Publications

Publications

Ensuring the Integrity and Security of Network Equipment is Critical in the Fight Against Cyber Attacks
Eckel, Michael; Laffey, Tom
[Journal Article]


Machine Learning Application for Prediction of Sapphire Crystals Defects
Klunnikova, Yulia Vladimirovna; Anikeev, Maxim Vladimirovich; Filimonov, Alexey Vladimirovich; Kumar, Ravi
[Journal Article]


Detection and Analysis of Tor Onion Services
Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina
[Journal Article]


Sicherheitskennzahlen: Metriken aus Angreifer-Sicht
Stöwer, Mechthild; Klaus, Marko
[Journal Article]


A location privacy analysis of Bluetooth mesh
Caesar, Matthias; Steffan, Jan
[Journal Article]


Detecting and tracking criminals in the real world through an IoT-based system
Tundis, A.; Kaleem, H.; Mühlhäuser, M.
[Journal Article]


Cortex-M4 Optimizations for {R, M}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, François
[Journal Article]


Applying machine intelligence in practice. Selected results of the 2019 Dagstuhl Workshop on Applied Machine Intelligence
Humm, Bernhard; Bense, Hermann; Bock, Jürgen; Classen, Mario; Halvani, Oren; Herta, Christian; Hoppe, Thomas; Juwig, Oliver; Siegel, Melanie
Workshop on Applied Machine Intelligence 2019
[Journal Article]


Datenschutzkonformes Löschen personenbezogener Daten in Kundenbeziehungsmanagementsystemen
Macit, Tugba Koc; Selzer, Annika
[Journal Article]


ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
[Journal Article]


Motion Vector based Robust Video Hash
Liu, Huajian; Fach, Sebastian; Steinebach, Martin
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]


Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
Nikolopoulos, Georgios M.; Fischlin, Marc
Cryptography
[Journal Article]


An Overview of the Botnet Si­mu­la­tion Framework
Böck, Leon; Shankar, Karuppayah; Mühlhäuser, Max; Emmanouil, Vasilomanolakis
The Journal on Cybercrime & Digital Investigations, p.1-10
[Journal Article]


Benefits of formalized computational modeling for understanding user behavior in online privacy research
Schürmann, Tim; Gerber, Nina; Gerber, Paul
Journal of Intellectual Capital, p.431-458
[Journal Article]


Has the GDPR hype affected users’ reaction to cookie disclaimers?
Kulyk, Oksana; Gerber, Nina; Hilt, Annika; Volkamer, Melanie
Journal of Cybersecurity
[Journal Article]


Biometric Presentation Attack Detection: Beyond the Visible Spectrum
Tolosana, R.; Gomez-Barrero, M.; Busch, C.; Ortega-Garcia, J.
IEEE Trans. on Information Forensics and Security, Vol.15, p.1261-1275
[Journal Article]


An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris
Tapia, J.; Gomez-Barrero, M.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]


Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach
Scherhag, U.; Kunze, J.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.9, p.278-289
[Journal Article]


Morphing Attack Detection using Laplace operator based features
Scherhag, U.; Fischer, D.; Isadskiy, S.; Otte, J.; Busch, C.
in Proc. Norwegian Information Security Conf. (NISK)
[Journal Article]


Deep Face Representations for Differential Morphing Attack Detection
Scherhag, U.; Rathgeb, C.; Merkle, J.; Busch, Christoph
IEEE Trans. on Information Forensics and Security
[Journal Article]


Makeup Presentation Attacks: Review and Detection Performance Benchmark
Rathgeb, C.; Drozdowski, P.; Busch, C.
IEEE Access, Vol.8, p.224958-224973
[Journal Article]


Morphing Attack Detection - Database, Evaluation Platform and Benchmarking
Raja, K.; Ferrara, M.; Franco, A.; Spreeuwers, L.; Batskos, I.; others
IEEE Trans. on Information Forensics and Security
[Journal Article]


Morphing-Angriffe - Ein Sicherheitsrisiko für Gesichtserkennungssysteme
Merkle, J.; Rathgeb, C.; Scherhag, U.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.38-42
[Journal Article]


Reversing the irreversible: A survey on inverse biometrics
Gomez-Barrero, M.; Galbally, J.
Computers & Security, Vol.90
[Journal Article]


Erkennung von Präsentationsangriffen auf Fingerabdruck Systemen
Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.26-31
[Journal Article]


Language-Integrated Privacy-Aware Distributed Queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.1-30
[Journal Article]


How to nudge in cyber security
Renaud, Karen; Zimmermann, Verena
Network Security, p.20-20
[Journal Article]


Exploring User Expectations of Proactive AI Systems
Meurisch, Christian; Mihale-Wilson, Cristina; Hawlitschek, Adrian; Giger, Florian; Müller, Florian; Hinz, Oliver; Mühlhäuser, Max
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
[Journal Article]


LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems
Stute, Milan; Agarwal, Pranay; Kumar, Abhinav; Asadi, Arash; Hollick, Matthias
IEEE Internet of Things Journal, p.6802-6816
[Journal Article]


Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen
Reuter, Christian; Kaufhold, Marc-André; Schmid, Stefka
BBK Bevölkerungsschutz, p.14-17
[Journal Article]