Publikationen
Publikationen
Resilience Meets Security in Cyber-Physical Systems and Critical Infrastructures
Förster, Anna and Hollick, Matthias and Katzenbeisser, Stefan and Krauss, Christoph
Communications of the ACM, Vol.69, p.35–38
[Journal Article]
Oil, Vinegar, and Sparks: Key Recovery from UOV via Single Electromagnetic Fault Injection
Fabio Campos and Daniel Hahn and Daniel Könnecke and Marc Stöttinger
Künstliche Intelligenz bei Webanwendungen
Wilmer, Thomas
Datenschutz und Internet
Rechtsgrundlagen der Verarbeitung in der Datenschutz-Grundverordnung
Wilmer, Thomas
Datenschutz und Internet
Grundsätze für die Verarbeitung personenbezogener Daten nach Art. 5 DS-GVO
Wilmer, Thomas
Datenschutz und Internet
TDDDG Telekommunikation-Digitale-Dienste-Datenschutz-Gesetz Kommentar
Riechert, Anne and Wilmer, Thomas and Brock, Marc Oliver and Golland, Alexander and Keppeler, Lutz Martin and Raji, Behrang and Riechert, Anne and Sesing-Wagenpfeil, Andreas and Ströbel, Lukas and Voß, Jan Peter and Wilmer, Thomas
[Book]
Post-Quantum Cryptography in eMRTDs – Evaluating PAKE and PKI for Travel Documents
N. Alnahawi and M. Azouaoui and J. Bos and G. Davies and S. Moon and C. van Vredendaal and A. Wiesmaier
Security Standardisation Research Conference (SSR'25)
[Conference Proceedings]
Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks
Ha The, Viet and Kern, Dustin and Nguyen Tan, Phat and Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1800–1809
[Conference Proceedings]
Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power Grid
Kern, Dustin and Krauß, Christoph and Hollick, Matthias
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1790–1799
[Conference Proceedings]
Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard
Lauser, Timm and Müller, Maximilian and Baumgart, Ingmar and Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1839–1848
[Conference Proceedings]
Streamlining Plug-and-Charge Authorization for Electric Vehicles with OAuth 2 and OpenID Federation
Primbs, Jonas and Kern, Dustin and Menth, Michael and Krauß, Christoph
IEEE Access, Vol.13, p.168711-168731
[Journal Article]
RollCAN – CAN-bus based RollJam-Attack
Hamborg, Jannis and Lauser, Timm and Krauß, Christoph
Proceedings of the 2nd Cyber Security in CarS Workshop
[Conference Proceedings]
Towards a Holistic and Multi-Modal Vehicle Security Monitoring
Yekta, Ali Recai and Spychalski, Dominik and Yekta, Cenk and Heinrich, Markus and Krauß, Christoph and Katzenbeisser, Stefan
Proceedings of the 20th International Conference on Critical Information Infrastructures Security (CRITIS)
[Conference Proceedings]
CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set
Hellemans, Wouter and Hamborg, Jannis and Lauser, Timm and Rabbani, Md Masoom and Preneel, Bart and Krauß, Christoph and Mentens, Nele
Proceedings of the 41st Annual Computer Security Applications Conference (ACSAC)
[Conference Proceedings]
A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?
Henrich, Johanna
and Schmitt, Nicolai
and Alnahawi, Nouri
and Heinemann, Andreas
Information Security, p.107–128
[Conference Proceedings]
Simulation-Based Software Leakage Evaluation for the RISC-V Platform
Schmitt, Nicolai
and Zeitschner, Jannik
and Heinemann, Andreas
Information Security, p.175–195
[Conference Proceedings]
DemoQuanDT: a carrier-grade QKD network
P. Horoschenkoff and J. Henrich and R. Böhn and I. Khan and J. Rödiger and M. Gunkel and M. Bauch and J. Benda and P. Bläcker and E. Eichhammer and U. Eismann and G. Frenck and H. Griesser and W. Jontofsohn and N. Kopshoff and S. Röhrich and F. Seidl and N. Schark and E. Sollner and D. von Blanckenburg and A. Heinemann and M. Stiemerling and M. Gärtner
J. Opt. Commun. Netw., Vol.17, p.743–756
[Journal Article]
Syn-IDPass: Passport Synthetic Dataset for Presentation Attack Detection?
J. E. Tapia and F. Stockhardt and L. J. Gonzalez-Soler and C. Busch
Proc. IEEE Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
Single-morphing attack detection using few-shot learning and triplet-loss
J. E. Tapia and D. Schulz and C. Busch
Neurocomputing
[Conference Proceedings]
Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications
J. E. Tapia and M. Russo and C. Busch
IEEE Access
[Conference Proceedings]
Towards Iris Presentation Attack Detection with Foundation Models
J. E. Tapia and L. J. Gonzalez-Soler and C. Busch
The 19th IEEE International Conference on Automatic Face and Gesture
[Conference Proceedings]
Are Morphed Periocular Iris Images a Threat to Iris Recognition?
J. Tapia, S. Gonzalez, D. Benalcazar and C. Busch
IEEE Trans. on Information Forensics and Security, Vol.20, p.12417-12428
[Journal Article]
Can Foundation Models Predict Fitness for Duty?
J. E. Tapia and C. Busch
The IEEE International Joint Conference on Biometrics (IJCB)
[Conference Proceedings]
Forged Presentation Attack Detection for ID Cards on Remote Verification Systems
J. Tapia and S. Gonzalez
ScienceDirect - Pattern Recognition
[Journal Article]
Are Morphed Periocular Iris Images a Threat to Iris Recognition?
J. Tapia, D. Schulz and C. Busch
IEEE Trans. on Information Forensics and Security, Vol.20, p.12417-12428
[Journal Article]
Classification of Alcohol, Drugs and Sleepiness Condition using Periocular Iris Images to Evaluate Fitness For Duty
J. Tapia and D. Benalcazar and A.Valenzuela and L. Causa and E. Lopez-Droguett and C. Busch
ScienceDirect - Expert Systems with Applications
[Journal Article]
Enhanced Deep Learning DeepFake Detection Integrating Handcrafted Features
A. Hinke-Navarro and M. Nieto-Hidalgo and J. M. Espin and J. E. Tapia
21st International Conference in Computer Analysis of Images and Patterns (CAIP) September 22-25
[Conference Proceedings]
Second Competition on Presentation Attack Detection on ID Card
J. E. Tapia and M. Nieto and J. M. Espin and A. S. Rocamora and J. Barrachina and N. Damer and C. Busch
International Joint Conference in Biometrics (IJCB) 2025
[Conference Proceedings]
Impact and Mitigation of Quality Degradation for Differential Morphing Attack Detection
T. Schlett and C. Rathgeb and J. E. Tapia and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]
Training humans for synthetic face image detection
S. Rehman and E. Meier and M. Ibsen and C. Rathgeb and R. Nichols and C. Busch
Frontiers in Artificial Intelligence, Vol.8, p.1568267
[Journal Article]


