Publikationen

Publikationen

On the State of Post-Quantum Cryptography Migration
Alnahawi, N.; Wiesmaier, A.; Graßmeyer, T.; Geißler, J.; Zeier, A.; Bauspieß, P.; Heinemann, A.
INFORMATIK 21 —- PQKP-Workshop, p.907-941
[Conference Proceedings]


On Message-based Consensus and Network Coding
Braun, M.; Wiesmaier, A.; Alnahawi, N.; Geißler, J.
NoF 2021 —- 12th International Conference on Network of the Future
[Conference Proceedings]


Attack Surface Assessment for Cyber­security Engineering in the Automotive Domain
Plappert, Christian; Zelle, Daniel; Gadacz, Henry; Rieke, Roland; Scheuermann, Dirk; Krauß, Christoph
29th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP
[Conference Proceedings]


Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Bienhaus, Diethelm; Ebner, Andreas; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Si­mu­la­tion Modelling Practice and Theory, Vol.109, p.9
[Journal Article]


Microgrid Systems: Towards a Technical Performance Assessment Frame
Marchand, Sophie; Monsalve, Cristian; Reimann, Thorsten; Heckmann, Wolfram; Ungerland, Jakob; Lauer, Hagen; Ruhe, Stephan; Krauß, Christoph
Energies, Vol.14, p.23
[Journal Article]


Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel; Lauser, Timm; Kern, Dustin; Krauß, Christoph
The 16th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis
Chevalier, Yannick; Fenzl, Florian; Kolomeets, Maxim; Rieke, Roland; Chechulin, Andrey; Krauß, Christoph
Informatics and Automation, Vol.20, p.845-868
[Journal Article]


Implementing a Security Architecture for Safety-Critical Railway Infrastructure
Eckel, Michael; Kuzhiyelil, Don; Krauß, Christoph; Zhdanova, Maria; Katzenbeisser, Stefan; Cosic, Jasmin; Drodt, Matthias; Pitrolle, Jean-Jacques
International Symposium on Secure and Private Execution Environment Design (SEED), p.215-226
[Conference Proceedings]


Analysis of E-Mobility-Based Threats to Power Grid Resilience
Kern, Dustin; Krauß, Christoph
Computer Science in Cars Symposium
[Conference Proceedings]


Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte
Zeier, A.; Wiesmaier, A.; Heinemann, A.
Tagungsband zum 17. Deutschen IT-Sicherheitskongress, p.381-391
[Conference Proceedings]


Hornung/Schallbruch (Hrsg.): IT-Sicherheitsrecht. Praxishandbuch.
Margraf, Marian; Heinemann, Andreas
[Book Article]


On the State of Post-Quantum Cryptography Migration
Alnahawi, Nouri; Grasmeyer, Alexander WiesmaierAND Tobias; Geißler, Julian; Zeier, Alexander; Bauspieß, Pia; Heinemann, Andreas
INFORMATIK 2021 —- PQKP-Workshop, p.907-941
[Conference Proceedings]


Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview
Bender, Tim; Huesmann, Rolf; Heinemann, Andreas
ARES 2021, SSC Workshop: The 16th International Conference on Availability, Reliability and Security, Virtual Event, August 17-20, 2021
[Conference Proceedings]


It is not as simple as that: Playing out password security trainings in order to nudge password changes
Sterk, Fabian; Heinemann, Andreas
EICC 21: European Interdisciplinary Cyber­security Conference, Virtual Event, Romania, November 10-11, 2021, p.20-25
[Conference Proceedings]


On the Applicability of Synthetic Data for Face Recognition
Zhang, H.; Grimmer, M.; Raghavendra, R.; Raja, K.; Busch, C.
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Single Morphing Attack Detection Using Feature Selection and Visualization Based on Mutual Information
Tapia, J.; Busch, C.
IEEE Access, Vol.9, p.167628-167641
[Journal Article]


Semantic Segmentation of Periocular Near-Infra-Red Eye Images Under Alcohol Effects
Tapia, J.; Lopez-Droguett, E.; Valenzuela, A.; Benalcazar, D.; Causa, L.; Busch, C.
IEEE Access
[Journal Article]


NIR Iris Challenge Evaluation in Non-cooperative Environments: Segmentation and Localization
Wang, C.; Tapia, J.
Proc. of the 2021 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks
J. Tapia, S. Gonzalez; Busch, C.
IEEE Trans. on Information Forensics and Security, Vol.17, p.42-52
[Journal Article]


Image Quality Assessment on Identity Documents
Yanez, C.; Tapia, J.
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]


Face Image Quality Assessment: A Literature Survey
Schlett, T.; Rathgeb, C.; Henniger, O.; Galbally, J.; Fierrez, J.; Busch, C.
ACM Computing Surveys (CSUR)
[Journal Article]


Deep learning-based single image face depth data enhancement
Schlett, T.; Rathgeb, C.; Busch, C.
Computer Vision and Image Understanding (CVIU), Vol.210
[Journal Article]


Impact of Doppelgängers on Face Recognition: Database and Evaluation
Rathgeb, C.; Drozdowski, P.; Obel, M.; Dörsch, A.; Stockhardt, F.; Haryanto, N. E.; Bernardo, K.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]


An Overview of touchless 2D Fingerprint Recognition
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
EURASIP Journal on Image and Video Processing (JIVP)
[Journal Article]


Stable Hash Generation for Efficient Privacy-Preserving Face Identification
Osorio-Roig, D.; Rathgeb, C.; Drozdowski, P; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.4, p.333-348
[Journal Article]


NFIQ 2 NIST Fingerprint Image Quality
Tabassi, E.; Olsen, M.; Bausinger, O.; Busch, C.; Figlarz, A.; Fiumara, G.; Henniger, O.; Merkle, J.; Ruhland, T.; Schiel, C.; Schwaiger, M.
[Report]


Voice biometrics: how the technology is standardized
Nautsch, A.; Busch, C.
Voice Biometrics: Technology, trust and security, p.139-162


Morphing Attack Detection: A Fusion Approach
Lorenz, S.; Scherhag, U.; Rathgeb, C.; Busch, C.
2021 IEEE 24th Intl. Conf. on Information Fusion (FUSION), p.703-709
[Conference Proceedings]


Security Enhancement and Privacy Protection for Biometric Systems
Kolberg, J.


On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
Kolberg, J.; Gläsner, D.; Breithaupt, R.; Gomez-Barrero, M.; Reinhold, J.; von Twickel, A.; Busch, C.
Sensors, Vol.21
[Journal Article]