Publications

Publications

On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas
Biselli, Tom; Steinbrink, Enno; Herbert, Franziska; Schmidbauer-Wolf, Gina M.; Reuter, Christian
Proceedings on Privacy Enhancing Technologies, Vol.4, p.645-669
[Conference Proceedings]


Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D
Schmid, Stefka; Riebe, Thea; Reuter, Christian
Science and Engineering Ethics
[Journal Article]


LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios
Kuntke, Franz; Romanenko, Vladimir; Linsner, Sebastian; Steinbrink, Enno; Reuter, Christian
Transactions on Emerging Telecommunications Technologies
[Journal Article]


A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication
Eyilmez, Kaan; Basyurt, Ali Sercan; Stieglitz, Stefan; Fuchss, Christoph; Kaufhold, Marc-André; Reuter, Christian; Mirabaie, Milad
ACIS 2022 Proceedings
[Conference Proceedings]


Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software
Reinhold, Thomas; Reuter, Christian
IEEE Transactions on Technology and Society, p.226-239
[Journal Article]


Zwischen Destabilisierung und der Ermöglichung von Resilienz: Perspektiven aus den Technikwissenschaften, den Sozialwissenschaften und den Rechts­wis­sen­schaf­ten
Reuter, Christian; Göttsche, Malte; Frieß, Friederike; Thielbörger, Pierre; Vüllers, Johannes
Die Friedens-Warte : journal of international peace and organization, p.241-243
[Journal Article]


Trustworthy and Explainable: A European Vision of (Weaponised) Artificial Intelligence
Schmid, Stefka
Die Friedens-Warte : journal of international peace and organization, p.290-315
[Journal Article]


A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead
Reuter, Christian; Lo Iacono, Luigi; Benlian, Alexander
Behaviour & Information Technology, p.2035-2048
[Journal Article]


U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance
Riebe, Thea; Kuehn, Philipp; Imperatori, Philipp; Reuter, Christian
European Journal for Security Research, p.39-65
[Journal Article]


Zur Schnittmenge von Informatik mit Friedens- und Sicherheitsforschung: Erfahrungen aus der interdisziplinären Lehre in der Friedensinformatik
Reuter, Christian; Riebe, Thea; Haunschild, Jasmin; Reinhold, Thomas; Schmid, Stefka
Zeitschrift für Friedens- und Konfliktforschung, p.129-140
[Journal Article]


Using Digitally Mediated Methods in Sensitive Contexts: A Threat Analysis and Critical Reflection on Security, Privacy, and Ethical Concerns in the Case of Afghanistan
Guntrum, Laura Gianna; Güldenring, Benjamin; Kuntke, Franz; Reuter, Christian
Zeitschrift für Friedens- und Konfliktforschung, p.95-128
[Journal Article]


Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations
Hartwig, Katrin; Reuter, Christian
Behaviour & Information Technology, p.1357-1380
[Journal Article]


Resilience in Agriculture: Communication and Energy Infrastructure Dependencies of German Farmers
Kuntke, Franz; Linsner, Sebastian; Steinbrink, Enno; Franken, Jonas; Reuter, Christian
International Journal of Disaster Risk Science, p.214-229
[Journal Article]


Remotely Accessing the Field and Building Trust with Distant Sources. Perspectives from Journalism Practice for Ethnographic Research
Guntrum, Laura Gianna; Keßler, Mira; Patel, Jignesh; Varfolomeeva, Anna
Global Media Journal - German Edition
[Journal Article]


Book Review: Artificial Intelligence and The Future of Warfare: The USA China and Strategic Stability. Johnson,J. Manchester: University Press. (2021)
Reinhold, Thomas; Reuter, Christian
Zeitschrift für Außen- und Sicherheitspolitik, p.353-355
[Journal Article]


Mensch und Computer 2022: Facing Realities - Tagungsband
[Conference Proceedings]


A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ Attitudes Towards Social Media for Public Safety and Security
Reuter, Christian
[Book]


Für eine umfassende, globale und aktive Abrüstungs- und Rüstungskontrollpolitik
Meier, Oliver; Brzoska, Michael; Ferl, Anna-Katharina; Hach, Sascha; Bayer, Markus; Mutschler, Max; Prem, Berenike; Reinhold, Thomas; Schmid, Stefka; Schwarz, Matthias
[Report]


Conference Proceedings : Science, Peace, Security '21 : The Impact of new Technologies: Destabilizing or Enabling Resilience? : 8-10 September 2021
Göttsche, Malte; Bauer, Sibylle; Dahlmann, Anja; Frieß, Friederike; Lentzos, Filippa; Neuneck, Götz; Niemeyer, Irmgard; Riebe, Thea; Silomon, Jantje; Reuter, Christian; Brochhaus, Jakob; Rademacher, Lukas
[Conference Proceedings]


The Digital Divide in State Vulnerability to Submarine Communications Cable Failure
Franken, Jonas; Reinhold, Thomas; Reichert, Lilian; Reuter, Christian
International Journal of Critical Infrastructure Protection
[Journal Article]


CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain
Bayer, Markus; Kuehn, Philipp; Shanehsaz, Ramin; Reuter, Christian
[Report]


Clustering of Threat Information to Mitigate Information Overload for Computer Emergency Response Teams
Kuehn, Philipp; Kerk, Moritz; Wendelborn, Marc; Reuter, Christian
[Report]


Are thermal attacks a realistic threat? Investigating the preconditions of thermal attacks in users’ daily lives
Bekaert, Paul; Alotaibi, Norah; Mathis, Florian; Gerber, Nina; Rafferty, Aidan Christopher; Khamis, Mohamed; Marky, Karola
Proceedings of the 12th Nordic Conference on Human-Computer Interaction, p.1-9
[Conference Proceedings]


Website operators are not the enemy either - Analyzing options for creating cookie consent notices without dark patterns
Stöver, Alina; Gerber, Nina; Cornel, Christin; Henz, Mona; Marky, Karola; Zimmermann, Verena; Vogt, Joachim
Mensch und Computer 2022 - Workshopband
[Conference Proceedings]


Autonomous Driving - Analysing the Impact of Resilience Engineering Features in Smart Car Interfaces
Pasnicu, Otilia; Zmmermann, Verena; Gerber, Nina; Cardoso, Sarah
Mensch und Computer 2022: Facing Realities - Tagungsband, p.545-549
[Conference Proceedings]


You offer privacy like you offer tea: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households
Marky, Karola; Gerber, Nina; Pelzer, Michelle Gabriela; Khamis, Mohamed; Mühlhäuser, Max
Proceedings on Privacy Enhancing Technologies (PoPETs), p.400-420
[Journal Article]


Nostradamus Goes Quantum
Benedikt, Barbara Jiabao; Fischlin, Marc; Huppert, Moritz
Advances in Cryptology - ASIACRYPT 2022, p.583-613
[Conference Proceedings]


Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels
Degabriele, Jean Paul; Karadžić, Vukašin
Advances in Cryptology - CRYPTO 2022, p.264-295
[Conference Proceedings]


On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP
Krämer, Juliane; Struck, Patrick
Post-Quantum Cryptography, p.286-306
[Conference Proceedings]


A Random Oracle for All of Us
Fischlin, Marc; Rohrbach, Felix; Schmalz, Tobias
Progress in Cryptology - AFRICACRYPT 2022, p.469-489
[Conference Proceedings]