Publikationen

Publikationen

Metrikensysteme als Beitrag zur Umsetzung des risikobasierten Ansatzes
Gärtner, Tanya; Selzer, Annika
[Journal Article]


Personenbezogenheit vs. Anonymität
Stummer, Sarah
[Journal Article]


Digitalisierung in Deutschland: Ein Vergleich zu Südkorea und Singapur
Engelbrecht, Stefan; Gerber, Jens; Gyollai, Michael; Rosch, Philipp; Schulz, Cord C.; Selzer, Annika
[Journal Article]


Ohne Cybersicherheit kein Datenschutz, ohne Datenschutz keine Cybersicherheit?
Boll, Alina
[Journal Article]


Potentials and Limits of Filter Technology for the Regulation of Hate Speech and Fake News
Steinebach, Martin
[Book Article]


Inconsistencies in Darknet Researches
Platzer, Florian; Lux, Alexandra
International Conference on Availability, Reliability and Security 2022
[Journal Article]


Scraping and Analyzing Data of a Large Darknet Marketplace
Yannikos, York; Heeger, Julian; Steinebach, Martin
International Conference on Availability, Reliability and Security 2022
[Journal Article]


Image Hashing Robust Against Cropping and Rotation
Steinebach, Martin; Berwanger, Tiberius; Liu, Huajian
International Conference on Availability, Reliability and Security 2022
[Journal Article]


Deep Fake - Visuelle Manipulation medialer Inhalte
Steinebach, Martin
Tagung "Interkommunale Zusam­men­arbeit (IKZ) im Bereich der Cybersicherheit" 2022
[Conference Paper]


Wie gefährlich ist ChatGPT?
Vogel, Inna; Steinebach, Martin


Wenn aus Worten Bilder werden
Steinebach, Martin
[Journal Article]


Deepfakes Erstellen und Erkennen in Echtzeit
Steinebach, Martin
Hamburger Sicherheitsrechtstag 2022
[Conference Paper]


Detection of deepfakes using background-matching
Blümer, Stefanie; Steinebach, Martin; Frick, Raphael; Bunzel, Niklas
International Symposium on Electronic Imaging 2023
[Journal Article]


Predicting positions of flipped bits in robust image hashes
Hammann, Marius; Steinebach, Martin; Liu, Huajian; Bunzel, Niklas
International Symposium on Electronic Imaging 2023
[Journal Article]


Privacy preserving leak detection in peer-to-peer communication
Heeger, Julian; Bugert, Simon; Berchtold, Waldemar; Gruler, Alexander; Steinebach, Martin
International Symposium on Electronic Imaging 2023
[Journal Article]


Deepfakes, Dall-E & Co.
Frick, Raphael; Steinebach, Martin; Zmudzinski, Sascha
[Journal Article]


Audio captcha breaking and consequences for human users
Oberthür, Fabian; Steinebach, Martin; Battis, Verena
International Symposium on Electronic Imaging 2023
[Journal Article]


Integrity and authenticity verification of printed documents by smartphones
Bugert, Simon; Heeger, Julian; Berchtold, Waldemar
International Symposium on Electronic Imaging 2023
[Journal Article]


Erkennung von Kindesmissbrauch in Medien
Steinebach, Martin
[Journal Article]


Verantwortungsbewusster Umgang mit IT-Sicher­heits­lücken: Problemlagen und Optimierungsoptionen für ein effizientes Zusammenwirken zwischen IT-Sicher­heits­forschung und IT-Verantwortlichen
Wagner, Manuela; Vettermann, Oliver; Arzt, Steven; Brodowski, Dominik; Dickmann, Roman; Golla, Sebastian; Goerke, Niklas; Kreutzer, Michael; Leicht, Maximilian; Obermaier, Johannes; Schink, Marc; Schreiber, Linda; Sorge, Christoph
[Book]


Coverage-Guided Fuzzing of Embedded Systems Leveraging Hardware Tracing
Beckmann, Maximilian; Steffan, Jan
European Symposium on Research in Computer Security 2022
[Conference Paper]


Optimizing multicast flows in high-bandwidth reconfigurable datacenter networks
Luo, L.; Foerster, K.T.; Schmid, Stefan; Yu, H.
[Journal Article]


Security and Trust in Safety Critical Infrastructures
Zhdanova, Maria
[Thesis]


Bootstrapping Cryptography on the Internet
Brandt, Markus
[Thesis]


Security Implications of Insecure DNS Usage in the Internet
Jeitner, Philipp
[Thesis]


Internet-Wide Evaluations of Security and Vulnerabilities
Dai, Tianxiang
[Thesis]


A Post-Quantum Secure Subscription Concealed Identifier for 6G
Ulitzsch, V.Q.; Park, S.; Marzougui, S.; Seifert, Jean-Pierre
Conference on Security and Privacy in Wireless and Mobile Networks 2022
[Conference Paper]


The Hijackers Guide to the Galaxy: Off-Path Taking Over Internet Resources
Dai, Tianxiang; Jeitner, Philipp; Shulman, Haya; Waidner, Michael
[Paper]


Konsequenzen des § 4 TTDSG für die Praxis von Telekommunikationsanbietern
Diel, Sarah; Selzer, Annika
[Journal Article]


Android Data Storage Locations and What App Developers do with it from a Security and Privacy Perspective
Heid, Kris; Tefke, Tobias; Heider, Jens; Staudemeyer, Ralf C.
International Conference on Information Systems Security and Privacy (ICISSP) 2022
[Conference Paper]