Publikationen

Publikationen

Threat Intelligence Application for Cyber Attribution
Riebe, Thea; Kaufhold, Marc-André; Kumar, Tarun; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
Sprache: English
[Conference Proceedings]

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
Weiser, Samuel; Werner, Mario; Brasser, Ferdinand; Malenko, Maja; Mangard, Stefan; Sadeghi, Ahmad-Reza
26th Annual Network & Distributed System Security Symposium (NDSS)
Sprache: English
[Conference Proceedings]

To Detect or not to Detect: The Right Faces to Morph
Damer, Naser; Saladie, Alexandra Moseguí; Zienert, Steffen; Wainakh, Yaza; Kirchbuchner, Florian; Kuijper, Arjan; Terhörst, Philipp
International Conference on Biometrics (ICB) <12, 2019, Crete>
Sprache: English
[Conference Paper]

Too Confident to Care: Investigating Overconfidence in Privacy Decision Making
Wagner, Amina; Mesbah, Neda
European Conference on Information Systems - ECIS 2019
Sprache: English
[Conference Proceedings]

Towards Systematic Design of Collective Remote Attestation Protocols
De Oliveira Nunes, Ivan; Dessouky, Ghada; Ibrahim, Ahmad; Rattanavipanon, Norrathep; Sadeghi, Ahmad-Reza; Tsudik, Gene
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019
Sprache: English
[Conference Proceedings]

Tracking Criminal Events through IoT Devices and an Edge Computing Approach
Tundis, Andrea; Kaleem, Humayun; Mühlhäuser, Max
International Conference on Computer Communication and Networks (ICCCN) <28, 2019, Valencia>
Sprache: English
[Conference Paper]

TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI)
Sprache: English
[Conference Proceedings]

TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI)
Sprache: English
[Conference Proceedings]

Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing
Drozdowski, P.; Rathgeb, C.; Busch, C.
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1-5
[Conference Proceedings]

Unary and Binary Classification Approaches and their Implications for Authorship Verification
Halvani, Oren; Winter, Christian; Graner, Lukas
Sprache: English
[Report, Electronic Publication]

Unsupervised Privacy-enhancement of Face Representations Using Similarity-sensitive Noise Transformations
Terhörst, Philipp; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
Sprache: English
[Journal Article]

Verification in Cyberspace
Reinhold, Thomas; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
Sprache: English

Verschlüsselung in der Cloud
Herfert, Michael; Lange, Benjamin; Spychalski, Dominik
Sprache: German
[Journal Article]

Verwendung computergenerierter Kinderpornografie zu Ermittlungszwecken im Darknet
Wittmer, Sandra; Steinebach, Martin
Gesellschaft für Informatik (GI Fachtagung) <2019, Kassel>
Sprache: German
[Conference Paper, Electronic Publication]

Vision: Shining Light on Smart Homes – Supporting Informed Decision-Making of End Users.
Zimmermann, Verena; Dickhaut, Ernestine; Gerber, Paul; Vogt, Joachim
4th European Workshop on Usable Security (EuroUSEC 2019)
Sprache: English
[Conference Proceedings]

Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
Sprache: English
[Conference Proceedings]

Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
Sprache: English
[Conference Proceedings]

Weary of Watching Out? - Cause and Effect of Security Fatigue
Olt, Christian M.; Mesbah, Neda
European Conference on Information Systems - ECIS 2019
Sprache: English
[Conference Proceedings]

Web Application for Privacy-Preserving Scheduling using Secure Computation
Kiss, Ágnes; Schick, Oliver; Schneider, Thomas
16. International Conference on Security and Cryptography (SECRYPT'19)
Sprache: English
[Conference Proceedings]

Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz
Riebe, Thea; Langer, Amanda; Kaufhold, Marc-André; Kretschmer, Nina Katharina; Reuter, Christian
Mensch und Computer 2019
Sprache: German
[Conference Proceedings]

Why Johnny Fails to Protect his Privacy
Gerber, Nina; Zimmermann, Verena; Volkamer, Melanie
4th European Workshop on Usable Security (EuroUSEC 2019)
Sprache: English
[Conference Proceedings]

X.509-Compliant Hybrid Certificates for the Post-Quantum Transition
Bindel, Nina; Braun, Johannes; Gladiator, Luca; Stöckert, Tobias; Wirth, Johannes
Journal of Open Source Software
Sprache: English
[Journal Article]

Zero-Interaction Security - Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications, p.16-21
Sprache: English
[Journal Article]