policy administration points Rudolph, Manuel | Report |
2013 | Applications and methods with high energy CT systems Salamon, Michael; Boehnel, Michael; Reims, Nils; Ermann, Gerald; Voland, Virginia; Schmitt, Michael; Uhlmann, Norman; Hanke, Randolf | Conference Paper |
2013 | Berührungspunkte und übergreifende Risiken des Security- und Safety Engineering durch die Vernetzung elektronischer Automobilsysteme mit Internet-Konnektivität Robinson-Mallett, Christopher; Großmann, Jürgen; Kaiser, Bernd | Conference Paper |
2013 | COMPOSE - a journey from the internet of things to the internet of services Mandler, Benny; Antonelli, Fabio; Kleinfeld, Robert; Pedrinaci, Carlos; Carrera, David; Gugliotta, Alessio; Schreckling, Daniel; Carreras, Iacopo; Raggett, Dave; Pous, Marc; Villares, Carmen V.; Trifa, Vlad | Conference Paper |
2013 | Context-aware Policy Enforcement for Android Jung, Christian; Feth, Denis; Seise, Christian | Report |
2013 | Context-aware policy enforcement for Android Jung, Christian; Feth, Denis; Seise, Christian | Conference Paper |
2013 | Designing scalar quantizers with secrecy constraints Almeida, João; Maierbacher, Gerhard; Barros, João | Conference Paper |
2013 | Experience made using public cloud infrastructure to analyse clinical patient data Ziegler, Wolfgang; Ihle, Matthias; Claus, Steffen; Senger, Philipp; Mohebbi, Pooya; Khan, Zakir; Fluck, Juliane; Griebel, Lena; Sedlmayr, Martin; Berger, Florian; Laufer, Julian; Chatziastros, Astros; Drepper, Johannes | Conference Paper |
2013 | Future small unmanned aerial systems - how to protect people at mass events against attacks by use of small drones? Huppertz, Guido | Poster |
2013 | A global approach to risk assessment of critical infrastructures Rome, Erich; Antonio, Di Pietro; Pollino, Maurizio; D'Agostino, Gregorio; Rosato, Vittorio | Abstract |
2013 | Identification of emerging technologies and critical dependencies relevant to CBRN protection Burbiel, Joachim; Schietke, Ruth | Poster |
2013 | Identification of emerging technologies with security implications: Experience and results from the ETCETERA project Wepner, Beatrix; Huppertz, Guido | Conference Paper |
2013 | Identification of emerging technologies with security implications: Experience and results from WP4 of the ETCETERA project Huppertz, Guido | Conference Paper |
2013 | IoT reference architecture Bauer, Martin; Boussard, Mathieu; Bui, Nicola; Loof, Jourik de; Magerkurth, Carsten; Meissner, Sefan; Nettsträter, Andreas; Stefa, Julinda; Thoma, Matthias; Walewski, Joachim W. | Book Article |
2013 | OPENi - future of a consumer-centric cloud-based application platform Kleinfeld, Robert; Radziwonowicz, Lukasz; Griffin, Leigh; Robson, Eric; Lampathaki, Fenareti | Conference Paper |
2013 | Privacy preserving surveillance and the tracking-paradox Greiner, S.; Birnstill, Pascal; Krempel, Erik; Beckert, B.; Beyerer, Jürgen | Conference Paper |
2013 | Quality assessment in context of multicore processors Piebeng, Gauss Romuald : Rombach, H. Dieter (Supervisor); Plociennik, Christiane (Supervisor); Lampasona, Constanza (Supervisor) | Bachelor Thesis |
2013 | Results of the ETCETERA project Burbiel, Joachim; Schietke, Ruth | Conference Paper |
2013 | Service design studio for SaaS Steinbuss, Sebastian; Flake, Stephan; Ley, Martin; Schmülling, Christian; Tacken, Jürgen | Book Article |
