Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
202030. ID: SMART Workshop 2020
: Waldmann, U.
Conference Proceedings
2020Analyzing Linguistic Features of German Fake News: Characterization, Detection, and Discussion
Vogel, Inna
Conference Paper
2020Applying machine intelligence in practice. Selected results of the 2019 Dagstuhl Workshop on Applied Machine Intelligence
Humm, Bernhard; Bense, Hermann; Bock, Jürgen; Classen, Mario; Halvani, Oren; Herta, Christian; Hoppe, Thomas; Juwig, Oliver; Siegel, Melanie
Journal Article, Conference Paper
2020Automated Firmware Metadata Extraction of IoT Devices
Leimbach, Rupert
: Waidner, Michael; Roskosch, Philipp
Bachelor Thesis
2020Automatisierte Erkennung von Desinformationen
Halvani, Oren; Heereman von Zuydtwyck, Wendy; Herfert, Michael; Kreutzer, Michael; Liu, Huajian; Simo Fhom, Hervais-Clemence; Steinebach, Martin; Vogel, Inna; Wolf, Ruben; Yannikos, York; Zmudzinski, Sascha
Book Article
2020Checking the Integrity of Images with Signed Thumbnail Images
Steinebach, Martin; Jörg, Sebastian; Liu, Huajian
Conference Paper
2020Concise Identities. Version 02
Birkholz, Henk; Bormann, Carsten; Pritikin, Max; Moskowitz, Robert
Report
2020Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
Fenzl, Florian; Rieke, Roland; Chevalier, Y.; Dominik, A.; Kotenko, I.
Journal Article
2020Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, Francois
Electronic Publication
2020Cortex-M4 Optimizations for {R, M}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, François
Journal Article
2020Datenschutz und Datensicherheit im Digital Public Health
Kunz, Thomas; Lange, Benjamin; Selzer, Annika
Journal Article
2020Datenschutzkonformes Löschen personenbezogener Daten in Kundenbeziehungsmanagementsystemen
Macit, Tugba Koc; Selzer, Annika
Journal Article
2020Datenschutzrechtliche Zulässigkeit von Cloud-Computing-Services und deren teilautomatisierte Überprüfbarkeit
Selzer, Annika
Book
2020Decision support for mobile app selection via automated privacy assessment
Wettlaufer, J.; Simo, H.
Conference Paper
2020Desinformation aufdecken und bekämpfen
: Steinebach, Martin; Bader, Katarina; Rinsdorf, Lars; Krämer, Nicole; Roßnagel, Alexander
Book
2020Detecting "DeepFakes" in H.264 Video Data Using Compression Ghost Artifacts
Frick, Raphael Antonius; Zmudzinski, Sascha; Steinebach, Martin
Conference Paper
2020Detection and Analysis of Tor Onion Services
Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina
Journal Article
2020DISCO: Sidestepping RPKI's Deployment Barriers
Hlavacek, Tomas; Cunha, Italo; Gilad, Yossi; Herzberg, Amir; Katz-Bassett, Ethan; Schapira, Michael; Shulman, Haya
Conference Paper
2020ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection
Chevalier, Yannick; Rieke, Roland; Fenzl, Florian; Chechulin, Andrey; Kotenko, Igor
Conference Paper
2020Fake News Detection by Image Montage Recognition
Steinebach, Martin; Liu, Huajian; Gotkowski, Karol
Journal Article
2020File-Sharing and the Darknet
Steinebach, Martin
Book Article
2020Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Bienhaus, Diethelm; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Conference Paper
2020Handlungsempfehlungen
Jansen, Carolin; Johannes, Christopher; Krämer, Nicole; Kreutzer, Michael; Löber, Lena Isabell; Rinsdorf, Lars; Roßnagel, Alexander; Schaewitz, Leonie
Book Article
