| | |
---|
2021 | Architektur für das datenschutzbewahrende Laden und Abrechnen von Elektrofahrzeugen Kern, Dustin : Waidner, Michael | Master Thesis |
2021 | Automated Large Scale Dynamic Vulnerability Analysis of iOS Apps Born, Dustin : Waidner, Michael | Master Thesis |
2021 | Risiken für die Privatheit aufgrund von Maschinellem Lernen Battis, Anna-Verena; Graner, Lukas | Conference Paper |
2021 | RNNIDS: Enhancing network intrusion detection systems through deep learning Sohi, Soroush M.; Seifert, Jean-Pierre; Ganji, Fatemeh | Journal Article |
2021 | Sustainable Solving: Reducing The Memory Footprint of IFDS-Based Data Flow Analyses Using Intelligent Garbage Collection Arzt, Steven | Conference Paper |
2020 | 30. ID: SMART Workshop 2020 : Waldmann, U. | Conference Proceedings |
2020 | Abhängigkeiten zu Drittparteien von Webseiten: Auswirkungen auf Sicherheit, Privatsphäre und Leistung Fojtik, Roman : Waidner, Michael | Master Thesis |
2020 | Am I Censored - Internet Scale Study of Webcensorship Schüch, Daniel : Waidner, Michael | Master Thesis |
2020 | Analysis of the Design Space of the Device Identifier Composition Engine using a Generic and Portable Implementation Lorych, Dominik | Master Thesis |
2020 | Analyzing Linguistic Features of German Fake News: Characterization, Detection, and Discussion Vogel, Inna | Conference Paper |
2020 | Anonymisierung und Pseudonymisierung von Daten für Projekte des maschinellen Lernens Aichroth, Patrick; Battis, Verena; Dewes, Andreas; Dibak, Christoph; Doroshenko, Vadym; Geiger, Bernd; Graner, Lukas; Holly, Steffen; Huth, Michael; Kämpgen, Benedikt; Kaulartz, Markus; Mundt, Michael; Rapp, Hermann; Steinebach, Martin; Sushko, Yurii; Swarat, Dominic; Winter, Christian; Weiß, Rebekka | Book |
2020 | Applying machine intelligence in practice. Selected results of the 2019 Dagstuhl Workshop on Applied Machine Intelligence Humm, Bernhard; Bense, Hermann; Bock, Jürgen; Classen, Mario; Halvani, Oren; Herta, Christian; Hoppe, Thomas; Juwig, Oliver; Siegel, Melanie | Journal Article, Conference Paper |
2020 | ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS Mohan, Prashanth; Wang, Wen; Jungk, Bernhard; Niederhagen, Ruben; Szefer, Jakub; Mai, Ken | Conference Paper |
2020 | Ausprägungen und Erkennung der manipulativen Verwendung von Bildern Steinebach, Martin | Book Article |
2020 | Auswahl und Nutzung webbasierter Kommunikationsdienste in Zeiten von Corona Selzer, Annika; Stummer, Sarah; Waldmann, Ulrich | Report |
2020 | Automated Firmware Metadata Extraction of IoT Devices Leimbach, Rupert : Waidner, Michael; Roskosch, Philipp | Bachelor Thesis |
2020 | Automatisierte Erkennung von Desinformationen Halvani, Oren; Heereman von Zuydtwyck, Wendy; Herfert, Michael; Kreutzer, Michael; Liu, Huajian; Simo Fhom, Hervais-Clemence; Steinebach, Martin; Vogel, Inna; Wolf, Ruben; Yannikos, York; Zmudzinski, Sascha | Book Article |
2020 | Automatisierung beim Auffinden radikaler Inhalte im Internet Steinebach, Martin; Vogel, Inna; Yannikos, York; Regev, Roey | Book Article |
2020 | Black-box caches fingerprinting Klein, Amit; Heftrig, Elias; Shulman, Haya; Waidner, Michael | Conference Paper |
2020 | Blocking Email Bombs with EmailGlass Schneider, Markus; Shulman, Haya; Waidner, Michael | Conference Paper |
2020 | Browser Cache Poisoning Angriffe verhindern Köhler, Alexander : Waidner, Michael | Master Thesis |
2020 | Checking the Integrity of Images with Signed Thumbnail Images Steinebach, Martin; Jörg, Sebastian; Liu, Huajian | Conference Paper |
2020 | Concise Identities. Version 02 Birkholz, Henk; Bormann, Carsten; Pritikin, Max; Moskowitz, Robert | Report |
