Publikationen

Publikationen

Attack Surface Assessment for Cyber­security Engineering in the Automotive Domain
Christian Plappert and Daniel Zelle and Henry Gadacz and Roland Rieke and Dirk Scheuermann and Christoph Krauß
29th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP
[Conference Proceedings]


Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Diethelm Bienhaus and Andreas Ebner and Lukas Jäger and Roland Rieke and Christoph Krauß
Si­mu­la­tion Modelling Practice and Theory, Vol.109, p.9
[Journal Article]


Microgrid Systems: Towards a Technical Performance Assessment Frame
Sophie Marchand and Cristian Monsalve and Thorsten Reimann and Wolfram Heckmann and Jakob Ungerland and Hagen Lauer and Stephan Ruhe and Christoph Krauß
Energies, Vol.14, p.23
[Journal Article]


Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel and Lauser, Timm and Kern, Dustin and Krauß, Christoph
The 16th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis
Yannick Chevalier and Florian Fenzl and Maxim Kolomeets and Roland Rieke and Andrey Chechulin and Christoph Krauß
Informatics and Automation, Vol.20, p.845-868
[Journal Article]


Implementing a Security Architecture for Safety-Critical Railway Infrastructure
Eckel, Michael and Kuzhiyelil, Don and Krauß, Christoph and Zhdanova, Maria and Katzenbeisser, Stefan and Cosic, Jasmin and Drodt, Matthias and Pitrolle, Jean-Jacques
International Symposium on Secure and Private Execution Environment Design (SEED), p.215-226
[Conference Proceedings]


Analysis of E-Mobility-Based Threats to Power Grid Resilience
Kern, Dustin and Krauß, Christoph
Computer Science in Cars Symposium
[Conference Proceedings]


Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte
A. Zeier and A. Wiesmaier and A. Heinemann
Tagungsband zum 17. Deutschen IT-Sicherheitskongress, p.381 – 391
[Conference Proceedings]


Hornung/Schallbruch (Hrsg.): IT-Sicherheitsrecht. Praxishandbuch.
Marian Margraf and Andreas Heinemann
[Book Article]


On the State of Post-Quantum Cryptography Migration
Nouri Alnahawi and Alexander WiesmaierAND Tobias Grasmeyer and Julian Geißler and Alexander Zeier and Pia Bauspieß and Andreas Heinemann
INFORMATIK 2021 — PQKP-Workshop, p.907-941
[Conference Proceedings]


Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview
Tim Bender and Rolf Huesmann and Andreas Heinemann
ARES 2021, SSC Workshop: The 16th International Conference on Availability, Reliability and Security, Virtual Event, August 17-20, 2021
[Conference Proceedings]


It is not as simple as that: Playing out password security trainings in order to nudge password changes
Fabian Sterk and Andreas Heinemann
EICC '21: European Interdisciplinary Cyber­security Conference, Virtual Event, Romania, November 10-11, 2021, p.20–25
[Conference Proceedings]


On the Applicability of Synthetic Data for Face Recognition
H. Zhang and M. Grimmer and R. Raghavendra and K. Raja and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Single Morphing Attack Detection Using Feature Selection and Visualization Based on Mutual Information
J. Tapia and C. Busch
IEEE Access, Vol.9, p.167628–167641
[Journal Article]


Semantic Segmentation of Periocular Near-Infra-Red Eye Images Under Alcohol Effects
J. Tapia and E.Lopez-Droguett and A. Valenzuela and D. Benalcazar and L. Causa and C. Busch
IEEE Access
[Journal Article]


NIR Iris Challenge Evaluation in Non-cooperative Environments: Segmentation and Localization
C. Wang and J. Tapia
Proc. of the 2021 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks
J. Tapia, S. Gonzalez and C. Busch
IEEE Trans. on Information Forensics and Security, Vol.17, p.42–52
[Journal Article]


Image Quality Assessment on Identity Documents
C. Yanez and J. Tapia
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5
[Conference Proceedings]


Face Image Quality Assessment: A Literature Survey
T. Schlett and C. Rathgeb and O. Henniger and J. Galbally and J. Fierrez and C. Busch
ACM Computing Surveys (CSUR)
[Journal Article]


Deep learning-based single image face depth data enhancement
T. Schlett and C. Rathgeb and C. Busch
Computer Vision and Image Understanding (CVIU), Vol.210
[Journal Article]


Impact of Doppelgängers on Face Recognition: Database and Evaluation
C. Rathgeb and P. Drozdowski and M. Obel and A. Dörsch and F. Stockhardt and N. E. Haryanto and K. Bernardo and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]


An Overview of touchless 2D Fingerprint Recognition
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
EURASIP Journal on Image and Video Processing (JIVP)
[Journal Article]


Stable Hash Generation for Efficient Privacy-Preserving Face Identification
D. Osorio-Roig and C. Rathgeb and P Drozdowski and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.4, p.333–348
[Journal Article]


NFIQ 2 NIST Fingerprint Image Quality
E. Tabassi and M. Olsen and O. Bausinger and C. Busch and A. Figlarz and G. Fiumara and O. Henniger and J. Merkle and T. Ruhland and C. Schiel and M. Schwaiger
[Report]


Voice biometrics: how the technology is standardized
A. Nautsch and C. Busch
Voice Biometrics: Technology, trust and security, p.139–162


Morphing Attack Detection: A Fusion Approach
S. Lorenz and U. Scherhag and C. Rathgeb and C. Busch
2021 IEEE 24th Intl. Conf. on Information Fusion (FUSION), p.703–709
[Conference Proceedings]


Security Enhancement and Privacy Protection for Biometric Systems
J. Kolberg


On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
J. Kolberg and D. Gläsner and R. Breithaupt and M. Gomez-Barrero and J. Reinhold and A. von Twickel and C. Busch
Sensors, Vol.21
[Journal Article]


Differential Anomaly Detection for Facial Images
M. Ibsen and L. J. Gonzalez-Soler and C. Rathgeb and P. Drozdowski and M. Gomez-Barrero and C. Busch
IEEE Intl. Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]


Generation of Non-Deterministic Synthetic Face Datasets Guided by Identity Priors
M. Grimmer and H. Zhang and R. Raghavendra and K. Raja and C. Busch
https://www.ntnu.edu/nikt2021
[Journal Article]