2020Interface to Network Security Functions (I2NSF) Terminology. Version 08
Hares, Susan; Strassner, John; Lopez, Diego R.; Xia, Liang; Birkholz, Henk
Report
2020ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
Electronic Publication
2020ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
Journal Article
2020JAB Code - A Versatile Polychrome 2D Barcode
Berchtold, Waldemar; Liu, Huajian; Steinebach, Martin; Klein, Dominik; Senger, Tobias; Thenee, Nicolas
Conference Paper
2020Limiting the Power of RPKI Authorities
Shrishak, Kris; Shulman, Haya
Conference Paper
2020A location privacy analysis of Bluetooth mesh
Caesar, Matthias; Steffan, Jan
Journal Article
2020Machine Learning Application for Prediction of Sapphire Crystals Defects
Klunnikova, Yulia Vladimirovna; Anikeev, Maxim Vladimirovich; Filimonov, Alexey Vladimirovich; Kumar, Ravi
Journal Article
2020Motion Vector based Robust Video Hash
Liu, Huajian; Fach, Sebastian; Steinebach, Martin
Conference Paper
2020Post-Quantum Secure Boot
Kumar, Vinay B.Y.; Gupta, Naina; Chattopadhyay, Anupam; Kasper, Michael; Krauß, Christoph; Niederhagen, Ruben
Conference Paper
2020Privacy and Robust Hashes. Privacy-Preserving Forensics for Image Re-Identification
Steinebach, Martin; Lutz, Sebastian; Liu, Huajian
Journal Article
2020Secure IT without vulnerabilities and back doors
Weber, Arnd; Heiser, Gernot; Kuhlmann, Dirk; Schallbruch, Martin; Chattopadhyay, Anupam; Guilley, Sylvain; Kasper, Michael; Krauß, Christoph; Krüger, Philipp S.; Reith, Steffen; Seifert, Jean-Pierre
Journal Article
2020SEPAD - Security Evaluation Platform for Autonomous Driving
Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey
Conference Paper
2020Sicherheitskennzahlen: Metriken aus Angreifer-Sicht
Stöwer, Mechthild; Klaus, Marko
Journal Article
2020TrustEV: Trustworthy Electric Vehicle Charging and Billing
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Conference Paper
2020Uploadfilter - Funktionsweisen, Einsatzmöglichkeiten und Parametrisierung
Raue, Benjamin; Steinebach, Martin
Journal Article, Conference Paper
2020XMSS and Embedded Systems
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakub; Niederhagen, Ruben
Conference Paper
201929. SmartCard Workshop 2019. Tagungsband
: Waldmann, Ulrich
Conference Proceedings
2019An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces
Yannikos, York; Heeger, Julian; Brockmeyer, Maria
Conference Paper
2019Assessing the Applicability of Authorship Verification Methods
Halvani, Oren; Winter, Christian; Graner, Lukas
Conference Paper
2019Automatisierte Analyse Radikaler Inhalte im Internet
Vogel, Inna; Regev, Roey; Steinebach, Martin
Conference Paper
2019Bot and Gender Identification in Twitter using Word and Character N-Grams
Vogel, Inna; Jiang, Peter
Conference Paper
2019Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection
Berger, Ivo; Rieke, Roland; Kolomeets, Maxim; Chechulin, Andrey; Kotenko, Igor
Conference Paper
2019Computergenerierte Kinderpornografie zu Ermittlungszwecken im Darknet
Wittmer, Sandra; Steinebach, Martin
Journal Article
2019Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures
Birkholz, Henk; Vigano, Christoph; Bormann, Carsten
Report
2019Cybersecurity Research: Challenges and Course of Action
