Publikationen

Publikationen

Emergency Service Staff and Social Media – A Comparative Empirical Study of the Perception by Emergency Services Members in Europe in 2014 and 2017
Reuter, Christian; Kaufhold, Marc-André; Spahr, Fabian; Spielhofer, Thomas; Hahne, Anna Sophie
International Journal of Disaster Risk Reduction (IJDRR)
Sprache: English
[Journal Article]

Empirical Insights for Designing Information and Communication Technology for International Disaster Response
Stute, Milan; Maass, Max; Schons, Tom; Kaufhold, Marc-André; Reuter, Christian; Hollick, Matthias
International Journal of Disaster Risk Reduction (IJDRR)
Sprache: English
[Journal Article]

Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Krämer, Juliane; Struck, Patrick
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020)
Sprache: English
[Conference Proceedings]

Engineering Privacy-Preserving Machine Learning Protocols
Schneider, Thomas
2020 Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP’20)
Sprache: English
[Conference Proceedings]

Ensuring the Integrity and Security of Network Equipment is Critical in the Fight Against Cyber Attacks
Eckel, Michael; Laffey, Tom
Sprache: English
[Journal Article]

Entanglement-spectrum characterization of ground-state nonanalyticities in coupled excitation-phonon models
Stojanovic, Vladimir M.
Physical Review B
Sprache: English
[Journal Article]

Erkennung gleicher Betreiber
Brenner, Fabian; Steinebach, Martin
Sprache: German
[Master Thesis]

Exploring User Expectations of Proactive AI Systems
Meurisch, Christian; Mihale-Wilson, Cristina; Hawlitschek, Adrian; Giger, Florian; Müller, Florian; Hinz, Oliver; Mühlhäuser, Max
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Sprache: English
[Journal Article]

Fake News Detection by Image Montage Recognition
Steinebach, Martin; Liu, Huajian; Gotkowski, Karol
Sprache: English
[Journal Article, Electronic Publication]

Fake News Spreader Detection on Twitter using Character N-Grams: Notebook for PAN at CLEF 2020
Vogel, Inna; Meghana, Meghana
Conference and Labs of the Evaluation Forum (CLEF) <2020, Online>
Sprache: English
[Conference Paper, Electronic Publication]

File-Sharing and the Darknet
Steinebach, Martin
Sprache: English
[Book Article]

Firmware Insider: Bluetooth Randomness is Mostly Random
Tillmanns, Jörn; Classen, Jiska; Rohrbach, Felix; Hollick, Matthias
14th USENIX Workshop on Offensive Technologies (WOOT 2020)
Sprache: English
[Conference Proceedings]

Fisher Vector Encoding of Dense-BSIF Features for Unknown Face Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG 2020), p.1-11
[Conference Proceedings]

Fusing Iris and Periocular Region for User Verification in Head Mounted Displays
Boutros, Fadi; Damer, Naser; Raja, Kiran; Ramachandra, Raghavendra; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Information Fusion (FUSION) <23, 2020, Online>
Sprache: English
[Conference Paper]

Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Bienhaus, Diethelm; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
International Symposium on Intelligent Distributed Computing (IDC) <13, 2019, St. Petersburg>
Sprache: English
[Conference Paper]

Gruppendynamik in Sozialen Netzwerken - Bestimmung und Vorhersage von Gruppendynamiken auf Grundlage von Daten aus Sozialen Netzwerken
Frenzel, Christoph; Labudde, Dirk
Sprache: German
[Book Article]

Handlungsempfehlungen
Jansen, Carolin; Johannes, Christopher; Krämer, Nicole; Kreutzer, Michael; Löber, Lena Isabell; Rinsdorf, Lars; Roßnagel, Alexander; Schaewitz, Leonie
Sprache: German
[Book Article]

Herstellung und Detektion von Videos und Bildern mit KI und deren Bezug zu Beweismitteln
Woithe, Jennifer; Becker, Sven; Labudde, Dirk
Sprache: German
[Book Article]

Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy
Glanz, Leonid; Müller, Patrick; Baumgärtner, Lars; Reif, Michael; Anthonysamy, Pauline; Mezini, Mira
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, p.694-707
Sprache: English
[Conference Proceedings]

HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria; Heddergott, Ronald
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]

HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria; Heddergott, Ronald
Computer Science in Cars Symposium (CSCS) <4, 2020, Online>
Sprache: English
[Conference Paper, Electronic Publication]

HIP: HSM-based Identities for Plug-and-Charge
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]

HIP: HSM-Based Identities for Plug-and-Charge
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
International Conference on Availability, Reliability and Security (ARES) <15, 2020, Online>
Sprache: English
[Conference Paper]

How to nudge in cyber security
Renaud, Karen; Zimmermann, Verena
Network Security, p.20-20
Sprache: English
[Journal Article]

HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Dessouky, Ghada; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
USENIX Security
Sprache: English
[Conference Proceedings]