Publikationen
Publikationen
Simulating the overload of medical processes due to system failures during a cyberattack
Willing, Markus; Ebbers, Simon; Dresen, Christian; Czolbe, Marc; Saatjohann, Christoph; Schinzel, Sebastian
[Journal Article]
Face Swap Forensics
Steinebach, Martin; Frühwein, Marco
International Symposium on Electronic Imaging 2025
[Journal Article]
Natural Language Watermarking with ChatGPT
Steinebach, Martin; Frick, Raphael
International Symposium on Electronic Imaging 2025
[Journal Article]
Identification of Cultural Artifacts using Deep Learning
Liu, Huajian; Yang, Xiaoying; Frick, Raphael; Steinebach, Martin
International Symposium on Electronic Imaging 2025
[Journal Article]
Automated Monitoring of Stolen Cultural Artifacts on Online Marketplaces
Liu, Huajian; Yannikos, York; Heeger, Julian; Bugert, Simon; Berchtold, Waldemar; Steinebach, Martin
International Symposium on Electronic Imaging 2025
[Journal Article]
Sicherheitsanforderungen an KI-Systeme
Halvani, Oren; Müller, Luca
[Journal Article]
Erkennung von Desinformationen
Steinebach, Martin
[Journal Article]
Datenschutz-Vorsorge: Schritte 3-6
Boll, Alina
[Journal Article]
Zur Strafbarkeit von Datenfunden im Darknet
Kriegel, Jessica; Dejam, Jubin; Durth, Hanno; Franke, Florian; Hemkens, Wolfram
[Journal Article]
Integration der Compliance by Design-Anforderungen in die (agile) Softwareentwicklung
Appelt, Dominik
[Journal Article]
Der gläserne Mitarbeiter - Spannungsfeld Standortdaten
Selzer, Annika; Enzmann, Matthias
[Journal Article]
Challenges for a Taxonomy of Cyber Defence in International Law
Gärtner, Tanya
[Journal Article]
Die rechtskonforme Veröffentlichung von Forschungsdaten
Rudolph, Louisa
[Journal Article]
The Data Protection Preventive Assessment (DP-PA): Proposal for a New Instrument in Data Protection Law. Practitioners’ Corner
Boll, Alina; Selzer, Annika
[Journal Article]
Anonymität und deren Verifikation
Stummer, Sarah; Hähle, Phillip
[Journal Article]
Von Privacy by Design zu Compliance by Design
Appelt, Dominik
[Journal Article]
Medizinische digitale Zwillinge
Kriegel, Jessica; Enzmann, Matthias; Wolf, Ruben
[Journal Article]
Cybersicherheitsforschung
Selzer, Annika; Buchner, Benedikt
[Journal Article]
Mehr Rechtssicherheit für die Cybersicherheitsforschung!
Selzer, Annika; Buchner, Benedikt
[Journal Article]
Gute Praktiken zur Offenlegung von Cybersicherheitsschwachstellen
Schreiber, Linda; Kreutzer, Michael; Arzt, Steven
[Journal Article]
Datenschutz und Informationssicherheit - Mehrwert für Nachhaltigkeit (ESG)?
Konstandin-Vogel, Evelyn; Radner, Patrick; Scheben, Barbara; Scheel, Kirstin
[Journal Article]
Illegale Online-"Apotheken"
Sinn, Arndt; Graner, Lukas; Heeger, Julian; Steinebach, Martin; Yannikos, York
[Journal Article]
Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts
Khaloopour, Ladan; Su, Yanpeng; Raskob, Florian; Meuser, Tobias; Bless, Roland; Janzen, Leon; Abedi, Kamyar; Andjelkovic, Marko; Chaari, Hekma; Chakraborty, Pousali; Kreutzer, Michael; Hollick, Matthias; Strufe, Thorsten; Franchi, Norman; Jamali, Vahid
[Journal Article]
Kryptoagilität
Kreutzer, Michael; Wolf, Leonie; Waidner, Michael
[Journal Article]
An in-principle super-polynomial quantum advantage for approximating combinatorial optimization problems via computational learning theory
Pirnay, Niklas; Ulitzsch, Vincent Quentin; Wilde, Frederik; Eisert, Jens; Seifert, Jean-Pierre
[Journal Article]
The Time Complexity of Consensus Under Oblivious Message Adversaries
Winkler, Kyrill; Paz, Ami; Galeana, Hugo Rincon; Schmid, Stefan; Schmid, Ulrich
[Journal Article]
A context-aware on-board intrusion detection system for smart vehicles
Micale, Davide; Matteucci, Ilaria; Fenzl, Florian; Rieke, Roland; Patanè, Giuseppe
[Journal Article]
ZPredict: ML-Based IPID Side-channel Measurements
Schulmann, Haya; Zhao, Shujie
[Journal Article]
Wie Deutschland zur Cybernation wird
Schulmann, Haya; Waidner, Michael
[Journal Article]
Rechtliche Folgen und Risiken der De-Anonymisierung
Stummer, Sarah
[Journal Article]