Publications
Publications
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten
Reuter, Christian; Mentler, Tilo; Nestler, Simon; Herczeg, Michael; Ludwig, Thomas; Pottebaum, Jens; Kaufhold, Marc-André
Mensch und Computer 2019 - Workshopband, p.278-280
[Conference Proceedings]
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, p.119-124
[Conference Proceedings]
QMagFace: Simple and Accurate Quality-Aware Face Recognition
Terhörst, Philipp; Ihlefeld, Malte; Huber, Marco; Damer, Naser; Kirchbuchner, Florian; Raja, Kiran; Kuijper, Arjan
Winter Conference on Applications of Computer Vision 2023
[Conference Paper]
Automated Cone and Vessel Analysis in Adaptive Optics Like Retinal Images for Clinical Diagnostics Support
Hertlein, Anna-Sophia; Wesarg, Stefan; Jessica Schmidt; Boche, Benjamin; Pfeiffer, Norbert; Matlach, Juliane
International Workshop on Clinical Image-Based Procedures 2022
[Conference Paper]
Machine Learning Based Approach for Motion Detection and Estimation in Routinely Acquired Low Resolution Near Infrared Fluorescence Optical Imaging
Zerweck, Lukas; Wesarg, Stefan; Kohlhammer, Jörn; Köhm, Michaela
International Workshop on Clinical Image-Based Procedures 2022
[Conference Paper]
Clinical Image-Based Procedures. 11th Workshop, CLIP 2022. Proceedings
International Workshop on Clinical Image-Based Procedures 2022
[Conference Proceeding]
Association of Phantomless Dual-Energy CT-based Volumetric Bone Mineral Density with the Prevalence of Acute Insufficiency Fractures of the Spine
Gruenewald, Leon D.; Koch, Vitali; Yel, İbrahim; Eichler, Katrin; Gruber-Rouh, Tatjana; Alizadeh, Leona S.; Mahmoudi, Scherwin; D'Angelo, Tommaso; Wichmann, Julian L.; Wesarg, Stefan; Vogl, Thomas J.; Booz, Christian
[Journal Article]
A survey on computer vision based human analysis in the COVID-19 era
Eyi̇okur , Fevzi̇ye İrem; Kantarcı, Alperen; Erakın, Mustafa Ekrem; Damer, Naser; Ofli, Ferda; Imran, Muhammad; Križaj, Janez; Ali Salah, Albert; Waibel, Alexander; Štruc, Vitomir; Ekenel, Hazım Kemal
[Journal Article]
COMPO*SED: Composite Parallel Coordinates for Co-Dependent Multi-Attribute Choices
Cibulski, Lena; May, Thorsten; Johanna Schmidt; Kohlhammer, Jörn
[Journal Article]
Perceptually Optimizing Color Look-up Tables
Reinhard, Johann; Urban, Philipp
[Journal Article]
Measuring the Uptaking of Digital Health Platforms on AAL/AHA Domain
Juiz, Carlos; Bermejo, Belen; Nikolov, Alexander; Rus, Silvia; Carboni, Andrea; Russo, Dario; Moroni, Davide; Karanastasis, Efstathios; Andronikou, Vassiliki; Lievens, Frederic; Berlo, Ad van; Staalduinen, Willeke van; Samuelsson, Christina; Cabrera-Umpierrez, Maria Fernanda
International Congress on Information and Communication Technology 2022
[Conference Paper]
Ein Vorschlag für die datenschutzkonforme Gestaltung von Datenschutz-Grundsätzen und -Schutzmaßnahmen in IT-Systemen
Selzer, Annika; Timm, Ingo J.
[Journal Article]
XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Philipp Jeitner and Haya Schulmann and Lucas Teichmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4473–4490
[Conference Proceedings]
Stalloris: RPKI Downgrade Attack
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
31st USENIX Security Symposium (USENIX Security 22), p.4455–4471
[Conference Proceedings]
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Tomas Hlavacek and Haya Schulmann and Michael Waidner
Computer Security – ESORICS 2022, p.509–530
[Conference Proceedings]
How (Not) to Deploy Cryptography on the Internet
Haya Schulmann
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, p.1
[Conference Proceedings]
Poster: DNS in Routers Considered Harmful
Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3471–3473
[Conference Proceedings]
Poster: Insights into Global Deployment of RPKI Validation
Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3467–3469
[Conference Proceedings]
Poster: RPKI Kill Switch
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3423–3425
[Conference Proceedings]
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Elias Heftrig and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3363–3365
[Conference Proceedings]
Behind the Scenes of RPKI
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.1413–1426
[Conference Proceedings]
Special issue ESORICS 2021
Elisa Bertino and Haya Schulmann and Michael Waidner
Journal of Computer Security, Vol.30, p.753–755
[Journal Article]
crypto_lib: Comparing and Selecting Cryptography Libraries
J. Wohlwender and R. Huesmann and A. Heinemann and A. Wiesmaier
European Interdisciplinary Cybersecurity Conference (EICC'22), p.6 – 11
[Conference Proceedings]
Efficient Practical Byzantine Consensus Using Random Linear Network Coding
M. Braun and A. Wiesmaier and N. Alnahawi
Springer Annals of Telecommunications (Journal), Vol.78, p.33–51
[Journal Article]
Sussex-Huawei Locomotion and Transportation Dataset
Hristijan Gjoreski and
Mathias Ciliberto and
Lin Wang and
Francisco Javier Ordóñez Morales and
Sami Mekki and
Stefan Valentin and
Daniel Roggen
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Daniel Zelle and Christian Plappert and Roland Rieke and Dirk Scheuermann and Christoph Krauß
Microprocessors and Microsystems, Vol.90, p.104461
[Journal Article]
Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Lucas Buschlinger and Roland Rieke and Sanat Sarda and Christoph Krauß
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]
Integrating Privacy into the Electric Vehicle Charging Architecture
Dustin Kern and Timm Lauser and Christoph Krauß
Proceedings on Privacy Enhancing Technologies, Vol.2022, p.140-158
[Journal Article]
On the State of Crypto-Agility
N. Alnahawi and N. Schmitt and A. Wiesmaier and A. Heinemann and T. Graßmeyer
18. Deutscher IT-Sicherheitskongress, p.103 – 126
[Conference Proceedings]
Towards a maturity model for crypto-agility assessment
Julian Hohm and
Andreas Heinemann and
Alexander Wiesmaier
CoRR, Vol.abs/2202.07645
[Journal Article]