2013 | Sicher in vernetzten Systemen. Integrative Betrachtung von funktionaler Sicherheit und Security Kemmann, Sören; Kalmar, Ralf; Schwarz, Reinhard | Journal Article |
2013 | Talking about technologies: Science meets Military Schulte, Anna; Vergin, Annika; John, Marcus; Burbiel, Joachim; Wellbrink, Jörg | Conference Paper |
2012 | Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters Bißmeyer, Norbert; Mauthofer, Sebastian; Bayarou, Kpatcha M.; Kargl, Frank | Conference Paper |
2012 | Citizens' perceptions of data protection and privacy in Europe Hallinan, Dara; Friedewald, Michael; McCarthy, Paul | Journal Article |
2012 | Computational verification of C protocol implementations by symbolic execution Aizatulin, M.; Gordon, D.; Jürjens, J. | Conference Paper |
2012 | Creating and applying security goal indicator trees in an industrial environment Jung, Christian; Elberzhager, Frank; Bagnato, Alessandra; Raiteri, Fabio | Report |
2012 | Creating and Applying Security Goal Indicator Trees in an Industrial Environment Bagnato, Alessandra; Raiteri, Fabio; Jung, Christian; Elberzhager, Frank | Book Article |
2012 | D7.4 ACRIMAS Website online Pastuszka, Hans-Martin | Report |
2012 | Flexible data-driven security for android Feth, Denis; Pretschner, Alexander | Conference Paper |
2012 | Flexible data-driven security for android Feth, Denis; Pretschner, Alexander | Report |
2012 | Granular deleting in multi level security models - an electronic engineering approach Thorleuchter, Dirk; Weck, Gerhard; Poel, Dirk van den | Conference Paper |
2012 | Hollow fiber based quantum cascade laser spectrometer for fast and sensitive drug identification Herbst, Johannes; Scherer, Benjamin; Ruf, Alexander; Erb, Jochen; Lambrecht, Armin | Conference Paper |
2012 | Localization and tracking of radioactive source carriers in person streams Wieneke, Monika; Koch, Wolfgang; Friedrich, Hermann; Chmel, Sebastian | Conference Paper |
2012 | A novel framework for efficient mobility data verification in vehicular ad-hoc networks Jaeger, A.; Bißmeyer, N.; Stübing, H.; Huss, S.A. | Journal Article |
2012 | On the security of cloud storage services Borgman, Moritz; Hahn, Tobias; Herfert, Michael; Kunz, Thomas; Richter, Marcel; Viebeg, Ursula; Vowé, Sven : Waidner, Michael | Study |
2012 | OPTIMIS: A holistic approach to cloud service provisioning Juan Ferrer, A.; Hernández, F.; Tordsson, J.; Elmroth, E.; Ali-Eldin, A.; Zsigri, C.; Sirvent, R.; Guitart, J.; Badia, R.M.; Djemame, K.; Ziegler, W.; Dimitrakos, T.; Nair, S.K.; Kousiouris, G.; Konstanteli, K.; Varvarigou, T.; Hudzia, B.; Kipp, A.; Wesner, S.; Corrales, M.; Forgo, N.; Sharif, T.; Sheridan, C. | Journal Article |
2012 | Privacy-aware access control for video data in intelligent surveillance systems Vagts, Hauke; Jakoby, Andreas | Conference Paper |
2012 | Service Design Studio (SDS) - the execution environment for the service design studio Iscan, Hülya; Flake, Stephan; Tacken, Jürgen; Ley, Martin; Schmülling, Christian | Presentation |
2012 | Sicherheits- und Datenschutzanforderungen an Smart Grid-Technologien Schriegel, Sebastian; Jasperneite, Jürgen | Journal Article |
2012 | SLA-based management of software licenses as web service resources in distributed computing infrastructures Cacciari, Claudio; Mallmann, Daniel; D'Andria, Francesco; Hagemeier, Björn; Rumpl, Angela; Ziegler, Wolfgang; Zsigri, Csilla; Martrat, Josep | Journal Article |