Holz, Thorsten; Müller-Quade, Jörn; Raabe, Oliver; Waidner, Michael; Bardin, Sébastien; Debar, Hervé; Dinger, Jochen; Fahl, Sascha; Faust, Sebastian; Gonzalez Fuster, Gloria; Gro, Stjepan; Hallett, Joseph; Harlander, Magnus; Houdeau, Detlef; Kirchner, Claude; Klasen, Wolfgang; Lotz, Volkmar; Markatos, Evangelos; Möhring, Peter; Posch, Reinhard; Ritter, Steve; Schallbruch, Martin; Schunter, Matthias; Volkamer, Melanie; Wespi, Andreas; Engelbrecht, Adrian; Fuchs, Andreas; Geiselmann, Willi; Grensing, Anna-Louise; Heidt, Margareta; Heyszl, Johann; Hiller, Matthias; Jäger, Lukas; Kawohl, Claudia; Koch, Alexander; Krämer, Annika; Marnau, Ninja; Noack, Kathrin; Rieke, Roland; Senf, Daniel; Springer, Markus; Steinbrück, Anne; Strefler, Mario; Tatang, Dennis; Backes, Michael; Buxmann, Peter; Eckert, Claudia
: Müller-Quade, Jörn
Report
2019Darknets as Tools for Cyber Warfare
Denker, Kai; Schäfer, Marcel; Steinebach, Martin
Book Article
2019Data Erasure under the GDPR - Steps towards Compliance. Practitioner’s Corner
Enzmann, Matthias; Selzer, Annika; Spychalski, Dominik
Journal Article
2019Data-Leakage-Tracking durch digitale Wasserzeichen
Zmudzinski, Sascha; Steinebach, Martin
Journal Article
2019Detection and Analysis of Tor Onion Services
Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina; Yannikos, York
Conference Paper
2019Der digitale Nachlass
Kubis, Marcel; Naczinsky, Magdalena; Selzer, Annika; Sperlich, Tim; Steiner, Simone; Waldmann, Ulrich
Study
2019Der digitale Nachlass: Eine Untersuchung aus rechtlicher und technischer Sicht (Tablet-Version)
Kubis, Marcel; Naczinsky, Magdalena; Selzer, Annika; Sperlich, Tim; Steiner, Simone; Waldmann, Ulrich
Study
2019Die Entwicklung von Löschregeln zum datenschutzkonformen Löschen personenbezogener Daten in Issue-Tracking-Systemen
Selzer, Annika; Stummer, Sarah
Journal Article
2019Fake News Detection by Image Montage Recognition
Steinebach, Martin; Gotkowski, Karol; Liu, Huajian
Conference Paper
2019Fake News Detection with the New German Dataset "GermanFakeNC
Vogel, Inna; Jiang, Peter
Conference Paper
2019FraunhoferSIT at GermEval 2019: Can Machines Distinguish Between Offensive Language and Hate Speech? Towards a Fine-Grained Classification
Vogel, Inna; Regev, Roey
Conference Paper
2019A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles
Gürgens, Sigrid; Zelle, Daniel
Conference Paper
2019Herausforderungen für die Anonymisierung von Daten
Winter, Christian; Battis, Verena; Halvani, Oren
Conference Paper
2019Herausforderungen für die Anonymisierung von Daten
Winter, Christian; Battis, Verena; Halvani, Oren
Journal Article
2019Improved Manipulation Detection with Convolutional Neural Network for JPEG Images
Liu, Huajian; Steinebach, Martin; Schölei, Kathrin
Conference Paper
2019Interpretierbare Verifizierung von Autorschaft
Graner, Lukas; Steinebach, Martin
Book Article
2019Interview mit dem Fraunhofer-Institut für Sichere Informationstechnologie zum Thema "Volksverschlüsselung"
Herfert, Michael; Hartz, Jürgen
Journal Article
2019Intrusion Detection - Systeme für vernetzte Fahrzeuge - Konzepte und Herausforderungen für Privatheit und Cyber-Sicherheit
Simo, Hervais; Waidner, Michael; Geminn, Christian
Book Article
2019Kommunikation als Gefahr: Nutzerreaktion auf Nachrichten mit verdächtigen Links per E-Mail und Facebook
Gassmann, F.; Benenson, Z.; Landwirth, R.
Journal Article
2019The Lattice-Based Digital Signature Scheme qTESLA
Alkim, Erdem; Barreto, Paulo S.L.M.; Bindel, Nina; Krämer, Juliane; Longa, Patrick; Ricardini, Jefferson E.
