Publikationen

Publikationen

Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick
Reuter, Christian
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Tech­no­logien und Soziale Medien im Krisen- und Sicherheitsmanagement, p.3-14
Sprache: German

Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Tech­no­logien und Soziale Medien im Krisen- und Sicherheitsmanagement
Sprache: German
[Book]

SIFT-based iris recognition revisited: prerequisites, advantages and improvements
Rathgeb, C.; Wagner, J.; Busch, C.
Pattern Analysis and Applications
[Journal Article]

Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research
Reuter, Christian; Hughes, Amanda Lee; Kaufhold, Marc-André
International Journal on Human-Computer Interaction (IJHCI), p.280-294
Sprache: English
[Journal Article]

SocialML: EUD im Maschine Learning zur Analyse sozialer Medien
Scholl, Simon; Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André
Mensch und Computer 2018: Tagungsband
Sprache: German
[Conference Proceedings]

Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Datenschutz und Datensicherheit, Vol.42, p.291-293
[Journal Article]

Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Sprache: German
[Journal Article]

Sovereignty in Information Technology. Security, Safety and Fair Market Access by Openness and Control of the Supply Chain
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Sprache: English
[Report, Electronic Publication]

Soziale Medien in Notfällen, Krisen und Katastrophen
Reuter, Christian; Kaufhold, Marc-André
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Tech­no­logien und Soziale Medien im Krisen- und Sicherheitsmanagement, p.379-402
Sprache: German

Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
BBK Bevölkerungsschutz, p.22-24
Sprache: German
[Journal Article]

Special Issue on IT Support for Crisis and Continuity Management
Reuter, Christian; Pottebaum, Jens
Sprache: English
[Book]

State-Aware Anomaly Detection for Industrial Control Systems
Ghaeini, Hamid Reza; Antonioli, Daniele; Brasser, Ferdinand; Sadeghi, Ahmad-Reza; Tippenhauer, Nils Ole
The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC)
Sprache: English
[Conference Proceedings]

Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André; Spielhofer, Thomas
Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, p.64-66
Sprache: German
[Journal Article]

Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java
Reif, Michael; Eichberg, Michael; Kübler, Florian; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.107-112
Sprache: English
[Conference Proceedings]

The dark side of the face: Exploring the ultraviolet spectrum for face biometrics
Samartzidis, Timotheos; Siegmund, Dirk; Gödde, Michael; Damer, Naser; Braun, Andreas; Kuijper, Arjan
International Conference on Biometrics (ICB) <11, 2018, Gold Coast>
Sprache: English
[Conference Paper, Electronic Publication]

The Future of IoT Security: Special Session
Mohan, Sibin; Asplund, Mikael; Bloom, Gedare; Sadeghi, Ahmad-Reza; Ibrahim, Ahmad; Salajageh, Negin; Griffioen, Paul; Sinopoli, Bruno
International Conference on Embedded Software (EMSOFT 2018), 2018
Sprache: English
[Conference Proceedings]

The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX
Biondo, Andrea; Conti, Mauro; Davi, Lucas; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
27th USENIX Security Symposium
Sprache: English
[Conference Proceedings]

The Influence of SME Constraints in an Organizational IT Security Context
Heidt, Margareta; Gerlach, Jin
International Conference on Information Systems (ICIS), 13.-16.12.2018, San Francisco, USA.
Sprache: German
[Conference Proceedings]

The Quest to Replace Passwords Revisited – Rating Authentication Schemes
Zimmermann, Verena; Gerber, Nina; Kleboth, Marius; von Preuschen, Alexandra; Schmidt, Konstantin; Mayer, Peter
Twelth International Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), p.38-48
Sprache: English
[Conference Proceedings]

The user-centered privacy-aware control system PRICON. An interdisciplinary evaluation
Walter, Jonas; Abendroth, Bettina; Pape, Thilo von; Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Gagzow, Gundula; Decke, Hendrik; Lange, Benjamin; Mauthofer, Sebastian
International Conference on Availability, Reliability and Security (ARES) <13, 2018, Hamburg>
Sprache: English
[Conference Paper]

The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation
Walter, Jonas; Abendroth, Bettina; Von Pape, Thilo; Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Gagzow, Gundula; Decke, Hendrik
Proceedings of the 13th International Conference on Availability, Reliability and Security ARES, p.1-24
[Conference Proceedings]

Towards a Cloud-based System for Software Protection and Licensing
Schaad, Andreas; Grohmann, Bjoern; Winzenried, Oliver; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, p.698-702
Sprache: English
[Conference Proceedings]

Towards detection of morphed face images in electronic travel documents
Scherhag, U.; Rathgeb, C.; Busch, C.
13th IAPR Workshop on Document Analysis Systems (DAS), p.1-6
[Conference Proceedings]

Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases
Schneider, Thomas; Tkachenko, Oleksandr
17. Workshop on Privacy in the Electronic Society (WPES’18), p.71-75
Sprache: English
[Conference Proceedings]

Towards Fingerprint Presentation Attack Detection Based on Convolutional Neural Networks and Short Wave Infrared Imaging
Tolosana, R.; Gomez-Barrero, M.; Kolberg, J.; Morales, A.; Busch, C.; Ortega-Garcia, J.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]