2012 | Usability based modeling for advanced IT-security - an electronic engineering approach Thorleuchter, Dirk; Weck, Gerhard; Poel, Dirk van den | Conference Paper |
2012 | The webinos project Fuhrhop, C.; Lyle, J.; Faily, S. | Conference Paper |
2011 | Car2X communication: Securing the last meter Schweppe, H.; Roudier, Y.; Weyl, B.; Apvrille, L.; Scheuermann, D. | Conference Paper |
2011 | Cloud Computing 2011 - Ziele, Bedenken und Fragestellungen hinsichtlich Softwareentwicklung Adam, Sebastian; Karjalajnen, Lena; Nunnenmacher, Sabine; Jung, Jessica; Olbrich, Steffen; Zimmermann, Fabian; Heintz, Matthias | Report |
2011 | The ETSI TVRA security-measurement methodology by means of TTCN-3 Notation Meer, J. de; Rennoch, A. | Presentation |
2011 | High granular multi-level-security model for improved usability Thorleuchter, Dirk; Poel, Dirk van den | Conference Paper |
2011 | Implementing trust in cloud infrastructures Neisse, Ricardo; Holling, Dominik; Pretschner, Alexander | Conference Paper |
2011 | Model-based security testing. Selected considerations Schieferdecker, I.; Großmann, J.; Rennoch, A. | Presentation |
2011 | Security evaluation of service-oriented systems with an extensible knowledge base Jung, Christian; Rudolph, Manuel; Schwarz, Reinhard | Conference Paper |
2011 | Security evaluation of service-oriented systems with an extensible knowledge base Jung, Christian; Rudolph, Manuel; Schwarz, Reinhard | Report |
2011 | Security testing approaches in industry and standardization Schieferdecker, I.; Rennoch, A.; Großmann, J. | Conference Paper |
2011 | Security testing techniques : Richier, J.-L. (Ed.) | Report |
2011 | Semantic technology classification - a defence and security case study Thorleuchter, Dirk; Poel, Dirk van den | Conference Paper |
2010 | Increasing security and privacy in user-centric identity management: The IdM card approach Marx, R.; Simo Fhom, H.; Scheuermann, D.; Bayarou, K.M.; Perez, A. | Conference Paper |
2010 | Indicator-based architecture-level security evaluation in a service-oriented environment Antonino, Pablo; Duszynski, Slawomir; Jung, Christian; Rudolph, Manuel | Report |
2010 | Indicator-based architecture-level security evaluation in a service-oriented environment Antonino, Pablo; Duszynski, Slawomir; Jung, Christian; Rudolph, Manuel | Conference Paper |
2010 | Integration of modular safety and security models for the analyse of the impact of security on safety Förster, Marc; Schwarz, Reinhard; Steiner, Max | Report |
2010 | Interoperability - a challenge of the EU services directive Breitenstrom, C.; Eckert, K.-P.; Fromm, J. | Book Article |
2010 | Mobile ground control station for local surveillance Segor, F.; Bürkle, A.; Partmann, T.; Schönbein, R. | Conference Paper |
2010 | Practical experience gained from modeling security goals. Using SGITs in an industrial project Jung, Christian; Elberzhager, Frank; Bagnato, Alessandra; Raiteri, Fabio | Conference Paper |
2010 | Practical experience gained from modeling security goals. Using SGITs in an industrial project Jung, Christian; Elberzhager, Frank; Bagnato, Alessandra; Raiteri, Fabio | Report |
2010 | SEIS - Sicherheit in eingebetteten IP-basierten Systemen Glass, M.; Herrscher, D.; Meier, H.; Piastowski, M.; Schoo, P. | Journal Article |
