2022-03-022022-03-020926-227Xhttps://publica.fraunhofer.de/handle/publica/117140Journal of computer security