2020 | Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models Fenzl, Florian; Rieke, Roland; Chevalier, Y.; Dominik, A.; Kotenko, I. | Journal Article |
2020 | Cortex-M4 Optimizations for \{R,M\}LWE Schemes Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, Francois | Electronic Publication |
2020 | Cortex-M4 Optimizations for {R, M}LWE Schemes Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, François | Journal Article |
2020 | Critical traffic analysis on the tor network Platzer, Florian; Schäfer, Marcel; Steinebach, Martin | Conference Paper |
2020 | Cross-Domain Authorship Verification Based on Topic Agnostic Features Halvani, Oren; Graner, Lukas; Regev, Roey | Conference Paper |
2020 | Cryptology and Network Security. 19th International Conference, CANS 2020. Proceedings : Krenn, Stephan; Shulman, Haya; Vaudenay, Serge | Conference Proceedings |
2020 | Data Mining zur Erfassung extremistischer Aktivitäten in Online-Netzwerken Hamachers, Annika; Gundlach, Julia; Heereman, Wendy; Selzer, Annika; Yannikos, York | Book Article |
2020 | Datenschutz und Datensicherheit im Digital Public Health Kunz, Thomas; Lange, Benjamin; Selzer, Annika | Journal Article |
2020 | Datenschutzkonformes Löschen personenbezogener Daten in Kundenbeziehungsmanagementsystemen Macit, Tugba Koc; Selzer, Annika | Journal Article |
2020 | Datenschutzrechtliche Zulässigkeit von Cloud-Computing-Services und deren teilautomatisierte Überprüfbarkeit Selzer, Annika | Book |
2020 | DaVinci: Android App Analysis beyond Frida via Dynamic System Call Instrumentation Druffel, Alexander; Heid, Kris | Conference Paper |
2020 | Decision support for mobile app selection via automated privacy assessment Wettlaufer, J.; Simo, H. | Conference Paper |
2020 | Desinformation aufdecken und bekämpfen : Steinebach, Martin; Bader, Katarina; Rinsdorf, Lars; Krämer, Nicole; Roßnagel, Alexander | Book |
2020 | Detecting "DeepFakes" in H.264 Video Data Using Compression Ghost Artifacts Frick, Raphael Antonius; Zmudzinski, Sascha; Steinebach, Martin | Conference Paper |
2020 | Detecting and tracking criminals in the real world through an IoT-based system Tundis, A.; Kaleem, H.; Mühlhäuser, M. | Journal Article |
2020 | Detecting double compression and splicing using benfords first digit law Frick, Raphael Antonius; Liu, Huajian; Steinebach, Martin | Conference Paper |
2020 | Detecting Fake News Spreaders on Twitter from a Multilingual Perspective Vogel, Inna; Meghana, Meghana | Conference Paper |
2020 | Detection and Analysis of Tor Onion Services Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina | Journal Article |
2020 | DFarm: Massive-Scaling Dynamic Android App Analysis on Real Hardware Miltenberger, Marc; Gerding, Julien; Guthmann, Jens; Arzt, Steven | Conference Paper |
2020 | DICE harder: A hardware implementation of the device identifier composition engine Jäger, Lukas; Petri, Richard | Conference Paper |
2020 | DISCO: Sidestepping RPKI's Deployment Barriers Hlavacek, Tomas; Cunha, Italo; Gilad, Yossi; Herzberg, Amir; Katz-Bassett, Ethan; Schapira, Michael; Shulman, Haya | Conference Paper |
2020 | Diving into Email Bomb Attack Schneider, M.; Shulman, H.; Sidis, A.; Sidis, R.; Waidner, M. | Conference Paper |
2020 | DNS-Cache-Tomographie - Entwicklung von Vermessungswerkzeugen für DNS-Caches und Verwundbarkeitsuntersuchungen im DNS-Ökosystem Heftrig, Elias : Waidner, Michael | Master Thesis |
2020 | Dynamic Analysis of Android Applications to Detect Callback-Driven APIs Näumann, Julius : Waidner, Michael; Arzt, Steven | Bachelor Thesis |
2020 | Eberbacher Gespräch on "AI, Security & Privacy" Kreutzer, Michael; Küch, Oliver; Steinebach, Martin | Report |