Electronic Publication
2019A Location Privacy Analysis of Bluetooth Mesh
Caesar, Matthias; Steffan, Jan
Conference Paper
2019Das Löschen nach der DSGVO. Eine Diskussion der datenschutzkonformen Umsetzung bei E-Mails
Selzer, Annika; Durmus, Erdem; Pordesch, Ulrich
Journal Article
2019Löschung rechtskonformer Nutzerinhalte durch Soziale-Netzwerkplattformen
Heereman, Wendy; Selzer, Annika
Journal Article
2019The need for steganalysis in image distribution channels
Steinebach, Martin; Liu, Huajian; Ester, Andre
Journal Article
2019A Novel Approach for Fast Protein Structure Comparison and Heuristic Structure Database Searching Based on Residue EigenRank Scores
Heinke, F.; Hempel, L.; Labudde, D.
Conference Paper
2019Plug-and-Patch: Secure Value Added Services for Electric Vehicle Charging
Buschlinger, Lucas; Springer, Markus; Zhdanova, Maria
Conference Paper
2019The Practice Turn in IT Security - An Interdisciplinary Approach
Kocksch, Laura; Poller, Andreas
Conference Paper
2019Privacy and Robust Hashes
Steinebach, Martin; Lutz, Sebastian; Liu, Huajian
Conference Paper
2019Quotable Signatures using Merkle Trees
Kreutzer, M.; Niederhagen, R.; Shrishak, K.; Fhom, H.S.
Conference Paper
2019Securing physical documents with digital signatures
Winter, Christian; Berchtold, Waldemar; Hollenbeck, Jan Niklas
Conference Paper
2019Security Automation and Continuous Monitoring (SACM) Terminology. Version 16
Birkholz, Henk; Lu, Jarrett; Strassner, John; Cam-Winget, Nancy; Montville, Adam
Report
2019Security Managers Are Not The Enemy Either
Reinfelder, L.; Landwirth, R.; Benenson, Z.
Conference Paper
2019Security Module for the Electric Vehicle Charging System - Proposal for a Protection Profile
Fuchs, Andreas; Krauß, Christoph; Lahr, Norman; Petri, Richard
Report
2019Security Requirements Engineering in Safety-Critical Railway Signalling Networks
Heinrich, M.; Vateva-Gurova, T.; Arul, T.; Katzenbeisser, S.; Suri, N.; Birkholz, H.; Fuchs, A.; Krauss, C.; Zhdanova, M.; Kuzhiyelil, D.; Tverdyshev, S.; Schlehuber, C.
Journal Article
2019Security Test Platform for Autonomous Driving
Zelle, Daniel; Rieke, Roland; Krauß, Christoph
Conference Paper
2019Selbstdatenschutz im vernetzten Fahrzeug und dessen technische Umsetzung
Krauß, Christoph
Book Article
2019Side Channel Information Set Decoding
Lahr, Norman; Niederhagen, Ruben; Petri, Richard; Samardjiska, Simona
Journal Article
2019The SPHINCS+ Signature Framework
Niederhagen, Ruben; Bernstein, Daniel J.; Hülsing, Andreas; Kölbl, Stefan; Rijneveld, Joost; Schwabe, Peter
Conference Paper
2019Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains
Sivachev, Alexey V.; Bashmakov, Daniil A.; Mikhailishenko, Olga V.; Korobeynikov, Anatoliy G.; Rieke, Roland
Conference Paper
2019System Security Mechanisms for Electric Vehicles and Charge Points Supporting ISO 15118 - Proposal for a Technical Guideline
Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Report
2019A Systematic Analysis and Hardening of the Java Security Architecture
Holzinger, Philipp
Dissertation
2019Technisierung - Technische Möglichkeiten zur Verfolgung von Arzneimittelstraftaten im Internet
Steinebach, Martin; Yannikos, York; Halvani, Oren; Pflug, Annika
Book Article
2019Tracking Criminal Events through IoT Devices and an Edge Computing Approach
Tundis, Andrea; Kaleem, Humayun; Mühlhäuser, Max
Conference Paper
2019Unary and Binary Classification Approaches and their Implications for Authorship Verification
Halvani, Oren; Winter, Christian; Graner, Lukas
Report
2019An Unsophisticated Neural Bots and Gender Profiling System
Halvani, Oren; Marquardt, Philipp
Conference Paper
2019Verschlüsselung in der Cloud
Herfert, Michael; Lange, Benjamin; Spychalski, Dominik
Journal Article
2019Verwendung computergenerierter Kinderpornografie zu Ermittlungszwecken im Darknet
Wittmer, Sandra; Steinebach, Martin
Conference Paper
201828. SmartCard Workshop 2018. Tagungsband
: Waldmann, Ulrich
Conference Proceedings
2018Analysis of SDN Applications for Smart Grid Infrastructures
Bräuning, M.; Khondoker, R.
