Publikationen
Publikationen
Digitalisation and Communication: Societal Trends and the Change in Organisations — Preface
Reuter, Christian; Schultz, Tanjev; Stegbauer, Christian
Digitalisation and Communication: Societal Trends and the Change in Organisations, p.1-1
Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen — Einleitung
Reuter, Christian; Schultz, Tanjev; Stegbauer, Christian
Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen, p.1-1
Fake News und manipulierte Meinungsbildung
Reuter, Christian
Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen, p.15-19
Fake News and the Manipulation of Public Opinion
Reuter, Christian
Digitalisation and Communication: Societal Trends and the Change in Organisations, p.13-16
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Dessouky, Ghada; Gruler, Alexander; Mahmoody, Pouya; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings der 15. Internationalen Tagung Wirtschaftsinformatik 2020 : Entwicklungen, Chancen und Herausforderungen der Digitalisierung : WI 2020 : Zentrale Tracks
[Conference Proceedings]
Financially Backed Covert Security
Faust, Sebastian; Hazay, Carmit; Kretzler, David; Schlosser, Benjamin
International Conference on Practice and Theory of Public-Key Cryptography 2022
[Conference Proceedings]
Time-dependent POVM reconstruction for single-photon avalanche photo diodes using adaptive regularization
Fitzke, Erik; Krebs, Robin; Haase, Thorsten; Mengler, Max; Alber, Gernot; Walther, Thomas
New Journal of Physics
[Journal Article]
Hybrid password meters for more secure passwords – a comprehensive study of password meters including nudges and password information
Zimmermann, Verena; Marky, Karola; Renaud, Karen
Behaviour & Information Technology
[Journal Article]
Nomadic Knowledge Sharing Practices and Challenges: Findings From a Long-Term Case Study
Saeed, Saqib; Pipek, Volkmar; Rohde, Markus; Reuter, Christian; Pinatti de Carvalho, Aparecido Fabiano; Wulf, Volker
IEEE Access, p.63564-63577
[Journal Article]
CiFi: Versatile Analysis of Class and Field Immutability
Roth, Tobias; Helm, Dominik; Reif, Michael; Mezini, Mira
Software Engineering 2022: Fachtagung des GI-Fachbereichs Softwaretechnik, p.81-82
[Conference Proceedings]
Proceedings of the 2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response
2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response
[Conference Proceedings]
On the State of Post-Quantum Cryptography Migration
N. Alnahawi and A. Wiesmaier and T. Graßmeyer and J. Geißler and A. Zeier and P. Bauspieß and A. Heinemann
INFORMATIK'21 — PQKP-Workshop, p.907–941
[Conference Proceedings]
On Message-based Consensus and Network Coding
M. Braun and A. Wiesmaier and N. Alnahawi and J. Geißler
NoF 2021 — 12th International Conference on Network of the Future
[Conference Proceedings]
Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain
Christian Plappert and Daniel Zelle and Henry Gadacz and Roland Rieke and Dirk Scheuermann and Christoph
Krauß
29th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP
[Conference Proceedings]
Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Diethelm Bienhaus and Andreas Ebner and Lukas Jäger and Roland Rieke and Christoph Krauß
Simulation Modelling Practice and Theory, Vol.109, p.9
[Journal Article]
Microgrid Systems: Towards a Technical Performance Assessment Frame
Sophie Marchand and Cristian Monsalve and Thorsten Reimann and Wolfram Heckmann and Jakob Ungerland and Hagen
Lauer and Stephan Ruhe and Christoph Krauß
Energies, Vol.14, p.23
[Journal Article]
Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel and Lauser, Timm and Kern, Dustin and Krauß, Christoph
The 16th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]
Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis
Yannick Chevalier and Florian Fenzl and Maxim Kolomeets and Roland Rieke and Andrey Chechulin and Christoph Krauß
Informatics and Automation, Vol.20, p.845-868
[Journal Article]
Implementing a Security Architecture for Safety-Critical Railway Infrastructure
Eckel, Michael and Kuzhiyelil, Don and Krauß, Christoph and Zhdanova, Maria and Katzenbeisser, Stefan and Cosic, Jasmin and Drodt, Matthias and Pitrolle, Jean-Jacques
International Symposium on Secure and Private Execution Environment Design (SEED), p.215-226
[Conference Proceedings]
Analysis of E-Mobility-Based Threats to Power Grid Resilience
Kern, Dustin and Krauß, Christoph
Computer Science in Cars Symposium
[Conference Proceedings]
Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte
A. Zeier and A. Wiesmaier and A. Heinemann
Tagungsband zum 17. Deutschen IT-Sicherheitskongress, p.381 – 391
[Conference Proceedings]
Hornung/Schallbruch (Hrsg.): IT-Sicherheitsrecht. Praxishandbuch.
Marian Margraf and Andreas Heinemann
[Book Article]
On the State of Post-Quantum Cryptography Migration
Nouri Alnahawi and Alexander WiesmaierAND Tobias Grasmeyer and Julian Geißler and Alexander Zeier and Pia Bauspieß and Andreas Heinemann
INFORMATIK 2021 — PQKP-Workshop, p.907-941
[Conference Proceedings]
Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview
Tim Bender and Rolf Huesmann and Andreas Heinemann
ARES 2021, SSC Workshop: The 16th International Conference on Availability, Reliability and Security, Virtual Event, August 17-20, 2021
[Conference Proceedings]
It is not as simple as that: Playing out password security trainings
in order to nudge password changes
Fabian Sterk and
Andreas Heinemann
EICC '21: European Interdisciplinary Cybersecurity Conference, Virtual
Event, Romania, November 10-11, 2021, p.20–25
[Conference Proceedings]
On the Applicability of Synthetic Data for Face Recognition
H. Zhang and M. Grimmer and R. Raghavendra and K. Raja and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]
Single Morphing Attack Detection Using Feature Selection and Visualization Based on Mutual Information
J. Tapia and C. Busch
IEEE Access, Vol.9, p.167628–167641
[Journal Article]
Semantic Segmentation of Periocular Near-Infra-Red Eye Images Under Alcohol Effects
J. Tapia and E.Lopez-Droguett and A. Valenzuela and D. Benalcazar and L. Causa and C. Busch
IEEE Access
[Journal Article]
NIR Iris Challenge Evaluation in Non-cooperative Environments: Segmentation and Localization
C. Wang and J. Tapia
Proc. of the 2021 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