2010 | Sensor fusion based security concept on airports with a rotating millimetre wave person scanner Hantscher, S.; Lang, S.; Hägelen, M.; Essen, H.; Tessmann, A. | Conference Paper |
2010 | Sorting out smart surveillance Wright, D.; Friedewald, M.; Gutwirth, S.; Langheinrich, M.; Mordini, E.; Bellanova, R.; Hert, P. de; Wadhwa, K.; Bigo, D. | Journal Article |
2010 | Tool-supported inspections. Using security models as reading support for defect detection Jung, Christian; Elberzhager, Frank; Eschbach, Robert | Report |
2010 | Universal ground control station for heterogeneous sensors Bürkle, A.; Segor, F.; Kollmann, M.; Schönbein, R. | Journal Article |
2010 | Verifying mobility data under privacy considerations in Car-to-X communication Stübing, Hagen; Jaeger, Attila; Bißmeyer, Norbert; Schmidt, Christoph; Huss, Sorin A. | Conference Paper |
2009 | Analyse standartisierter Lösungen zur Absicherung von VoIP inklusive deren Verifikation bei bestehenden VoIP-Lösungen Hackenberg, M. : Kraas, A. (Prüfer); Marke, W. (Prüfer) | Term paper |
2009 | Attacking the BitLocker boot process Türpe, S.; Poller, A.; Steffan, J.; Stotz, J.-P.; Trukenmüller, J. | Conference Paper |
2009 | Evaluating the security of mobile agent platforms Bürkle, A.; Hertel, A.; Müller, W.; Wieser, M. | Journal Article |
2009 | Gefahrenpotentiale von chemischen Kampfstoffen und toxischen Industriechemikalien - das Punktesystem Burbiel, J.; Engelhard, N.; Grigoleit, S.; John, H.; Schulze, J. | Book Article |
2009 | Progress report on the experimental evaluation of security inspection guidance Elberzhager, Frank; Jawurek, Marek; Jung, Christian; Klaus, Alexander | Report |
2009 | Secure database development Jürjens, J.; Fernandez, E.B. | Book Article |
2009 | Securing Decentralized Workflows in Ambient Environments Kuntze, N.; Schütte, J. | Conference Paper |
2009 | Security and dependability engineering Jürjens, J. | Book Article |
2009 | Security inspection scenarios - a facet of security Klaus, Alexander; Elberzhager, Frank | Conference Paper |
2009 | Security inspection scenarios - a facet of security Klaus, Alexander; Elberzhager, Frank | Report |
2009 | Shaping the science-industry-policy interface in synthetic biology Gaisser, S.; Reiß, T. | Journal Article |
2009 | Standoff detection and imaging of suspicious and concealed objects with electromagnetic waves in the centimetre and millimetre range Sklarczyk, C.; Dobmann, G.; Melev, V.; Mayer, K. | Conference Paper |
2009 | Vertrauliche Verarbeitung staatlich eingestufter Information - die Informationstechnologie im Geheimschutz Gericke, W.; Thorleuchter, D.; Weck, G.; Reiländer, F.; Loß, D. | Journal Article |
2009 | What is the shape of your security policy? Security as a classification problem Türpe, S. | Conference Paper |
2008 | Attacking the BitLocker boot process Türpe, S.; Poller, A.; Steffan, J.; Stotz, J.-P.; Trukenmüller, J. | Presentation |
2008 | Detection indentification of concealed dangerous objects an substances Ratius, B.; Metzler, G.; Sklarczyk, C.; Altpeter, I.; Dobmann, G.; Kröning, M. | Conference Paper |
2008 | DFB laser diodes and quantum cascade lasers for sensors in safeguard applications Seufert, J.; Fischer, M.; Legge, M.; Roessner, K.; Werner, R.; Hildenbrand, J.; Herbst, J.; Lambrecht, A.; Koeth, J. | Conference Paper |
2008 | International research and technology capacity in the area of security and defense research Müller, S. | Book Article |