Book Article
2018Anonymous charging and billing of electric vehicles
Zelle, Daniel; Springer, Markus; Zhdanova, Maria; Krauß, Christoph
Conference Paper
2018Artificial Intelligence in IT Security
Steinebach, Martin; Waidner, Michael
Book Article
2018Authorship verification in the absence of explicit features and thresholds
Halvani, Oren; Graner, Lukas; Vogel, Inna
Conference Paper
2018Begriffsbestimmungen
Selzer, Annika
Book Article
2018Blockchain - Grundlagen und Anwendungsmöglichkeiten
Lange, Benjamin
Conference Paper
2018Blockchain and smart contracts
Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander
: Prinz, Wolfgang (Ed.); Schulte, Axel T. (Ed.)
Report
2018Blockchain in Industrie 4.0: Beyond Cryptocurrency
Laabs, Martin; Dukanovic, Sinisa
Journal Article
2018Caring for IT Security: Accountabilities, Moralities, and Oscillations in IT Security Practices
Kocksch, Laura; Korn, Matthias; Poller, Andreas; Wagenknecht, Susann
Journal Article, Conference Paper
2018Channel steganalysis
Steinebach, Martin; Ester, Andre; Liu, Huajian
Conference Paper
2018Concise data definition language (CDDL): A notational convention to express CBOR data structures
Birkholz, Henk; Vigano, Christoph; Bormann, Carsten
Report
2018Cross-domain authorship attribution based on compression
Halvani, Oren; Graner, Lukas
Conference Paper
2018Darum könnte die Bitcoin-Technologie ein gefährliches Sicherheitsrisiko für die ganze Wirtschaft sein
Kreutzer, Michael
Journal Article
2018Datenschutz-Folgenabschätzung
Selzer, Annika
Book Article
2018Datensicherheit und -integrität der Elektromobilität beim eichrechtskonformen Laden und Abrechnen
Brosi, Frank; Gröning, Sven; Krauß, Christoph; Seipel, Christian; Sheveleva, Tatyana; Staubermann, Michael
Journal Article
2018Desinformation aufdecken und bekämpfen. Policy Paper
Bader, Katarina; Jansen, Carolin; Johannes, Paul Christopher; Krämer, Nicole; Kreutzer, Michael; Löber, Lena Isabell; Rinsdorf, Lars; Rösner, Leonie; Roßnagel, Alexander
Report
2018Digitale Wasserzeichen in der Kriminalistik
Waschetzki, Michael; Steinebach, Martin
Journal Article
2018Domain validation++ for MitM-resilient PKI
Brandt, Markus; Dai, Tiaxing; Klein, Amit; Shulman, Haya; Waidner, Michael
Conference Paper
2018Double Embedding Steganalysis: Steganalysis with Low False Positive Rates
Steinebach, Martin; Ester, Andre; Liu, Huajian; Zmudzinski, Sascha
Conference Paper
2018Efficient Side-Channel Protections of ARX Ciphers
Jungk, Bernhard; Petri, Richard; Stöttinger, Marc
Journal Article, Conference Paper
2018EWV Ergebnisreport (Ergebnisse des Projekts Erkennung vor Wirtschaftskriminalität und Versicherungsbetrug)
