Publikationen

Publikationen

Authorship verification in the absence of explicit features and thresholds
Halvani, Oren; Graner, Lukas; Vogel, Inna
European Conference on IR Research (ECIR) <40, 2018, Grenoble>
Sprache: English
[Conference Paper]

Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines
Kaufhold, Marc-André; Gizikis, Alexis; Reuter, Christian; Habdank, Matthias; Grinko, Margarita
Journal of Contingencies and Crisis Management (JCCM), p.1-16
Sprache: English
[Journal Article]

Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks
Steinmetzer, Daniel; Yuan, Yimin; Hollick, Matthias
11th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Sprache: English
[Conference Proceedings]

Begriffsbestimmungen
Selzer, Annika
Sprache: German
[Book Article]

Benchmarking Binarisation Schemes for Deep Face Templates
Drozdowski, P.; Struck, F.; Rathgeb, C.; Busch, C.
Intl. Conf. on Image Processing (ICIP), p.1-5
[Conference Proceedings]

Blockchain - Grundlagen und Anwen­dungs­möglich­keiten
Lange, Benjamin
SmartCard Workshop <28, 2018, Darmstadt>
Sprache: German
[Conference Paper]

Blockchain and smart contracts: Technologies, research issues and applications
Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander; Prinz, Wolfgang (Ed.); Schulte, Axel T. (Ed.)
Sprache: English
[Report, Electronic Publication]

Blockchain in Industrie 4.0: Beyond Cryptocurrency
Laabs, Martin; Dukanovic, Sinisa
Sprache: English
[Journal Article]

Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT
Kaufhold, Marc-André; Riebe, Thea; Reuter, Christian; Hester, Julian; Jeske, Danny; Knüver, Lisa; Richert, Viktoria
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.1-19
Sprache: English
[Journal Article]

Call Graph Construction for Java Libraries
Reif, Michael; Eichberg, Michael; Mezini, Mira
Software Engineering und Software Management 2018
Sprache: English
[Conference Proceedings]

Caring for IT Security: Accountabilities, Moralities, and Oscillations in IT Security Practices
Kocksch, Laura; Korn, Matthias; Poller, Andreas; Wagenknecht, Susann
Conference on Computer-Supported Cooperative Work and Social Computing (CSCW) <21, 2018, New York/NY>
Sprache: English
[Journal Article, Conference Paper]

Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
Riazi, M. Sadegh; Weinert, Christian; Tkachenko, Oleksandr; Songhori, Ebrahim M.; Schneider, Thomas; Koushanfar, Farinaz
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), p.707-721
Sprache: English
[Conference Proceedings]

Channel steganalysis
Steinebach, Martin; Ester, Andre; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) <13, 2018, Hamburg>
Sprache: English
[Conference Paper]

Coalition-Resistant Peer Rating for Long-Term Confidentiality
Traverso, Giulia; Butin, Denis; Buchmann, Johannes; Palesandro, Alex
PST 2018 - 16th Annual Conference on Privacy, Security and Trust
Sprache: English
[Conference Proceedings]

CodeMatch: Obfuscation Won't Conceal Your Repackaged App
Glanz, Leonid; Amann, Sven; Eichberg, Michael; Reif, Michael; Mezini, Mira
Software Engineering und Software Management 2018, p.117-118
Sprache: English

Collective Attestation: for a Stronger Security in Embedded Networks
Ibrahim, Ahmad
IEEE
Sprache: English
[Conference Proceedings]

Concise data definition language (CDDL): A notational convention to express CBOR data structures
Birkholz, Henk; Vigano, Christoph; Bormann, Carsten
Sprache: English
[Report, Electronic Publication]

CrazyFaces: Unassisted Circumvention of Watchlist Face Identification
Damer, Naser; Wainakh, Yaza; Boller, Viola; Berken von den, Sven; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) <9, 2018, Redondo Beach/Calif.>
Sprache: English
[Conference Paper]

Cross-domain authorship attribution based on compression: Notebook for PAN at CLEF 2018
Halvani, Oren; Graner, Lukas
Conference and Labs of the Evaluation Forum (CLEF) <2018, Avignon>
Sprache: English
[Conference Paper, Electronic Publication]

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Krüger, Stefan; Späth, Johannes; Ali, Karim; Bodden, Eric; Mezini, Mira
32nd European Conference on Object-Oriented Programming (ECOOP 2018), p.10:1-10:27
Sprache: English
[Conference Proceedings]

Darum könnte die Bitcoin-Technologie ein gefährliches Sicherheitsrisiko für die ganze Wirtschaft sein
Kreutzer, Michael
Sprache: German
[Journal Article, Electronic Publication]

Database Binning and Retrieval in Multi-Fingerprint Identification Systems
Drozdowski, P.; Fischer, D.; Rathgeb, C.; Schiel, C.; Busch, C.
Intl. Workshop on Information Forensics and Security (WIFS), p.1-7
[Conference Proceedings]

Datenschutz-Folgenabschätzung
Selzer, Annika
Sprache: German
[Book Article]

Datensicherheit und -integrität der Elektromobilität beim eichrechtskonformen Laden und Abrechnen
Brosi, Frank; Gröning, Sven; Krauß, Christoph; Seipel, Christian; Sheveleva, Tatyana; Staubermann, Michael
Sprache: German
[Journal Article]

Decay-Based DRAM PUFs in Commodity Devices
Schaller, André; Xiong, Wenjie; Anagnostopoulos, Nikolaos Athanasios; Saleem, Umair; Gabmeyer, Sebastian; Skoric, Boris; Katzenbeisser, Stefan; Szefer, Jakub
IEEE Transactions on Dependable and Secure Computing (TDSC)
Sprache: English
[Journal Article]