Publikationen
Publikationen
Die Altersfeststellung in Metaversen nach den Leitlinien zu Art. 28 DSA
Steenbergen, Marina
[Journal Article]
DaV3is: Data Flow-Based Vulnerability Verification Through Visualization
Mertz, Tobias; Reynolds-Ringer, Steven Lamarr; Kohlhammer, Jörn
[Journal Article]
Cybersecurity risk assessment in OT systems using attack graphs
Unger, Simon; Arzoglou, Ektor; Heinrich, Markus; Scheuermann, Dirk; Katzenbeisser, Stefan
[Journal Article]
IT and more: Kennzeichnungspflicht für KI-generierte Inhalte
Wache, Magdalena; Steinebach, Martin; Berchtold, Waldemar
[Journal Article]
Sicherheitsrisiken beim Client-Side-Scanning
Steinebach, Martin
[Journal Article]
Grammar as a behavioral biometric: using cognitively motivated grammar models for authorship verification
Nini, Andrea; Halvani, Oren; Graner, Lukas; Titze, Sophie; Gherardi, Valerio; Ishihara, Shunichi
[Journal Article]
All That Glitters Is Not Gold: RPKI’s Stumbling Speedrun To The Top
Donika Mirdita and Haya Schulmann and Michael Waidner
IEEE Transactions on Dependable and Secure Computing, p.1-12
[Journal Article]
Resilience Meets Security in Cyber-Physical Systems and Critical Infrastructures
Förster, Anna and Hollick, Matthias and Katzenbeisser, Stefan and Krauss, Christoph
Communications of the ACM, Vol.69, p.35–38
[Journal Article]