2020 | ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection Chevalier, Yannick; Rieke, Roland; Fenzl, Florian; Chechulin, Andrey; Kotenko, Igor | Conference Paper |
2020 | Ensuring the Integrity and Security of Network Equipment is Critical in the Fight Against Cyber Attacks Eckel, Michael; Laffey, Tom | Journal Article |
2020 | Erkennung gleicher Betreiber Brenner, Fabian : Steinebach, Martin | Master Thesis |
2020 | Fake News Detection by Image Montage Recognition Steinebach, Martin; Liu, Huajian; Gotkowski, Karol | Journal Article |
2020 | Fake News Spreader Detection on Twitter using Character N-Grams Vogel, Inna; Meghana, Meghana | Conference Paper |
2020 | File-Sharing and the Darknet Steinebach, Martin | Book Article |
2020 | Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors Bienhaus, Diethelm; Jäger, Lukas; Rieke, Roland; Krauß, Christoph | Conference Paper |
2020 | Gruppendynamik in Sozialen Netzwerken - Bestimmung und Vorhersage von Gruppendynamiken auf Grundlage von Daten aus Sozialen Netzwerken Frenzel, Christoph; Labudde, Dirk | Book Article |
2020 | Handlungsempfehlungen Jansen, Carolin; Johannes, Christopher; Krämer, Nicole; Kreutzer, Michael; Löber, Lena Isabell; Rinsdorf, Lars; Roßnagel, Alexander; Schaewitz, Leonie | Book Article |
2020 | Herstellung und Detektion von Videos und Bildern mit KI und deren Bezug zu Beweismitteln Woithe, Jennifer; Becker, Sven; Labudde, Dirk | Book Article |
2020 | HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria; Heddergott, Ronald | Conference Paper |
2020 | HIP: HSM-Based Identities for Plug-and-Charge Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria | Conference Paper |
2020 | The Impact of DNS Insecurity on Time Jeitner, P.; Shulman, H.; Waidner, M. | Conference Paper |
2020 | An Improved Topic Masking Technique for Authorship Analysis Halvani, Oren; Graner, Lukas; Regev, Roey; Marquardt, Philipp | Report |
2020 | Interface to Network Security Functions (I2NSF) Terminology. Version 08 Hares, Susan; Strassner, John; Lopez, Diego R.; Xia, Liang; Birkholz, Henk | Report |
2020 | ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard | Electronic Publication |
2020 | ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard | Journal Article |
2020 | IT-Sicherheit aus technischer Sicht Grimm, Rüdiger; Waidner, Michael | Book Article |
2020 | IT-Sicherheit in Industrie 4.0. Mit Bedrohungen und Risiken umgehen Selzer, Annika; Schöning, Harald; Laabs, Martin; Dukanovic, Sinisa; Henkel, Thorsten : Steven, Marion | Book |
2020 | IT-Sicherheitsarchitektur für die nächste Generation der Leit- und Sicherheitstechnik Heinrich, Markus; Krauß, Christoph; Zhdanova, Maria; Eckel, Michael; Katzenbeisser, Stefan; Kuzhiyelil, Don; Cosic, Jasmin; Drodt, Matthias | Journal Article |
2020 | IT/OT-Security bei Internet of Railway Things (IoRT) Arul, Tolga; Cosic, Jasmin; Drodt, Matthias; Friedrich, Marcus; Heinrich, Markus; Kant, Michael; Katzenbeisser, Stefan; Klarer, Helmut; Rauscher, Patrick; Schubert, Max; Still, Gerhard; Wallenhorst, Detlef; Zhdanova, Maria | Report |
2020 | JAB Code - A Versatile Polychrome 2D Barcode Berchtold, Waldemar; Liu, Huajian; Steinebach, Martin; Klein, Dominik; Senger, Tobias; Thenee, Nicolas | Conference Paper |
2020 | Korrelation von Qualitäts- und Sicherheitsmetriken in Software Mainka, Alexander : Waidner, Michael; Arzt, Steven | Master Thesis |
2020 | The Lattice-Based Digital Signature Scheme qTESLA Alkim, E.; Barreto, P.S.L.M.; Bindel, N.; Krämer, J.; Longa, P.; Ricardini, J.E. | Conference Paper |
2020 | Limiting the Power of RPKI Authorities Shrishak, Kris; Shulman, Haya | Conference Paper |
2020 | A location privacy analysis of Bluetooth mesh Caesar, Matthias; Steffan, Jan | Journal Article |