2008 | Localisation of threat potential in risk management Eckel, S.; Geisler, J. | Conference Paper |
2008 | Mining technologies in security and defense Thorleuchter, D. | Conference Paper |
2008 | Rules of thumb for developing secure software: Analyzing and consolidating two proposed sets of rules Peine, Holger | Conference Paper |
2008 | Sicherheitsbewertung von Datenflüssen in Java-Programmen Hildenbrand, Timo Peter : Rombach, H. Dieter (Supervisor); Mandel, Stefan (Supervisor) | Thesis |
2008 | Software inspections using guided checklists to ensure security goals Elberzhager, Frank; Klaus, Alexander; Jawurek, Marek | Report |
2008 | The weighted-bit assessment table of hazardous chemicals Burbiel, J.; Grigoleit, S.; Schulze, J. | Conference Paper |
2007 | Analysis and statistical properties of critical infrastructure interdependency multiflow models Svendsen, Nils Kalstad; Wolthusen, Stephen | Conference Paper |
2007 | Automated extraction of behavioural profiles from document usage Wolthusen, Stephen | Journal Article |
2007 | Context-aware security strategies for the virtual office of the future Roos, Tom : Rombach, H. Dieter (Supervisor); Keuler, Thorsten (Supervisor) | Thesis |
2007 | Das EU-Projekt "3D Face". 3-D-Gesichtserkennung für die unbeaufsichtigte Grenzkontrolle Busch, Christoph; Nouak, Alexander | Conference Paper |
2007 | Konzepte zur Verbesserung der Netzwerksicherheit an Hochschulen Turba, Martin : Likavec, Jaromir (Betreuer) | Bachelor Thesis |
2007 | Privacy, identity and security in ambient intelligence Friedewald, M.; Vildjiounaite, E.; Punie, Y.; Wright, D. | Journal Article |
2007 | The role of mathematics in information security education Wolthusen, Stephen | Conference Paper |
2007 | Security challenges for RFID key applications Hollstein, T.; Waldmann, U.; Birkholz, H.; Sohr, K. | Conference Paper |
2007 | Selected Readings in Computer Graphics 2006 : Encarnacao, J.L.; Fellner, D.W.; Schaub, J. | Book |
2007 | Störfaktorbezogenes Grenzwertverhalten biometrischer Gesichtserkennung Daum, Henning : Encarnação, José L. (Referent); Malsburg, Christoph von der (Referent) | Dissertation |
2007 | Technologieintegrierte Datensicherheit bei RFID-Systemen Waldmann, U. | Conference Paper |
2007 | Zweckbindung in ämterübergreifenden Verwaltungsworkflows Laue, Philip; Maidl, Monika; Peters, Jan | Journal Article |
2006 | Enterprise document security Oesing, Ursula; Krüger, Roland; Pinsdorf, Ulrich | Conference Paper |
2006 | Entwicklung eines legalen Peer-to-Peer Filesharingsystems auf der Basis des BitTorrent-Protokolls Ulzheimer, J. : Ebinger, P. (Prüfer) | Master Thesis |
2006 | Grundlagen und militärische Anwendungen der Nanotechnologie Grüne, M.; Kernchen, R.; Kohlhoff, J.; Kretschmer, T.; Neupert, U.; Notthoff, C.; Reschke, S.; Ruhlig, K.; Wessel, H.; Zach, H.-G. | Book |
2006 | How to fend off shoulder surfing Roth, V.; Richter, K. | Journal Article |
2006 | Kurzregeln zur sicheren Konfiguration von Apache und PHP Peine, H.; Schwenkler, T. | Report |
2006 | Modeling and execution of complex attack scenarios using interval timed colored petri nets Dahl, O.M.; Wolthusen, S. | Conference Paper |
2006 | Revisionssichere Protokollierung in Standardbetriebssystemen Wolthusen, S. | Journal Article |
