2022-03-022022-03-021363-4127https://publica.fraunhofer.de/handle/publica/117542Information security technical report