Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
202030. ID: SMART Workshop 2020
: Waldmann, U.
Conference Proceedings
2020Analyzing Linguistic Features of German Fake News: Characterization, Detection, and Discussion
Vogel, Inna
Conference Paper
2020Anonymisierung und Pseudonymisierung von Daten für Projekte des maschinellen Lernens
Aichroth, Patrick; Battis, Verena; Dewes, Andreas; Dibak, Christoph; Doroshenko, Vadym; Geiger, Bernd; Graner, Lukas; Holly, Steffen; Huth, Michael; Kämpgen, Benedikt; Kaulartz, Markus; Mundt, Michael; Rapp, Hermann; Steinebach, Martin; Sushko, Yurii; Swarat, Dominic; Winter, Christian; Weiß, Rebekka
Book
2020Applying machine intelligence in practice. Selected results of the 2019 Dagstuhl Workshop on Applied Machine Intelligence
Humm, Bernhard; Bense, Hermann; Bock, Jürgen; Classen, Mario; Halvani, Oren; Herta, Christian; Hoppe, Thomas; Juwig, Oliver; Siegel, Melanie
Journal Article, Conference Paper
2020Automated Firmware Metadata Extraction of IoT Devices
Leimbach, Rupert
: Waidner, Michael; Roskosch, Philipp
Bachelor Thesis
2020Automatisierte Erkennung von Desinformationen
Halvani, Oren; Heereman von Zuydtwyck, Wendy; Herfert, Michael; Kreutzer, Michael; Liu, Huajian; Simo Fhom, Hervais-Clemence; Steinebach, Martin; Vogel, Inna; Wolf, Ruben; Yannikos, York; Zmudzinski, Sascha
Book Article
2020Checking the Integrity of Images with Signed Thumbnail Images
Steinebach, Martin; Jörg, Sebastian; Liu, Huajian
Conference Paper
2020Concise Identities. Version 02
Birkholz, Henk; Bormann, Carsten; Pritikin, Max; Moskowitz, Robert
Report
2020Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
Fenzl, Florian; Rieke, Roland; Chevalier, Y.; Dominik, A.; Kotenko, I.
Journal Article
2020Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, Francois
Electronic Publication
2020Cortex-M4 Optimizations for {R, M}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, François
Journal Article
2020Datenschutz und Datensicherheit im Digital Public Health
Kunz, Thomas; Lange, Benjamin; Selzer, Annika
Journal Article
2020Datenschutzkonformes Löschen personenbezogener Daten in Kundenbeziehungsmanagementsystemen
Macit, Tugba Koc; Selzer, Annika
Journal Article
2020Datenschutzrechtliche Zulässigkeit von Cloud-Computing-Services und deren teilautomatisierte Überprüfbarkeit
Selzer, Annika
Book
2020Decision support for mobile app selection via automated privacy assessment
Wettlaufer, J.; Simo, H.
Conference Paper
2020Desinformation aufdecken und bekämpfen
: Steinebach, Martin; Bader, Katarina; Rinsdorf, Lars; Krämer, Nicole; Roßnagel, Alexander
Book
2020Detecting "DeepFakes" in H.264 Video Data Using Compression Ghost Artifacts
Frick, Raphael Antonius; Zmudzinski, Sascha; Steinebach, Martin
Conference Paper
2020Detecting and tracking criminals in the real world through an IoT-based system
Tundis, A.; Kaleem, H.; Mühlhäuser, M.
