2022-03-022022-03-020167-4048https://publica.fraunhofer.de/handle/publica/116885Computers & security