Publications
Publications
An Overview of the Botnet Simulation Framework
Böck, Leon; Shankar, Karuppayah; Mühlhäuser, Max; Emmanouil, Vasilomanolakis
The Journal on Cybercrime & Digital Investigations, p.1-10
[Journal Article]
Control Behavior Integrity for Distributed Cyber-Physical Systems
Adepu, Sridhar; Brasser, Ferdinand; Garcia, Luis; Rodler, Michael; Davi, Lucas; Sadeghi, Ahmad-Reza; Zonouz, Saman A.
2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), p.1-15
[Conference Proceedings]
Benefits of formalized computational modeling for understanding user behavior in online privacy research
Schürmann, Tim; Gerber, Nina; Gerber, Paul
Journal of Intellectual Capital, p.431-458
[Journal Article]
Has the GDPR hype affected users’ reaction to cookie disclaimers?
Kulyk, Oksana; Gerber, Nina; Hilt, Annika; Volkamer, Melanie
Journal of Cybersecurity
[Journal Article]
LegIoT: Ledgered Trust Management Platform for IoT
Neureither, Jens; Dmitrienko, Alexandra; Koisser, David; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Computer Security - ESORICS 2020, p.377-396
[Conference Proceedings]
Handbook of Vascular Biometrics
Uhl, A.; Busch, C.; Marcel, S.; Veldhuis, R.
[Book]
Biometric Presentation Attack Detection: Beyond the Visible Spectrum
Tolosana, R.; Gomez-Barrero, M.; Busch, C.; Ortega-Garcia, J.
IEEE Trans. on Information Forensics and Security, Vol.15, p.1261-1275
[Journal Article]
An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris
Tapia, J.; Gomez-Barrero, M.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]
Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach
Scherhag, U.; Kunze, J.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.9, p.278-289
[Journal Article]
Morphing Attack Detection using Laplace operator based features
Scherhag, U.; Fischer, D.; Isadskiy, S.; Otte, J.; Busch, C.
in Proc. Norwegian Information Security Conf. (NISK)
[Journal Article]
Deep Face Representations for Differential Morphing Attack Detection
Scherhag, U.; Rathgeb, C.; Merkle, J.; Busch, Christoph
IEEE Trans. on Information Forensics and Security
[Journal Article]
Detection of Makeup Presentation Attacks based on Deep Face Representations
Rathgeb, C.; Drozdowski, P.; Busch, C.
Proc. Int. Conf. on Pattern Recognition (ICPR), p.1-6
[Conference Proceedings]
Makeup Presentation Attacks: Review and Detection Performance Benchmark
Rathgeb, C.; Drozdowski, P.; Busch, C.
IEEE Access, Vol.8, p.224958-224973
[Journal Article]
Morphing Attack Detection - Database, Evaluation Platform and Benchmarking
Raja, K.; Ferrara, M.; Franco, A.; Spreeuwers, L.; Batskos, I.; others
IEEE Trans. on Information Forensics and Security
[Journal Article]
Morphing-Angriffe - Ein Sicherheitsrisiko für Gesichtserkennungssysteme
Merkle, J.; Rathgeb, C.; Scherhag, U.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.38-42
[Journal Article]
Towards Measuring the Amount of Discriminatory Information in Finger Vein Biometric Characteristics Using a Relative Entropy Estimator
ca, V. Krivoku\; Gomez-Barrero, M.; Marcel, S.; Rathgeb, C.; Busch, C.
[Book Article]
Presentation Attack Detection for Finger Recognition
Kolberg, J.; Gomez-Barrero, M.; Venkatesh, S.; Raghavendra, R.; Busch, C.
Handbook of Vascular Biometrics, p.435-463
Analysing the Performance of LSTMs and CNNs on 1310 nm Laser Data for Fingerprint Presentation Attack Detection
Kolberg, J.; Vasile, A. C.; Gomez-Barrero, M.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1-7
[Conference Proceedings]
Texture-based Presentation Attack Detection for Automatic Speaker Verification
Gonzalez-Soler, L. J.; Patino, J.; Gomez-Barrero, M.; Todisco, M.; Busch, C.; Evans, N.
Proc. Intl. Workshop on Information Forensics and Security (WIFS), p.1-6
[Conference Proceedings]
Evaluating the Sensitivity of Face Presentation Attack Detection Techniques to Images of Varying Resolutions
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]
Reversing the irreversible: A survey on inverse biometrics
Gomez-Barrero, M.; Galbally, J.
Computers & Security, Vol.90
[Journal Article]
Erkennung von Präsentationsangriffen auf Fingerabdruck Systemen
Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.26-31
[Journal Article]
A Novel Approach for Generating Synthetic Datasets for Digital Forensics
Göbel, T.; Schäfer, T.; Hachenberger, J; Türr, J.; Baier, H.
Advances in Digital Forensics XVI, p.73-93
Demographic Bias: A Challenge for Fingervein Recognition Systems?
Drozdowski, P.; Prommegger, B.; Wimmer, G.; Schraml, R.; Rathgeb, C.; Uhl, A.; Busch, C.
European Signal Processing Conf. (EUSIPCO), p.825-829
[Conference Proceedings]
Information-Theoretic Security of Cryptographic Channels
Fischlin, Marc; Günther, Felix; Muth, Philipp
Information and Communications Security, p.295-311
[Conference Proceedings]
Language-Integrated Privacy-Aware Distributed Queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.1-30
[Journal Article]
LeakyPick: IoT Audio Spy Detector
Mitev, Richard; Pazii, Anna; Miettinen, Markus; Enck, William; Sadeghi, Ahmad-Reza
ACSAC '20: Annual Computer Security Applications Conference, p.694-705
[Conference Proceedings]
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic
Nguyen, Thien Duc; Miettinen, Markus; Sadeghi, Ahmad-Reza
MTD'20: Proceedings of the 7th ACM Workshop on Moving Target Defense
[Conference Proceedings]
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild
Lauinger, Johannes; Baumgärtner, Lars; Wickert, Anna-Katharina; Mezini, Mira
Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.410-417
[Conference Proceedings]