Journal Article
2020Detection and Analysis of Tor Onion Services
Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina
Journal Article
2020DISCO: Sidestepping RPKI's Deployment Barriers
Hlavacek, Tomas; Cunha, Italo; Gilad, Yossi; Herzberg, Amir; Katz-Bassett, Ethan; Schapira, Michael; Shulman, Haya
Conference Paper
2020ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection
Chevalier, Yannick; Rieke, Roland; Fenzl, Florian; Chechulin, Andrey; Kotenko, Igor
Conference Paper
2020Fake News Detection by Image Montage Recognition
Steinebach, Martin; Liu, Huajian; Gotkowski, Karol
Journal Article
2020File-Sharing and the Darknet
Steinebach, Martin
Book Article
2020Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Bienhaus, Diethelm; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Conference Paper
2020Handlungsempfehlungen
Jansen, Carolin; Johannes, Christopher; Krämer, Nicole; Kreutzer, Michael; Löber, Lena Isabell; Rinsdorf, Lars; Roßnagel, Alexander; Schaewitz, Leonie
Book Article
2020Interface to Network Security Functions (I2NSF) Terminology. Version 08
Hares, Susan; Strassner, John; Lopez, Diego R.; Xia, Liang; Birkholz, Henk
Report
2020ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
Electronic Publication
2020ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
Journal Article
2020JAB Code - A Versatile Polychrome 2D Barcode
Berchtold, Waldemar; Liu, Huajian; Steinebach, Martin; Klein, Dominik; Senger, Tobias; Thenee, Nicolas
Conference Paper
2020Limiting the Power of RPKI Authorities
Shrishak, Kris; Shulman, Haya
Conference Paper
2020A location privacy analysis of Bluetooth mesh
Caesar, Matthias; Steffan, Jan
Journal Article
2020Machine Learning Application for Prediction of Sapphire Crystals Defects
Klunnikova, Yulia Vladimirovna; Anikeev, Maxim Vladimirovich; Filimonov, Alexey Vladimirovich; Kumar, Ravi
Journal Article
2020Motion Vector based Robust Video Hash
Liu, Huajian; Fach, Sebastian; Steinebach, Martin
Conference Paper
2020Post-Quantum Secure Boot
Kumar, Vinay B.Y.; Gupta, Naina; Chattopadhyay, Anupam; Kasper, Michael; Krauß, Christoph; Niederhagen, Ruben
Conference Paper
2020Privacy and Robust Hashes. Privacy-Preserving Forensics for Image Re-Identification
Steinebach, Martin; Lutz, Sebastian; Liu, Huajian
Journal Article
2020Secure IT without vulnerabilities and back doors
Weber, Arnd; Heiser, Gernot; Kuhlmann, Dirk; Schallbruch, Martin; Chattopadhyay, Anupam; Guilley, Sylvain; Kasper, Michael; Krauß, Christoph; Krüger, Philipp S.; Reith, Steffen; Seifert, Jean-Pierre
Journal Article
2020SEPAD - Security Evaluation Platform for Autonomous Driving
Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey
Conference Paper
2020Sicherheitskennzahlen: Metriken aus Angreifer-Sicht
Stöwer, Mechthild; Klaus, Marko
Journal Article
2020TrustEV: Trustworthy Electric Vehicle Charging and Billing
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Conference Paper
2020Uploadfilter - Funktionsweisen, Einsatzmöglichkeiten und Parametrisierung
Raue, Benjamin; Steinebach, Martin
Journal Article, Conference Paper
2020XMSS and Embedded Systems
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakub; Niederhagen, Ruben
Conference Paper
201929. SmartCard Workshop 2019. Tagungsband
: Waldmann, Ulrich
Conference Proceedings
2019An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces
Yannikos, York; Heeger, Julian; Brockmeyer, Maria
Conference Paper
2019Assessing the Applicability of Authorship Verification Methods
Halvani, Oren; Winter, Christian; Graner, Lukas
Conference Paper
2019Automatisierte Analyse Radikaler Inhalte im Internet
Vogel, Inna; Regev, Roey; Steinebach, Martin
Conference Paper
2019Bot and Gender Identification in Twitter using Word and Character N-Grams
Vogel, Inna; Jiang, Peter
Conference Paper
2019Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection
Berger, Ivo; Rieke, Roland; Kolomeets, Maxim; Chechulin, Andrey; Kotenko, Igor