Winter, Christian; Marschall, Kevin; Herfurth, Constantin; Riedel, Oliver; Halvani, Oren; Liu, Huajian; Yannikos, York; Friedrich, Stephanie; Finzen, Jan; Kintz, Maximilian; Schneider, Andrea; Ossege, Tobias; Steinebach, Martin
: Steinebach, Martin; Roßnagel, Alexander; Hornung, Gerrit; Riedel, Oliver; Rener, Thomas; Teichert, Jochen
Report
2018FPGA-based Niederreiter cryptosystem using binary goppa codes
Wang, Wen; Szefer, Jakub; Niederhagen, Ruben
Conference Paper
2018Handlungsempfehlungen des Förderprojekts DELTA
Brosi, Frank; Harner, Andreas; Krauß, Christoph; Seipel, Christian; Springer, Markus; Staubermann, Michael; Suhr, André; Voit, Stephan; Zhdanova, Maria
: Seipel, Christian
Report
2018Hybrid Image Encryption
Steinebach, Martin; Liu, Huajian; Stein, Richard; Mayer, Felix
Conference Paper
2018Implementing Joux-Vitse's crossbred algorithm for solving MQ systems over F2 on GPUs
Niederhagen, Ruben; Ning, Kai-Chun; Yang, Bo-Yin
Conference Paper
2018Implications of vulnerable internet infrastructure
Shulman, Haya
Book Article
2018Informationspflichten
Selzer, Annika
Book Article
2018Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
Conference Paper
2018Kernelemente des IT-Risikomanagements in der industriellen Fertigung
Kraft, Reiner; Stöwer, Mechthild
Journal Article
2018Kickstart für KPIs. Erfolgsversprechende Schritte zum Aufbau eines angepassten Kennzahlensystems zur Messung der Informationssicherheit
Kraft, Reiner; Stöwer, Mechthild
Journal Article
2018Little Brother is Watching - We know all your Secrets!
Rasthofer, Siegfried; Huber, Stephan; Arzt, Steven
Conference Paper
2018Method, computer program and system for providing a control signal for a software development environment
Eichler, Jörn; Holzinger, Philipp; Laabs, Martin; Poller, Andreas; Türpe, Sven; Weber, Heiko; Zenkoff, Albert
Patent
2018Monitoring product sales in darknet shops
Yannikos, York; Schäfer, Annika; Steinebach, Martin
Conference Paper
2018New authentication concept using certificates for big data analytic tools
Velthuis, Paul; Schäfer, Marcel; Steinebach, Martin
Conference Paper
2018Off-path attacks against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Conference Paper
2018Open source value chains for addressing security issues efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
Conference Paper
2018Parsing and Extracting Features from OPC Unified Architecture in Industrial Environments
Hormann, Ricardo; Nikelski, Sebastian; Dukanovic, Sinisa; Fischer, Eric
Conference Paper
2018Path MTU discovery considered harmful
Göhring, Matthias; Shulman, Haya; Waidner, Michael
Conference Paper
2018Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Conference Paper
2018Performance analysis of OpenFlow based software defined wired and wireless network
Jany, M.H.R.; Islam, N.; Khondoker, R.; Habib, M.A.
