Publications
Publications
Detection and Analysis of Tor Onion Services
Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina
[Journal Article]
Sicherheitskennzahlen: Metriken aus Angreifer-Sicht
Stöwer, Mechthild; Klaus, Marko
[Journal Article]
A location privacy analysis of Bluetooth mesh
Caesar, Matthias; Steffan, Jan
[Journal Article]
Detecting and tracking criminals in the real world through an IoT-based system
Tundis, A.; Kaleem, H.; Mühlhäuser, M.
[Journal Article]
Cortex-M4 Optimizations for {R, M}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, François
[Journal Article]
Applying machine intelligence in practice. Selected results of the 2019 Dagstuhl Workshop on Applied Machine Intelligence
Humm, Bernhard; Bense, Hermann; Bock, Jürgen; Classen, Mario; Halvani, Oren; Herta, Christian; Hoppe, Thomas; Juwig, Oliver; Siegel, Melanie
Workshop on Applied Machine Intelligence 2019
[Journal Article]
Datenschutzkonformes Löschen personenbezogener Daten in Kundenbeziehungsmanagementsystemen
Macit, Tugba Koc; Selzer, Annika
[Journal Article]
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
[Journal Article]
Motion Vector based Robust Video Hash
Liu, Huajian; Fach, Sebastian; Steinebach, Martin
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
Nikolopoulos, Georgios M.; Fischlin, Marc
Cryptography
[Journal Article]
An Overview of the Botnet Simulation Framework
Böck, Leon; Shankar, Karuppayah; Mühlhäuser, Max; Emmanouil, Vasilomanolakis
The Journal on Cybercrime & Digital Investigations, p.1-10
[Journal Article]
Benefits of formalized computational modeling for understanding user behavior in online privacy research
Schürmann, Tim; Gerber, Nina; Gerber, Paul
Journal of Intellectual Capital, p.431-458
[Journal Article]
Has the GDPR hype affected users’ reaction to cookie disclaimers?
Kulyk, Oksana; Gerber, Nina; Hilt, Annika; Volkamer, Melanie
Journal of Cybersecurity
[Journal Article]
Biometric Presentation Attack Detection: Beyond the Visible Spectrum
Tolosana, R.; Gomez-Barrero, M.; Busch, C.; Ortega-Garcia, J.
IEEE Trans. on Information Forensics and Security, Vol.15, p.1261-1275
[Journal Article]
An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris
Tapia, J.; Gomez-Barrero, M.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]
Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach
Scherhag, U.; Kunze, J.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.9, p.278-289
[Journal Article]
Morphing Attack Detection using Laplace operator based features
Scherhag, U.; Fischer, D.; Isadskiy, S.; Otte, J.; Busch, C.
in Proc. Norwegian Information Security Conf. (NISK)
[Journal Article]
Deep Face Representations for Differential Morphing Attack Detection
Scherhag, U.; Rathgeb, C.; Merkle, J.; Busch, Christoph
IEEE Trans. on Information Forensics and Security
[Journal Article]
Makeup Presentation Attacks: Review and Detection Performance Benchmark
Rathgeb, C.; Drozdowski, P.; Busch, C.
IEEE Access, Vol.8, p.224958-224973
[Journal Article]
Morphing Attack Detection - Database, Evaluation Platform and Benchmarking
Raja, K.; Ferrara, M.; Franco, A.; Spreeuwers, L.; Batskos, I.; others
IEEE Trans. on Information Forensics and Security
[Journal Article]
Morphing-Angriffe - Ein Sicherheitsrisiko für Gesichtserkennungssysteme
Merkle, J.; Rathgeb, C.; Scherhag, U.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.38-42
[Journal Article]
Reversing the irreversible: A survey on inverse biometrics
Gomez-Barrero, M.; Galbally, J.
Computers & Security, Vol.90
[Journal Article]
Erkennung von Präsentationsangriffen auf Fingerabdruck Systemen
Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.26-31
[Journal Article]
Language-Integrated Privacy-Aware Distributed Queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.1-30
[Journal Article]
How to nudge in cyber security
Renaud, Karen; Zimmermann, Verena
Network Security, p.20-20
[Journal Article]
Exploring User Expectations of Proactive AI Systems
Meurisch, Christian; Mihale-Wilson, Cristina; Hawlitschek, Adrian; Giger, Florian; Müller, Florian; Hinz, Oliver; Mühlhäuser, Max
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
[Journal Article]
LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems
Stute, Milan; Agarwal, Pranay; Kumar, Abhinav; Asadi, Arash; Hollick, Matthias
IEEE Internet of Things Journal, p.6802-6816
[Journal Article]
Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen
Reuter, Christian; Kaufhold, Marc-André; Schmid, Stefka
BBK Bevölkerungsschutz, p.14-17
[Journal Article]
Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning
Kaufhold, Marc-André; Bayer, Markus; Reuter, Christian
Information Processing & Management
[Journal Article]
Implementing a Language for Distributed Systems: Choices and Experiences with Type Level and Macro Programming in Scala
Weisenburger, Pascal; Salvaneschi, Guido
The Art, Science, and Engineering of Programming, p.17:1-17:29
[Journal Article]