2020 | Machine Learning Application for Prediction of Sapphire Crystals Defects Klunnikova, Yulia Vladimirovna; Anikeev, Maxim Vladimirovich; Filimonov, Alexey Vladimirovich; Kumar, Ravi | Journal Article |
2020 | Motion Vector based Robust Video Hash Liu, Huajian; Fach, Sebastian; Steinebach, Martin | Conference Paper |
2020 | MPC for securing internet infrastructure Shrishak, K.; Shulman, H. | Conference Paper |
2020 | Non-blind steganalysis Bunzel, Niklas; Steinebach, Martin; Liu, Huajian | Conference Paper |
2020 | A novel approach for generating synthetic datasets for digital forensics Göbel, T.; Schäfer, T.; Hachenberger, J.; Türr, J.; Baier, H. | Conference Paper |
2020 | Performance penalties of resilient SDN infrastructures Senf, Daniel; Shulman, Haya; Waidner, Michael | Conference Paper |
2020 | Pitfalls of provably secure systems in internet the case of chronos-NTP Jeitner, P.; Shulman, H.; Waidner, M. | Conference Paper |
2020 | Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4 Alkim, Erdem; Cheng, Dean Yun-Li; Chung, Chi-Ming Marvin; Evkan, Hülya; Huang, Leo Wei-Lun; Hwang, Vincent; Li, Ching-Lin Trista; Niederhagen, Ruben; Shih, Cheng-Jhih; Wälde, Julian; Yang, Bo-Yin | Journal Article |
2020 | Post-Quantum Secure Boot Kumar, Vinay B.Y.; Gupta, Naina; Chattopadhyay, Anupam; Kasper, Michael; Krauß, Christoph; Niederhagen, Ruben | Conference Paper |
2020 | Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS Bürstinghaus-Steinbach, Kevin; Krauß, Christoph; Niederhagen, Ruben; Schneider, Michael | Conference Paper |
2020 | Privacy and Robust Hashes. Privacy-Preserving Forensics for Image Re-Identification Steinebach, Martin; Lutz, Sebastian; Liu, Huajian | Journal Article |
2020 | Privacy und Big Data Winter, Christian; Steinebach, Martin; Heereman, Wendy; Steiner, Simone; Battis, Verena; Halvani, Oren; Yannikos, York; Schüßler, Christoph | Study |
2020 | Privacy-enhanced robust image hashing with bloom filters Breidenbach, Uwe; Steinebach, Martin; Liu, Huajian | Conference Paper |
2020 | Raising Security Awareness on Mobile Systems through Gamification Heid, Kris; Heider, Jens; Qasempour, Kasra | Conference Paper |
2020 | Recht und Informatik - Voneinander lernen und gemeinsam handeln Grimm, Rüdiger | Book Article |
2020 | Secure Attestation of Virtualized Environments Eckel, Michael; Fuchs, Andreas; Repp, Jürgen; Springer, Markus | Conference Paper |
2020 | Secure consensus generation with distributed DoH Jeitner, P.; Shulman, H.; Waidner, M. | Conference Paper |
2020 | Secure IT without vulnerabilities and back doors Weber, Arnd; Heiser, Gernot; Kuhlmann, Dirk; Schallbruch, Martin; Chattopadhyay, Anupam; Guilley, Sylvain; Kasper, Michael; Krauß, Christoph; Krüger, Philipp S.; Reith, Steffen; Seifert, Jean-Pierre | Journal Article |
2020 | Securing DNSSEC Keys via Threshold ECDSA from Generic MPC Dalskov, Anders; Orlandi, Claudio; Keller, Marcel; Shrishak, Kris; Shulman, Haya | Conference Paper |
2020 | Securing Electric Vehicle Charging Systems through Component Binding Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria | Conference Paper |
2020 | Security Analysis of Automotive Protocols Lauser, Timm; Zelle, Daniel; Krauß, Christoph | Conference Paper |
2020 | SEPAD - Security Evaluation Platform for Autonomous Driving Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey | Conference Paper |
2020 | Sicherheit messen! Kennzahlensysteme zur Überwachung der Informationssicherheit Stöwer, Mechthild; Kraft, Reiner | Book Article |
2020 | Sicherheitskennzahlen: Metriken aus Angreifer-Sicht Stöwer, Mechthild; Klaus, Marko | Journal Article |
2020 | Side Channel Information Set Decoding Using Iterative Chunking Lahr, Norman; Niederhagen, Ruben; Petri, Richard; Samardjiska, Simona | Conference Paper |