Conference Paper
2019Computergenerierte Kinderpornografie zu Ermittlungszwecken im Darknet
Wittmer, Sandra; Steinebach, Martin
Journal Article
2019Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures
Birkholz, Henk; Vigano, Christoph; Bormann, Carsten
Report
2019Cybersecurity Research: Challenges and Course of Action
Holz, Thorsten; Müller-Quade, Jörn; Raabe, Oliver; Waidner, Michael; Bardin, Sébastien; Debar, Hervé; Dinger, Jochen; Fahl, Sascha; Faust, Sebastian; Gonzalez Fuster, Gloria; Gro, Stjepan; Hallett, Joseph; Harlander, Magnus; Houdeau, Detlef; Kirchner, Claude; Klasen, Wolfgang; Lotz, Volkmar; Markatos, Evangelos; Möhring, Peter; Posch, Reinhard; Ritter, Steve; Schallbruch, Martin; Schunter, Matthias; Volkamer, Melanie; Wespi, Andreas; Engelbrecht, Adrian; Fuchs, Andreas; Geiselmann, Willi; Grensing, Anna-Louise; Heidt, Margareta; Heyszl, Johann; Hiller, Matthias; Jäger, Lukas; Kawohl, Claudia; Koch, Alexander; Krämer, Annika; Marnau, Ninja; Noack, Kathrin; Rieke, Roland; Senf, Daniel; Springer, Markus; Steinbrück, Anne; Strefler, Mario; Tatang, Dennis; Backes, Michael; Buxmann, Peter; Eckert, Claudia
: Müller-Quade, Jörn
Report
2019Darknets as Tools for Cyber Warfare
Denker, Kai; Schäfer, Marcel; Steinebach, Martin
Book Article
2019Data Erasure under the GDPR - Steps towards Compliance. Practitioner’s Corner
Enzmann, Matthias; Selzer, Annika; Spychalski, Dominik
Journal Article
2019Data-Leakage-Tracking durch digitale Wasserzeichen
Zmudzinski, Sascha; Steinebach, Martin
Journal Article
2019Detection and Analysis of Tor Onion Services
Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina; Yannikos, York
Conference Paper
2019Der digitale Nachlass
Kubis, Marcel; Naczinsky, Magdalena; Selzer, Annika; Sperlich, Tim; Steiner, Simone; Waldmann, Ulrich
Study
2019Der digitale Nachlass: Eine Untersuchung aus rechtlicher und technischer Sicht (Tablet-Version)
Kubis, Marcel; Naczinsky, Magdalena; Selzer, Annika; Sperlich, Tim; Steiner, Simone; Waldmann, Ulrich
Study
2019Die Entwicklung von Löschregeln zum datenschutzkonformen Löschen personenbezogener Daten in Issue-Tracking-Systemen
Selzer, Annika; Stummer, Sarah
Journal Article
2019Fake News Detection by Image Montage Recognition
Steinebach, Martin; Gotkowski, Karol; Liu, Huajian
Conference Paper
2019Fake News Detection with the New German Dataset "GermanFakeNC
Vogel, Inna; Jiang, Peter
Conference Paper
2019FraunhoferSIT at GermEval 2019: Can Machines Distinguish Between Offensive Language and Hate Speech? Towards a Fine-Grained Classification
Vogel, Inna; Regev, Roey
Conference Paper
2019A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles
Gürgens, Sigrid; Zelle, Daniel
Conference Paper
2019Herausforderungen für die Anonymisierung von Daten
Winter, Christian; Battis, Verena; Halvani, Oren
Conference Paper
2019Herausforderungen für die Anonymisierung von Daten
Winter, Christian; Battis, Verena; Halvani, Oren
Journal Article
2019Improved Manipulation Detection with Convolutional Neural Network for JPEG Images
Liu, Huajian; Steinebach, Martin; Schölei, Kathrin
Conference Paper
2019Interpretierbare Verifizierung von Autorschaft
Graner, Lukas; Steinebach, Martin
Book Article
2019Interview mit dem Fraunhofer-Institut für Sichere Informationstechnologie zum Thema "Volksverschlüsselung"
Herfert, Michael; Hartz, Jürgen
Journal Article
2019Intrusion Detection - Systeme für vernetzte Fahrzeuge - Konzepte und Herausforderungen für Privatheit und Cyber-Sicherheit
Simo, Hervais; Waidner, Michael; Geminn, Christian
Book Article
2019Kommunikation als Gefahr: Nutzerreaktion auf Nachrichten mit verdächtigen Links per E-Mail und Facebook
Gassmann, F.; Benenson, Z.; Landwirth, R.
Journal Article
2019The Lattice-Based Digital Signature Scheme qTESLA
Alkim, Erdem; Barreto, Paulo S.L.M.; Bindel, Nina; Krämer, Juliane; Longa, Patrick; Ricardini, Jefferson E.