2006 | Richtlinien für die Implementierung sicherer Web Services Schwarz, R.; Peine, H. | Report |
2006 | SecAS '06 - Security in Autonomous Systems : Accorsi, R.; Peters, J. | Conference Proceedings |
2006 | SecFlow: Automatische Ermittlung sicherheitskritischer Datenflüsse in Quellcode Peine, H.; Mandel, S.; Richter, D. | Conference Paper |
2006 | Security in mobile ad hoc networks Ibarzabal Atutxa, E. : Ebinger, P. (Prüfer) | Thesis |
2006 | Selected Readings in Computer Graphics 2005. CD-ROM : Encarnacao, J.L.; Schaub, J. | Non Book Material |
2006 | Websicherheitswerkzeuge auf dem Prüfstand Peine, H. | Journal Article |
2006 | Windows device interface security Wolthusen, S. | Journal Article |
2005 | 8-bit-microcontroller system with area efficient AES coprocessor for transponder applications Jung, M.; Fiedler, H.-L.; Lerch, R.G. | Conference Paper |
2005 | A capability-based transparent cryptographic file system Graf, F.; Wolthusen, S. | Conference Paper |
2005 | Enforcing messaging security policies Likavec, J.; Wolthusen, S. | Conference Paper |
2005 | GIS-based command and control infrastructure for critical infrastructure protection Wolthusen, S. | Conference Paper |
2005 | Information sharing and decision support for C(I)IP Wolthusen, S. | Conference Paper |
2005 | Investigating performance and impacts on fingerprint recognition systems Arnold, M.; Busch, C.; Ihmor, H. | Conference Paper |
2005 | IT-security in E-engineering - challenges and solutions Lukas, U. von | Conference Paper |
2005 | Marktrecherche "Sicherheit - Schutz vor physischen Bedrohungen" Pastuszka, H.-M.; Pohl, C.; Finger, S. | Study |
2005 | Promotional and commercial content distribution based on a legal and trusted P2P framework Schmucker, M.; Ebinger, P. | Conference Paper |
2005 | Rules of thumb for secure software engineering Peine, H. | Conference Paper |
2005 | Secure partial results Mohr, M.D. : Peters, J. (Prüfer) | Bachelor Thesis |
2005 | Security and usability engineering with particular attention to electronic mail Roth, V.; Straub, T.; Richter, K. | Journal Article |
2005 | Systematic elicitation of security requirements in the context of AmI systems Schwarz, R. | Report |
2005 | Track-and-trace for CAD models in distributed engineering Funk, W.; Lukas, U. von | Conference Paper |
2005 | Ubiquitäre Sicherheit für dynamische, mobile Systeme Eckert, C. | Journal Article |
2005 | Zugriffsschutz in Geodateninfrastrukturen Drewnak, J.; Gartmann, R. | Book Article |
2004 | Benchmarking of face recognition systems Busch, C.; Daum, H.; Salamon, R. | Conference Paper |
2004 | Betrachtungen zum Risikobegriff Wiemken, U. | Journal Article |
2004 | A combined safety/security approach for co-operative distributed systems Großpietsch, K.-E.; Silayeva, T. | Conference Paper |
2004 | Fraunhofer-IGD's Vision of AmI Ebinger, P.; Busch, C. | Conference Paper |
2004 | Implementierung von Security Policies in offenen Telekollaborationen Herfert, M.; Schmidt, A.U.; Ochsenschläger, P.; Repp, J.; Rieke, R.; Schmucker, M.; Vettermann, S.; Böttge, U.; Escaleira, C.; Rüdiger, D. | Conference Paper |
2004 | Laufzeitunterstützung für mobilen Code Peine, H. | Journal Article |
2004 | Online-Ticketing - Veranstaltungskarten aus dem Internet Busch, C.; Daum, H. | Book Article |
2004 | Qualität im Automobil: Systematische Definition nichtfunktionaler Anforderungen Doerr, J.; Olsson, T.; Schmid, K. | Conference Paper |