2020 | A Step Towards Interpretable Authorship Verification Halvani, Oren; Graner, Lukas; Regev, Roey | Conference Paper |
2020 | Subverting Linux' Integrity Measurement Architecture Bohling, Felix; Müller, Tobias; Eckel, Michael; Lindemann, Jens | Conference Paper |
2020 | TAVeer: An interpretable topic-agnostic authorship verification method Halvani, Oren; Graner, Lukas; Regev, Roey | Conference Paper |
2020 | Technische Erkennung von Desinformation - Von Kopien über Montagen bis zu Deep-Fake-Videos Waidner, Michael; Steinebach, Martin; Kreutzer, Michael | Book Article |
2020 | Towards Secure Urban Infrastructures: Cyber Security Challenges for Information and Communication Technology in Smart Cities Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael | Conference Paper |
2020 | Trust-based in-vehicle intrusion detection for CAN Henkensiefken, Christoph : Steinebach, Martin | Master Thesis |
2020 | TrustEV: Trustworthy Electric Vehicle Charging and Billing Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria | Conference Paper |
2020 | Uploadfilter - Funktionsweisen, Einsatzmöglichkeiten und Parametrisierung Raue, Benjamin; Steinebach, Martin | Journal Article, Conference Paper |
2020 | Using Clone Detection for Vulnerability Scanning Schickert, Nicolas : Waidner, Michael; Arzt, Steven | Master Thesis |
2020 | Verbesserung des Fälschungsschutzes eines auf Smartphone-Kameras basierenden Fingerabdruckverfahrens für Drucke Fiebig, Sebastian : Steinebach, Martin | Master Thesis |
2020 | Vorhersage von Gruppendynamiken auf der Grundlage von Daten aus Sozialen Netzwerken Spranger, Michael; Labudde, Dirk | Book Article |
2020 | White Paper. Einwilligung. Möglichkeiten und Fallstricke aus der Konsumentenperspektive Roßnagel, Alexander; Bile, Tamer; Nebel, Maxi; Geminn, Christian; Karaboga, Murat; Ebbers, Frank; Bremert, Benjamin; Stapf, Ingrid; Teebken, Mena; Thürmel, Verena; Ochs, Carsten; Uhlmann, Markus; Krämer, Nicole; Meier, Yannic; Kreutzer, Michael; Schreiber, Linda; Simo, Hervais : Friedewald, Michael (Hrsg.) | Report |
2020 | XMSS and Embedded Systems Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakub; Niederhagen, Ruben | Conference Paper |
2019 | 29. SmartCard Workshop 2019. Tagungsband : Waldmann, Ulrich | Conference Proceedings |
2019 | An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces Yannikos, York; Heeger, Julian; Brockmeyer, Maria | Conference Paper |
2019 | Assessing the Applicability of Authorship Verification Methods Halvani, Oren; Winter, Christian; Graner, Lukas | Conference Paper |
2019 | Automatisierte Analyse Radikaler Inhalte im Internet Vogel, Inna; Regev, Roey; Steinebach, Martin | Conference Paper |
2019 | Bot and Gender Identification in Twitter using Word and Character N-Grams Vogel, Inna; Jiang, Peter | Conference Paper |
2019 | Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection Berger, Ivo; Rieke, Roland; Kolomeets, Maxim; Chechulin, Andrey; Kotenko, Igor | Conference Paper |
2019 | Computergenerierte Kinderpornografie zu Ermittlungszwecken im Darknet Wittmer, Sandra; Steinebach, Martin | Journal Article |
2019 | Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures Birkholz, Henk; Vigano, Christoph; Bormann, Carsten | Report |
