Publications

Publications

Aktive Cyberabwehr
Schulmann, Haya; Waidner, Michael
[Journal Article]


Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and Disadvantages
Gkoktsis, Georgios; Lauer, Hagen; Jäger, Lukas
International Conference on Availability, Reliability and Security 2023
[Conference Paper]


Beyond Limits: How to Disable Validators in Secure Networks
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Shulman, Haya; Waidner, Michael
Association for Computing Machinery, Special Interest Group on Data Communication (ACM SIGCOMM Conference) 2023
[Conference Paper]


Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Frieß, Jens; Schulmann, Haya; Waidner, Michael
International Conference on Emerging Networking EXperiments and Technologies 2023
[Journal Article]


Einsatz von computergenerierten Missbrauchsabbildungen zur Strafverfolgung im Darknet
Wittmer, Sandra; Steinebach, Martin
[Book Article]


Der richtige Umgang mit KI-generierten Inhalten
Steinebach, Martin


APT Detection: An Incremental Correlation Approach
Daneshgadeh Çakmakçı, Salva; Gkoktsis, Georgios; Buchta, Robin; Detken, Kai Oliver; Heine, Felix; Kleiner, Carsten
International Conference on Intelligent Data Acquisition and Advanced Computing Systems - Technology Applications 2023
[Conference Paper]


Desinformationserkennung anhand von Netzwerkanalysen - ein Instrument zur Durchsetzung der Pflichten des DSA am Beispiel von Telegram
Panahi, Tahireh; Hornung, Gerrit; Schäfer, Karla; Choi, Jeong-Eun; Steinebach, Martin; Vogel, Inna
[Book Article]


Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht
Büscher, Maximilian; Hornung, Gerrit; Schindler, Stephan; Zurawski, Paul; Gutjahr, Amina; Spiecker gen. Döhmann, Indra; Selzer, Annika; Stummer, Sarah; Wilmer, Thomas
[Journal Article]


Zulässigkeit der Zweckänderung durch Auftragsverarbeiter
Boll, Alina; Gärtner, Tanya; Geissler, Ines; Stummer, Sarah
[Journal Article]


Remote Attestation with Constrained Disclosure
Eckel, Michael; George, Dominik Roy; Grohmann, Björn; Krauß, Christoph
Annual Computer Security Applications Conference 2023
[Conference Paper]


Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles
Plappert, Christian; Fuchs, Andreas
Annual Computer Security Applications Conference 2023
[Conference Paper]


Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles
Plappert, Christian; Fuchs, Andreas
Annual Computer Security Applications Conference 2023
[Conference Paper]


Langfristige IT-Sicherheit durch Kryptoagilität
Wolf, Leonie; Kreutzer, Michael


Queen of Swords at Touché 2023. Intra-Multilingual Multi-Target Stance Classification using BERT
Schäfer, Karla
Conference and Labs of the Evaluation Forum 2023
[Conference Paper]


Fraunhofer SIT at CheckThat! 2023: Enhancing the Detection of Multimodal and Multigenre Check-Worthiness Using Optical Character Recognition and Model Souping
Frick, Raphael; Vogel, Inna; Choi, Jeong-Eun
Conference and Labs of the Evaluation Forum 2023
[Conference Paper]


Transparency in Messengers. A Metadata Analysis Based on the Example of Telegram
Schäfer, Karla; Choi, Jeong-Eun
Conference on Hypertext and Social Media 2023
[Conference Paper]


RulEth: Genetic Programming-Driven Derivation of Security Rules for Automotive Ethernet
Gail, Felix; Rieke, Roland; Fenzl, Florian
European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases 2023
[Conference Paper]


Transferrability of Adversarial Attacks from Convolutional Neural Networks to ChatGPT4
Bunzel, Niklas
[Paper]


Superpolynomial quantum-classical separation for density modeling
Pirnay, Niklas; Sweke, Ryan; Eisert, Jens; Seifert, Jean-Pierre
[Journal Article]


Evaluating the applicability of hardware trust anchors for automotive applications
Plappert, Christian; Lorych, Dominik; Eckel, Michael; Jäger, Lukas; Fuchs, Andreas; Heddergott, Ronald
[Journal Article]


Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)
Krachenfels, Thilo; Seifert, Jean-Pierre; Tajik, Shahin
[Journal Article]


Post Pandemic Follow-Up – How Data Sharing Can Be Reached in a Privacy-Friendly Way to Prepare Us for a Smart World
Selzer, Annika; Timm, Ingo J.
Fachtagung Software Engineering 2023
[Conference Paper]


Digitalisierung: Chancen nutzen, Risiken vermeiden
Selzer, Annika; Ingo J. Timm
Fachtagung Software Engineering 2023
[Conference Paper]


Umbruch im Datenschutz
Selzer, Annika
Fachtagung Software Engineering 2023
[Conference Paper]


Leben in Metaversen und im Virtual Afterlife
Geissler, Ines
Fachtagung Software Engineering 2023
[Conference Paper]


Datenschutzrechtliche Rollen in Metaversen und im virtuellen Weiterleben
Geissler, Ines
Fachtagung Software Engineering 2023
[Conference Paper]


Der geplante US Active Cyber Defense Certainty Act - Ein Vorbild für Deutschland?
Kriegel, Jessica; Boll, Alina
Fachtagung Software Engineering 2023
[Conference Paper]


Towards a Taxonomy of Cyber Defence in International Law
Gärtner, Tanya
Fachtagung Software Engineering 2023
[Conference Paper]


Legal Requirements and Technical Metrics for Controlling Privacy of Employees' Location Data
Waldmann, Ulrich; Kunz, Thomas; Schleper, Janine; Kohn, Matthias; Pesch, Paulina Jo
Konferenz "Mensch und Computer" 2023
[Conference Paper]