2004 | Reversible watermarking of 2D-vector data Voigt, M.; Yang, B.; Busch, C. | Conference Paper |
2004 | Rules of thumb for developing secure software Peine, H. | Report |
2004 | Specification of the SicAri architecture Oetting, J.; Peters, J.; Pinsdorf, U.; Rochaeli, T.; Wolf, R. | Report |
2004 | Synchronization of run-time security information policies Ghori, M.H. : Schaefer, K. (Prüfer); Schmucker, M. (Prüfer) | Master Thesis |
2004 | Taxonomy of security Gonzales-Castillo, O.R. | Conference Paper |
2003 | Benchmarking of face recognition systems - project BioFace Salamon, R.; Daum, H.; Busch, C.; Pretzel, A. | Conference Paper |
2003 | Comparative study on fingerprint recognition systems - project BioFinger Arnold, M.; Daum, H.; Busch, C. | Conference Paper |
2003 | CROCODILE - Ein Werkzeug zur sichtenbasierten Sicherheitsprüfung von Router-Konfigurationen Peine, H.; Schwarz, R. | Report |
2003 | CROCODILE - Ein Werkzeug zur sichtenbasierten Sicherheitsprüfung von Router-Konfigurationen Peine, H.; Schwarz, R. | Conference Paper |
2003 | CROCODILE Benutzerhandbuch Peine, H.; Schwenkler, T.; Schwarz, R.; Simon, K. | Report |
2003 | Können diese Augen lügen Busch, C.; Daum, H.; Raptis, G. | Journal Article |
2003 | Laufzeitunterstützung für mobilen Code Peine, H. | Book Article |
2003 | A multi-view tool for checking the security semantics of router configurations Peine, H.; Schwarz, R. | Report |
2003 | A multi-view tool for checking the security semantics of router configurations Peine, H.; Schwarz, R. | Conference Paper |
2003 | Run-time support for mobile code and agents Peine, H. | Journal Article |
2003 | Schlussbericht zum Projekt map - Multimedia-Arbeitsplatz der Zukunft Busch, C.; Pinsdorf, U. | Report |
2003 | Security evaluations for software, processes and IT infrastructure Peine, H. | Conference Paper |
2003 | Szenario-basierte Testverfahren zur Zertifizierung von Wasserzeichen Arnold, M.; Busch, C.; Schmucker, M. | Conference Paper |
2003 | Web Services : Vlachakis, J.; Rex, S.; Otto, B.; Lebender, M.; Fleckstein, T. | Book |
2003 | Zugriffskontrolle in Geodateninfrastrukturen: Web Authentication Service (WAS) und Web Security Service (WSS) Drewnak, J.; Gartmann, R. | Conference Paper |
2002 | Combined fingerprinting attacks against digital audio watermarking: Methods, results and solutions Steinebach, M.; Dittmann, J.; Saar, E. | Conference Paper |
2002 | Context-aware service based on secure mobile agents Pinsdorf, U.; Peters, J.; Hoffmann, M.; Gupta, P. | Conference Paper |
2002 | CRACE Benutzerhandbuch. Das Cisco Router Audit & Checking Environment Groß, S.; Peine, H.; Schwenkler, T.; Schwarz, R.; Simon, K. | Report |
2002 | Digital watermarking for secure and adaptive teleconferencing Vorbrüggen, J.C.; Thorwirth, N.J. | Conference Paper |
2002 | Ein Elektronisches Rights Clearinghouse für das Internet Jalali-Sohi, M. | Conference Paper |
2002 | Mobile Agent Interoperability Patterns and Practice Pinsdorf, U.; Roth, V. | Conference Paper |
2002 | Multi-layer protection of mobile code Luo, C. | Conference Paper |
2002 | New electronic services for production sector Hohwieler, E.; Berger, R. | Conference Paper |
2002 | Secure Mobile Agent Systems Using Java: Where are We Heading? Binder, W.; Roth, V. | Conference Paper |