2019 | Cybersecurity Research: Challenges and Course of Action Holz, Thorsten; Müller-Quade, Jörn; Raabe, Oliver; Waidner, Michael; Bardin, Sébastien; Debar, Hervé; Dinger, Jochen; Fahl, Sascha; Faust, Sebastian; Gonzalez Fuster, Gloria; Gro, Stjepan; Hallett, Joseph; Harlander, Magnus; Houdeau, Detlef; Kirchner, Claude; Klasen, Wolfgang; Lotz, Volkmar; Markatos, Evangelos; Möhring, Peter; Posch, Reinhard; Ritter, Steve; Schallbruch, Martin; Schunter, Matthias; Volkamer, Melanie; Wespi, Andreas; Engelbrecht, Adrian; Fuchs, Andreas; Geiselmann, Willi; Grensing, Anna-Louise; Heidt, Margareta; Heyszl, Johann; Hiller, Matthias; Jäger, Lukas; Kawohl, Claudia; Koch, Alexander; Krämer, Annika; Marnau, Ninja; Noack, Kathrin; Rieke, Roland; Senf, Daniel; Springer, Markus; Steinbrück, Anne; Strefler, Mario; Tatang, Dennis; Backes, Michael; Buxmann, Peter; Eckert, Claudia : Müller-Quade, Jörn | Report |
2019 | Darknets as Tools for Cyber Warfare Denker, Kai; Schäfer, Marcel; Steinebach, Martin | Book Article |
2019 | Data Erasure under the GDPR - Steps towards Compliance. Practitioner’s Corner Enzmann, Matthias; Selzer, Annika; Spychalski, Dominik | Journal Article |
2019 | Data-Leakage-Tracking durch digitale Wasserzeichen Zmudzinski, Sascha; Steinebach, Martin | Journal Article |
2019 | Detection and Analysis of Tor Onion Services Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina; Yannikos, York | Conference Paper |
2019 | Der digitale Nachlass Kubis, Marcel; Naczinsky, Magdalena; Selzer, Annika; Sperlich, Tim; Steiner, Simone; Waldmann, Ulrich | Study |
2019 | Der digitale Nachlass: Eine Untersuchung aus rechtlicher und technischer Sicht (Tablet-Version) Kubis, Marcel; Naczinsky, Magdalena; Selzer, Annika; Sperlich, Tim; Steiner, Simone; Waldmann, Ulrich | Study |
2019 | Die Entwicklung von Löschregeln zum datenschutzkonformen Löschen personenbezogener Daten in Issue-Tracking-Systemen Selzer, Annika; Stummer, Sarah | Journal Article |
2019 | Fake News Detection by Image Montage Recognition Steinebach, Martin; Gotkowski, Karol; Liu, Huajian | Conference Paper |
2019 | Fake News Detection with the New German Dataset "GermanFakeNC Vogel, Inna; Jiang, Peter | Conference Paper |
2019 | FraunhoferSIT at GermEval 2019: Can Machines Distinguish Between Offensive Language and Hate Speech? Towards a Fine-Grained Classification Vogel, Inna; Regev, Roey | Conference Paper |
2019 | A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles Gürgens, Sigrid; Zelle, Daniel | Conference Paper |
2019 | Herausforderungen für die Anonymisierung von Daten Winter, Christian; Battis, Verena; Halvani, Oren | Conference Paper |
2019 | Herausforderungen für die Anonymisierung von Daten Winter, Christian; Battis, Verena; Halvani, Oren | Journal Article |
2019 | Improved Manipulation Detection with Convolutional Neural Network for JPEG Images Liu, Huajian; Steinebach, Martin; Schölei, Kathrin | Conference Paper |
2019 | Interpretierbare Verifizierung von Autorschaft Graner, Lukas; Steinebach, Martin | Book Article |
2019 | Interview mit dem Fraunhofer-Institut für Sichere Informationstechnologie zum Thema "Volksverschlüsselung" Herfert, Michael; Hartz, Jürgen | Journal Article |
2019 | Intrusion Detection - Systeme für vernetzte Fahrzeuge - Konzepte und Herausforderungen für Privatheit und Cyber-Sicherheit Simo, Hervais; Waidner, Michael; Geminn, Christian | Book Article |
2019 | Kommunikation als Gefahr: Nutzerreaktion auf Nachrichten mit verdächtigen Links per E-Mail und Facebook Gassmann, F.; Benenson, Z.; Landwirth, R. | Journal Article |
2019 | The Lattice-Based Digital Signature Scheme qTESLA Alkim, Erdem; Barreto, Paulo S.L.M.; Bindel, Nina; Krämer, Juliane; Longa, Patrick; Ricardini, Jefferson E. | Electronic Publication |
2019 | A Location Privacy Analysis of Bluetooth Mesh Caesar, Matthias; Steffan, Jan | Conference Paper |
2019 | Das Löschen nach der DSGVO. Eine Diskussion der datenschutzkonformen Umsetzung bei E-Mails Selzer, Annika; Durmus, Erdem; Pordesch, Ulrich | Journal Article |
