Publications

Publications

Ensuring the Integrity and Security of Network Equipment is Critical in the Fight Against Cyber Attacks
Eckel, Michael; Laffey, Tom
[Journal Article]


Machine Learning Application for Prediction of Sapphire Crystals Defects
Klunnikova, Yulia Vladimirovna; Anikeev, Maxim Vladimirovich; Filimonov, Alexey Vladimirovich; Kumar, Ravi
[Journal Article]


Detection and Analysis of Tor Onion Services
Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina
[Journal Article]


Sicherheitskennzahlen: Metriken aus Angreifer-Sicht
Stöwer, Mechthild; Klaus, Marko
[Journal Article]


A location privacy analysis of Bluetooth mesh
Caesar, Matthias; Steffan, Jan
[Journal Article]


Detecting and tracking criminals in the real world through an IoT-based system
Tundis, A.; Kaleem, H.; Mühlhäuser, M.
[Journal Article]


Cortex-M4 Optimizations for {R, M}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, François
[Journal Article]


Applying machine intelligence in practice. Selected results of the 2019 Dagstuhl Workshop on Applied Machine Intelligence
Humm, Bernhard; Bense, Hermann; Bock, Jürgen; Classen, Mario; Halvani, Oren; Herta, Christian; Hoppe, Thomas; Juwig, Oliver; Siegel, Melanie
Workshop on Applied Machine Intelligence 2019
[Journal Article]


Datenschutzkonformes Löschen personenbezogener Daten in Kundenbeziehungsmanagementsystemen
Macit, Tugba Koc; Selzer, Annika
[Journal Article]


ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
[Journal Article]


Motion Vector based Robust Video Hash
Liu, Huajian; Fach, Sebastian; Steinebach, Martin
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]