Conference Paper
2018Post-quantum cryptography on FPGAs. The Niederreiter cryptosystem. Extended Abstract
Wang, Wen; Szefer, Jakub; Niederhagen, Ruben
Abstract
2018Practical experience: Methodologies for measuring route origin validation
Hlavacek, Tomas; Herzberg, Amir; Shulman, Haya; Waidner, Michael
Conference Paper
2018Privacy and data protection in the domain name system: Threats and countermeasures
Kelpen, Kevin; Simo, Hervais
Book Article
2018Privacy Preserving Forensics for JPEG Images
Liu, Huajian; Steinebach, Martin; Stein, Richard; Mayer, Felix
Conference Paper
2018A reference architecture for integrating safety and security applications on railway command and control systems
Birkholz, Henk; Zhdanova, Maria; Krauß, Christoph; Arul, Tolga; Heinrich, Markus; Katzenbeisser, Stefan; Vateva-Gurova, Tsvetoslava; Suri, Neeraj; Kuzhiyelil, Don; Schlehuber, Christian
Conference Paper
2018Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
Conference Paper
2018Rethinking the evaluation methodology of authorship verification methods
Halvani, Oren; Graner, Lukas
Conference Paper
2018Roadmap to Privacy
Winter, Christian; Schäfer, Marcel
Presentation
2018Security Analysis for the Middleware Assurance Substrate
Lippert, T.; Khondoker, R.
Book Article
2018Security Analysis of FloodLight, ZeroSDN, Beacon and POX SDN Controllers
Ilyas, Q.; Khondoker, R.
Book Article
2018Security Analysis of SDN Applications for Big Data
Ahmad, P.; Jacob, S.; Khondoker, R.
Book Article
2018Security Analysis of SDN Cloud Applications
Chikhale, A.; Khondoker, R.
Book Article
2018Security Analysis of SDN Routing Applications
Sagare, A.A.; Khondoker, R.
Book Article
2018Security Analysis of SDN WAN Applications - B4 and IWAN
Jain, R.; Khondoker, R.
Book Article
2018Security Analysis of SDN WiFi Applications
Artmann, D.; Khondoker, R.
Book Article
2018Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Journal Article
2018Sovereignty in Information Technology. Security, Safety and Fair Market Access by Openness and Control of the Supply Chain
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Report
2018Tracking. White Paper
Ammicht Quinn, Regina; Baur, Andreas; Bile, Tamer; Bremert, Benjamin; Büttner, Barbara; Grigorjew, Olga; Hagendorff, Thilo; Heesen, Jessica; Krämer, Nicole; Meier, Yannic; Nebel, Maxi; Neubaum, German; Ochs, Carsten; Roßnagel, Alexander; Simo Fhom, Hervais; Weiler, Severin
: Friedewald, Michael (Hrsg.)
Report
2018Transfer Learning for Data Triage Applications
Mayer, Felix; Schäfer, Marcel; Steinebach, Martin
Conference Paper
2018Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Habib, Sheikh Mahbub; Alexopoulos, Nikolas; Islam, Monirul; Heider, Jens; Marsh, Stephen; Mühlhäuser, Max
Conference Paper
2018Unterstützung bei Bildsichtungen durch Deep Learning
Mayer, Felix; Steinebach, Martin
Conference Paper
2018The user-centered privacy-aware control system PRICON. An interdisciplinary evaluation
Walter, Jonas; Abendroth, Bettina; Pape, Thilo von; Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Gagzow, Gundula; Decke, Hendrik; Lange, Benjamin; Mauthofer, Sebastian
Conference Paper
2018Verbundprojekt. Erkennung von Wirtschaftskriminalität und Versicherungsbetrug EWV. Schlussbericht EWV
Winter, Christian
Report
2018VVV - Sicherer Zugang zu Verschlüsselungsschlüsseln
Selzer, Annika; Waldmann, Ulrich
Report
2018VVV - Vertrauenswürdige Verteilung von Verschlüsselungsschlüsseln
Selzer, Annika; Waldmann, Ulrich
Report
2018Wie lässt sich eine Manipulation von Dokumenten und Bildern erkennen?
Steinebach, Martin; Winter, Christian
Journal Article
2018Workshops der INFORMATIK 2018. Architekturen, Prozesse, Sicherheit und Nachhaltigkeit
: Czarnecki, Christian; Brockmann, Carsten; Sultanow, Eldar; Koschmider, Agnes; Selzer, Annika
Conference Proceedings
2018XMSS and Embedded Systems. XMSS Hardware Accelerators for RISC-V
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakub; Niederhagen, Ruben
Electronic Publication