2019 | Löschung rechtskonformer Nutzerinhalte durch Soziale-Netzwerkplattformen Heereman, Wendy; Selzer, Annika | Journal Article |
2019 | The need for steganalysis in image distribution channels Steinebach, Martin; Liu, Huajian; Ester, Andre | Journal Article |
2019 | A Novel Approach for Fast Protein Structure Comparison and Heuristic Structure Database Searching Based on Residue EigenRank Scores Heinke, F.; Hempel, L.; Labudde, D. | Conference Paper |
2019 | Plug-and-Patch: Secure Value Added Services for Electric Vehicle Charging Buschlinger, Lucas; Springer, Markus; Zhdanova, Maria | Conference Paper |
2019 | The Practice Turn in IT Security - An Interdisciplinary Approach Kocksch, Laura; Poller, Andreas | Conference Paper |
2019 | Privacy and Robust Hashes Steinebach, Martin; Lutz, Sebastian; Liu, Huajian | Conference Paper |
2019 | Quotable Signatures using Merkle Trees Kreutzer, M.; Niederhagen, R.; Shrishak, K.; Fhom, H.S. | Conference Paper |
2019 | Securing physical documents with digital signatures Winter, Christian; Berchtold, Waldemar; Hollenbeck, Jan Niklas | Conference Paper |
2019 | Security Automation and Continuous Monitoring (SACM) Terminology. Version 16 Birkholz, Henk; Lu, Jarrett; Strassner, John; Cam-Winget, Nancy; Montville, Adam | Report |
2019 | Security Managers Are Not The Enemy Either Reinfelder, L.; Landwirth, R.; Benenson, Z. | Conference Paper |
2019 | Security Module for the Electric Vehicle Charging System - Proposal for a Protection Profile Fuchs, Andreas; Krauß, Christoph; Lahr, Norman; Petri, Richard | Report |
2019 | Security Requirements Engineering in Safety-Critical Railway Signalling Networks Heinrich, M.; Vateva-Gurova, T.; Arul, T.; Katzenbeisser, S.; Suri, N.; Birkholz, H.; Fuchs, A.; Krauss, C.; Zhdanova, M.; Kuzhiyelil, D.; Tverdyshev, S.; Schlehuber, C. | Journal Article |
2019 | Security Test Platform for Autonomous Driving Zelle, Daniel; Rieke, Roland; Krauß, Christoph | Conference Paper |
2019 | Selbstdatenschutz im vernetzten Fahrzeug und dessen technische Umsetzung Krauß, Christoph | Book Article |
2019 | Side Channel Information Set Decoding Lahr, Norman; Niederhagen, Ruben; Petri, Richard; Samardjiska, Simona | Journal Article |
2019 | The SPHINCS+ Signature Framework Niederhagen, Ruben; Bernstein, Daniel J.; Hülsing, Andreas; Kölbl, Stefan; Rijneveld, Joost; Schwabe, Peter | Conference Paper |
2019 | Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains Sivachev, Alexey V.; Bashmakov, Daniil A.; Mikhailishenko, Olga V.; Korobeynikov, Anatoliy G.; Rieke, Roland | Conference Paper |
2019 | System Security Mechanisms for Electric Vehicles and Charge Points Supporting ISO 15118 - Proposal for a Technical Guideline Kern, Dustin; Krauß, Christoph; Zhdanova, Maria | Report |
2019 | A Systematic Analysis and Hardening of the Java Security Architecture Holzinger, Philipp | Dissertation |
2019 | Technisierung - Technische Möglichkeiten zur Verfolgung von Arzneimittelstraftaten im Internet Steinebach, Martin; Yannikos, York; Halvani, Oren; Pflug, Annika | Book Article |
2019 | Tracking Criminal Events through IoT Devices and an Edge Computing Approach Tundis, Andrea; Kaleem, Humayun; Mühlhäuser, Max | Conference Paper |
2019 | Unary and Binary Classification Approaches and their Implications for Authorship Verification Halvani, Oren; Winter, Christian; Graner, Lukas | Report |
2019 | An Unsophisticated Neural Bots and Gender Profiling System Halvani, Oren; Marquardt, Philipp | Conference Paper |
2019 | Verschlüsselung in der Cloud Herfert, Michael; Lange, Benjamin; Spychalski, Dominik | Journal Article |
2019 | Verwendung computergenerierter Kinderpornografie zu Ermittlungszwecken im Darknet Wittmer, Sandra; Steinebach, Martin | Conference Paper |