Publikationen

Publikationen

TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Ivanko, Natalia Reka; Frieß, Tamara; Mühlhäuser, Max
26th USENIX Security Symposium
[Conference Proceedings]


ID2T - The Intrusion Detection Dataset Generation Toolkit
Garcia Cordero, Carlos; Vasilomanolakis, Emmanouil; Mühlhäuser, Max
Black Hat Europe 2017
[Conference Proceedings]


Measuring privacy in high dimensional microdata collections
Boukoros, Spyros; Katzenbeisser, Stefan
Proceedings of the 12th International Conference on Availability, Reliability and Security
[Conference Proceedings]


Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer
Yalame, Mohammad Hossein; Farzam, Mohammad Hossein; Sarmadi, Siavash Bayat
8. International Conference on Applications and Techniques in Information Security (ATIS'17)
[Conference Proceedings]


Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully
Renaud, Karen; Zimmermann, Verena
Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, p.1-9
[Conference Proceedings]


“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, Verena; Gerber, Nina
Human Aspects of Information Security, Privacy and Trust, p.265-283
[Conference Proceedings]


Lessons Learned from Evaluating Eight Password Nudges in the Wild
Renaud, Karen; Maguire, Joseph; Zimmermann, Verena; Draper, Steve
Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, p.25-38
[Conference Proceedings]


Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation
Wiegärtner, Daniel; Reuter, Christian; Müller, Claudia
Mensch & Computer 2017 - Workshopband, p.609-614
[Conference Proceedings]


DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen
Reuter, Christian; Wiegärtner, Daniel; Müller, Claudia
Mensch & Computer 2017: Tagungsband, p.295-298
[Conference Proceedings]


Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
Reuter, Christian; Pätsch, Katja; Runft, Elena
Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), p.649-663
[Conference Proceedings]


4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
Reuter, Christian; Mentler, Tilo; Geisler, Stefan; Herczeg, Michael; Ludwig, Thomas; Pipek, Volkmar; Nestler, Simon
Mensch und Computer 2017 - Workshopband, p.5-8
[Conference Proceedings]


Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media
Reuter, Christian; Kaufhold, Marc-André; Steinfort, René
Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management; ISCRAM 2017, p.583-591
[Conference Proceedings]


Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing Vol. 1 Issue CSCW, p.1-19
[Journal Article, Conference Proceedings]


Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
Reuter, Christian; Kaufhold, Marc-André; Leopold, Inken; Knipp, Hannah
Proceedings of the 25th European Conference on Information Systems (ECIS), p.2187-2201
[Conference Proceedings]


Informing the Population: Mobile Warning Apps
Reuter, Christian; Kaufhold, Marc-André; Leopold, Inken; Knipp, Hannah
Risk and Crisis Communication in Disaster Prevention and Management, p.31-41
[Conference Proceedings]


Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern
Reuter, Christian; Kaufhold, Marc-André; Klös, Jonas
Mensch & Computer: Workshopband, p.33-41
[Conference Proceedings]


IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response
Pottebaum, Jens; Erfurth, Christian; Reuter, Christian
INFORMATIK 2017, p.1281-1282
[Conference Proceedings]


The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community
Carvalho, Aparecido Fabiano Pinatti de; Saeed, Saqib; Reuter, Christian; Wulf, Volker
International reports on socio-informatics, p.41-47
[Conference Proceedings, Journal Article]


Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel
Leopold, Inken; Reuter, Christian
Mensch und Computer 2017 Tagungsband, p.361-364
[Conference Proceedings]


Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien
Kaufhold, Marc-André; Reuter, Christian; Stefan, Marvin
Mensch und Computer 2017 - Workshopband, p.51-58
[Conference Proceedings]


Social Media Analytics: Eine Marktstudie im Krisenmanagement
Kaufhold, Marc-André; Reuter, Christian; Ludwig, Thomas; Scholl, Simon
INFORMATIK 2017, p.1325-1338
[Conference Proceedings]


The Impact of Social Media for Emergency Services: A Case Study with the Fire Department Frankfurt
Kaufhold, Marc-André; Reuter, Christian
Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management; ISCRAM 2017 Agility is coming : mines Albi, p.603-612
[Conference Proceedings]


LO-FAT: Low-Overhead Control Flow ATtestation in Hardware
Dessouky, Ghada; Zeitouni, Shaza; Nyman, Thomas; Paverd, Andrew; Davi, Lucas; Koeberl, Patrick; Asokan, N.; Sadeghi, Ahmad-Reza
54th Design Automation Conference (DAC'17)
[Conference Proceedings]


One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet
Shulman, Haya; Waidner, Michael
Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, p.131-144
[Conference Proceedings]


Internet-Wide Study of DNS Cache Injections
Klein, Amit; Shulman, Haya; Waidner, Michael
IEEE International Conference on Computer Communications (INFOCOM)
[Conference Proceedings]


Counting in the Dark: Caches Discovery and Enumeration in the Internet
Klein, Amit; Shulman, Haya; Waidner, Michael
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Conference Proceedings]


Are We There Yet? On RPKIs Deployment and Security
Cohen, Avichai; Gilad, Yossi; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Network and Distributed Systems Security (NDSS)
[Conference Proceedings]


A Parallel Variant of LDSieve for the SVP on Lattices
Mariano, Artur; Laarhoven, Thijs; Bischof, Christian
2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)
[Conference Proceedings]


LO-FAT: Low-Overhead Control Flow ATtestation in Hardware
Asokan, N.; Davi, Lucas; Dessouky, Ghada; Koeberl, Patrick; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Zeitouni, Shaza
54th Design Automation Conference (DAC'17)
[Conference Proceedings]


CodeMatch: Obfuscation Won’t Conceal Your Repackaged App
Glanz, Leonid; Amann, Sven; Eichberg, Michael; Reif, Michael; Hermann, Ben; Lerch, Johannes; Mezini, Mira
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, p.638-648
[Conference Proceedings]