Electronic Publication
2019A Location Privacy Analysis of Bluetooth Mesh
Caesar, Matthias; Steffan, Jan
Conference Paper
2019Das Löschen nach der DSGVO. Eine Diskussion der datenschutzkonformen Umsetzung bei E-Mails
Selzer, Annika; Durmus, Erdem; Pordesch, Ulrich
Journal Article
2019Löschung rechtskonformer Nutzerinhalte durch Soziale-Netzwerkplattformen
Heereman, Wendy; Selzer, Annika
Journal Article
2019The need for steganalysis in image distribution channels
Steinebach, Martin; Liu, Huajian; Ester, Andre
Journal Article
2019A Novel Approach for Fast Protein Structure Comparison and Heuristic Structure Database Searching Based on Residue EigenRank Scores
Heinke, F.; Hempel, L.; Labudde, D.
Conference Paper
2019Plug-and-Patch: Secure Value Added Services for Electric Vehicle Charging
Buschlinger, Lucas; Springer, Markus; Zhdanova, Maria
Conference Paper
2019The Practice Turn in IT Security - An Interdisciplinary Approach
Kocksch, Laura; Poller, Andreas
Conference Paper
2019Privacy and Robust Hashes
Steinebach, Martin; Lutz, Sebastian; Liu, Huajian
Conference Paper
2019Quotable Signatures using Merkle Trees
Kreutzer, M.; Niederhagen, R.; Shrishak, K.; Fhom, H.S.
Conference Paper
2019Securing physical documents with digital signatures
Winter, Christian; Berchtold, Waldemar; Hollenbeck, Jan Niklas
Conference Paper
2019Security Automation and Continuous Monitoring (SACM) Terminology. Version 16
Birkholz, Henk; Lu, Jarrett; Strassner, John; Cam-Winget, Nancy; Montville, Adam
Report
2019Security Managers Are Not The Enemy Either
Reinfelder, L.; Landwirth, R.; Benenson, Z.
Conference Paper
2019Security Module for the Electric Vehicle Charging System - Proposal for a Protection Profile
Fuchs, Andreas; Krauß, Christoph; Lahr, Norman; Petri, Richard
Report
2019Security Requirements Engineering in Safety-Critical Railway Signalling Networks
Heinrich, M.; Vateva-Gurova, T.; Arul, T.; Katzenbeisser, S.; Suri, N.; Birkholz, H.; Fuchs, A.; Krauss, C.; Zhdanova, M.; Kuzhiyelil, D.; Tverdyshev, S.; Schlehuber, C.
Journal Article
2019Security Test Platform for Autonomous Driving
Zelle, Daniel; Rieke, Roland; Krauß, Christoph
Conference Paper
2019Selbstdatenschutz im vernetzten Fahrzeug und dessen technische Umsetzung
Krauß, Christoph
Book Article
2019Side Channel Information Set Decoding
Lahr, Norman; Niederhagen, Ruben; Petri, Richard; Samardjiska, Simona
Journal Article
2019The SPHINCS+ Signature Framework
Niederhagen, Ruben; Bernstein, Daniel J.; Hülsing, Andreas; Kölbl, Stefan; Rijneveld, Joost; Schwabe, Peter
Conference Paper
2019Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains
Sivachev, Alexey V.; Bashmakov, Daniil A.; Mikhailishenko, Olga V.; Korobeynikov, Anatoliy G.; Rieke, Roland
Conference Paper
2019System Security Mechanisms for Electric Vehicles and Charge Points Supporting ISO 15118 - Proposal for a Technical Guideline
Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Report
2019A Systematic Analysis and Hardening of the Java Security Architecture
Holzinger, Philipp
Dissertation
2019Technisierung - Technische Möglichkeiten zur Verfolgung von Arzneimittelstraftaten im Internet
Steinebach, Martin; Yannikos, York; Halvani, Oren; Pflug, Annika
Book Article
2019Tracking Criminal Events through IoT Devices and an Edge Computing Approach
Tundis, Andrea; Kaleem, Humayun; Mühlhäuser, Max
Conference Paper
2019Unary and Binary Classification Approaches and their Implications for Authorship Verification
Halvani, Oren; Winter, Christian; Graner, Lukas
Report
2019An Unsophisticated Neural Bots and Gender Profiling System
Halvani, Oren; Marquardt, Philipp
Conference Paper
2019Verschlüsselung in der Cloud
Herfert, Michael; Lange, Benjamin; Spychalski, Dominik
Journal Article
2019Verwendung computergenerierter Kinderpornografie zu Ermittlungszwecken im Darknet
Wittmer, Sandra; Steinebach, Martin
Conference Paper