2001 | An Application of Intelligent and Mobile Agents for Retail Visual Mining and E-Commerce on the Internet Jalali-Sohi, M.; Malkewitz, R. | Conference Paper |
2001 | Biometric authentication for access control Busch, C. | Book Article |
2001 | Entwicklung eines Framework zur objektiven Bewertung von Audio Watermarking Verfahren Schilz, K. : Arnold, M. (Prüfer) | Term paper |
2001 | Mobile agent interoperability revisited Roth, V.; Pinsdorf, U.; Binder, W. | Conference Paper |
2001 | Rights Clearinghouse für den Softwarehandel Pohl, T. : Jalali-Sohi, M. (Prüfer) | Thesis |
2001 | A Scalable and Secure Global Tracking Service for Mobile Agents Roth, V.; Peters, J. | Conference Paper |
2001 | Tracing Data Diffusion in Industrial Research with Robust Watermarking Busch, C.; Wolthusen, S. | Conference Paper |
2001 | Transparent access to encrypted data using operating systems network stack extensions Rademer, E.; Wolthusen, S. | Conference Paper |
2001 | Vulnerabilities and security limitations of current IP telephony systems Ackermann, R.; Schumacher, M.; Roedig, U.; Steinmetz, R. | Conference Paper |
2000 | Innovative Strategien für das Software-Marketing - Software on demand / Application Service Providing (ASP) Kehrer, B.; Jansen, H.; Lukas, U. von; Böttge, U. | Conference Paper |
2000 | Mobile Software-Agenten Roth, V. | Journal Article |
1999 | Die Arztpraxis im Cyberspace. Eine Herausforderung für die Sicherheit Graf, F. | Journal Article |
1999 | Courseware needs Security Graf, F.; Busch, C.; Wolthusen, S. | Conference Paper |
1999 | Multimedia and Security : Dittmann, J.; Nahrstedt, K.; Wohlmacher, P. | Conference Proceedings |
1999 | Perspectives on Electronic Commerce with Mobile Agents Busch, C.; Roth, V.; Meister, R. | Conference Paper |
1998 | Digitale Wasserzeichen für MPEG Video Stabenau, M.; Dittmann, J. | Study |
1998 | A Generic Digital Watermarking Model Koch, E.; Zhao, J. | Journal Article |
1997 | Applying Digital Watermarking Techniques to Online Multimedia Commerce Zhao, J. | Conference Paper |
1997 | Increasing the capacity of passive optical networks in the subscriber region using the wavelength multiplex technique Saniter, J.; Hermes, T.; Hubk, U.; Westphal, F.-J. | Conference Paper |
1997 | W3Gate - use and abuse Bogen, M.; Hansen, G.; Lenz, M. | Conference Paper |
1996 | Copyright protection for multimedia data Koch, E.; Rindfrey, J.; Zhao, J. | Book Article |
1996 | PLASMA. Platform for secure multimedia applications Krannig, A. | Conference Paper |
1996 | Security aspects for future communication infrastructures Thielmann, H. | Conference Paper |
1995 | Embedding Robust Labels into Images for Copyright Protection Koch, E.; Zhao, J. | Conference Paper |
1994 | Copyright Protection for Multimedia Data Koch, E.; Rindfrey, J.; Zhou, J. | Conference Paper |
1994 | European R&D activities in mobile multimedia communications and expectations on future services Schafer, R. | Journal Article |
1994 | Informationslogistik - Basis für die industrielle Informationsverarbeitung Steusloff, H.; Batz, T. | Conference Paper |
1992 | The BirliX security architecture Härtig, H.; Kowalski, O.; Kühnhauser, W. | Report |
1989 | Security on networks : do we really need it? Grimm, R. | Journal Article |
1980 | Multiple access TDM communication systems with enhanced channel utilization and security against failure and tapping Schulze, E. | Conference Paper |