Publications

Publications

Assessing the Applicability of Authorship Verification Methods
Halvani, Oren; Winter, Christian; Graner, Lukas
International Conference on Availability, Reliability and Security (ARES) <14, 2019, Canterbury>
Language: English
[Conference Paper, Electronic Publication]

Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
i-com Journal of Interactive Media, Vol.18, p.197-216
Language: English
[Journal Article]

Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
i-com Journal of Interactive Media, Vol.18, p.197-216
Language: English
[Journal Article]

AUDI: Towards Autonomous IoT Device-Type Identification
Marchal, Samuel; Miettinen, Markus; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza; Asokan, N.
IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications
Language: English
[Journal Article]

Automated Refactoring to Reactive Programming
Köhler, Mirco; Salvaneschi, Guido
ASE2019
Language: English
[Conference Proceedings]

Automatisierte Analyse Radikaler Inhalte im Internet
Vogel, Inna; Regev, Roey; Steinebach, Martin
Gesellschaft für Informatik (GI Fachtagung) <2019, Kassel>
Language: German
[Conference Paper]

Behaviour & information technology : Special Issue on Social Media in Conflicts and Crises
Reuter, Christian; Stieglitz, Stefan; Imran, Muhammad
Language: English
[Book]

Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories
Reuter, Christian; Häusser, Katja; Bien, Mona; Herbert, Franziska
Mensch und Computer 2019
Language: English
[Conference Proceedings]

Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh
Álvarez, Flor; Almon, Lars; Radtki, Hauke; Hollick, Matthias
9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019)
Language: English
[Conference Proceedings]

Bot and Gender Identification in Twitter using Word and Character N-Grams: Notebook for PAN at CLEF 2019
Vogel, Inna; Jiang, Peter
Conference and Labs of the Evaluation Forum (CLEF) <2019, Lugano>
Language: English
[Conference Paper, Electronic Publication]

Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix
ESORICS 2019 - The European Symposium on Research in Computer Security
Language: English
[Conference Proceedings]

Can an online service predict gender?: on the state-of-the-art in gender identification from texts
Krüger, Stefan; Hermann, Ben
GE@ICSE 2019 : 2nd Workshop on Gender Equality in Software Engineering
Language: English
[Conference Proceedings]

Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Stebila, Douglas
Language: English
[Report]

CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems
Dessouky, Ghada; Zeitouni, Shaza; Ibrahim, Ahmad; Davi, Lucas; Sadeghi, Ahmad-Reza
2019 International Conference On Computer Aided Design (ICCAD)
Language: English
[Conference Proceedings]

Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection
Berger, Ivo; Rieke, Roland; Kolomeets, Maxim; Chechulin, Andrey; Kotenko, Igor
European Symposium on Research in Computer Security (ESORICS) <23, 2018, Barcelona>
Language: English
[Conference Paper]

Computational Workload in Biometric Identification Systems: An Overview
Drozdowski, P.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.8, p.351-368
[Journal Article]

Computergenerierte Kinderpornografie zu Ermittlungszwecken im Darknet
Wittmer, Sandra; Steinebach, Martin
Language: German
[Journal Article]

Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures
Birkholz, Henk; Vigano, Christoph; Bormann, Carsten
Language: English
[Report, Electronic Publication]

Context Hiding Multi-Key Linearly Homomorphic Authenticators
Schabhüser, Lucas; Butin, Denis; Buchmann, Johannes
Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, p.493-513
Language: English
[Conference Proceedings]

Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism
Langer, Amanda; Kaufhold, Marc-André; Runft, Elena; Reuter, Christian; Grinko, Margarita; Pipek, Volkmar
Proceedings of the Information Systems for Crisis Response and Management (ISCRAM)
Language: English
[Conference Proceedings]

Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services
Kaufhold, Marc-André; Reuter, Christian; Ludwig, Thomas
arXiv:1907.07725 cs.SI, p.1-11
Language: English
[Journal Article]

Cross-Spectral Periocular Recognition by Cascaded Spectral Image Transformation
Raja, Kiran; Damer, Naser; Ramachandra, Raghavendra; Boutros, Fadi; Busch, Christoph
International Conference on Imaging Systems & Techniques (IST) <2019, Abu Dhabi>
Language: English
[Conference Paper]

Cross-spectrum thermal to visible face recognition based on cascaded image synthesis
Mallat, Khawla; Damer, Naser; Boutros, Fadi; Kuijper, Arjan; Dugelay, Jean-Luc
International Conference on Biometrics (ICB) <12, 2019, Crete>
Language: English
[Conference Paper]

Cryptographic one-way function based on boson sampling
Nikolopoulos, Georgios M.
Quantum Information Processing, Vol.18, p.259
Language: English
[Journal Article]

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Krüger, Stefan; Späth, Johannes; Ali, Karim; Bodden, Eric; Mezini, Mira
IEEE Transactions on Software Engineering
Language: English
[Journal Article]