Publications
Publications
Anwendungsszenarien und Bedenken beim Einsatz Künstlicher Intelligenz in der öffentlichen Verwaltung
Heeremann, Wendy; Abagnale, Giusi
[Journal Article]
Application layer denial-of-service attacks and defense mechanisms: A survey
Tripathi, N.; Hubballi, N.
[Journal Article]
Recognition of objects from looted excavations by smartphone app and deep learning
Berchtold, Waldemar; Liu, Huajian; Bugert, Simon; Yannikos, York; Wang, Jingcun; Heeger, Julian; Steinebach, Martin; Frühwein, Marco
Conference "Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications" 2022
[Journal Article]
Robust face recognition: How much face is needed?
Bunzel, Niklas
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]
A survey on Bluetooth Low Energy security and privacy
Cäsar, Matthias; Pawelke, Tobias; Steffan, Jan; Terhorst, Gabriel
[Journal Article]
Learning classical readout quantum PUFs based on single-qubit gates
Pirnay, Niklas; Pappa, Anna; Seifert, Jean-Pierre
[Journal Article]
NoiseSeg: An image splicing localization fusion CNN with noise extraction and error level analysis branches
Gotkowski, Karol; Liu, Huajian; Steinebach, Martin
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]
On the Benefits of Joint Optimization of Reconfigurable CDN-ISP Infrastructure
Zerwas, Johannes; Poese, Ingmar; Schmid, Stefan; Blenk, Andreas
[Journal Article]
Smartphone-supported integrity verification of printed documents
Berchtold, Waldemar; El-Soufi, Dani; Steinebach, Martin
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]
Image montage detection based on image segmentation and robust hashing techniques
Steinebach, Martin; Berwanger, Tiberius; Liu, Huajian
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]
Cultural assets identification using transfer learning
Burgert, Simon; Liu, Huajian; Berchtold, Waldemar; Steinebach, Martin
Conference "Imaging and Multimedia Analytics at the Edge" 2022
[Journal Article]
An Introduction to the exFAT File System and How to Hide Data Within
Heeger, Julian; Yannikos, York; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2021
[Journal Article]
Similarity Analysis of Single-Vendor Marketplaces in the Tor-Network
Platzer, Florian; Brenner, Fabian; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2021
[Journal Article]
Kontrollen bei Auftragsverarbeitern
Durmus, Erdem; Engelhardt, Jens; Selzer, Annika
[Journal Article]
Technologie- und Securityprognose System Bahn - Bedrohungen rechtzeitig erkennen
Heinrich, Markus; Iffländer, Lukas; Scheuermann, Dirk; Katzenbeißer, Stefan; Unger, Simon
[Journal Article]
ML-basierte Unterstützung von Lösch- und Aufbewahrungspflichten
Kunz, Thomas; Waldmann, Ulrich
[Journal Article]
IT and more: Anonymisierung unstrukturierter Daten
Steinebach, Martin; Vogel, Inna
[Journal Article]
Auswahl cloudbasierter Dienste
Geissler, Ines; Pordesch, Ulrich; Selzer, Annika; Wilmer, Thomas
[Journal Article]
Sicherheitsherausforderungen für Smart-City-Infrastrukturen
Zimmermann, Verena; Haunschild, Jasmin; Unden, Marita; Gerber, Paul; Gerber, Nina
Wirtschaftsinformatik & Management, p.119-126
[Journal Article]
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management
Reuter, Christian; Pottebaum, Jens
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.v-viii
[Journal Article]
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
BBK Bevölkerungsschutz, p.22-24
[Journal Article]
Business Continuity Management in Micro Enterprises: Perception, Strategies, and Use of ICT
Kaufhold, Marc-André; Riebe, Thea; Reuter, Christian; Hester, Julian; Jeske, Danny; Knüver, Lisa; Richert, Viktoria
International Journal of Information Systems for Crisis Response and Management, p.1-19
[Journal Article]
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community
Carvalho, Aparecido Fabiano Pinatti de; Saeed, Saqib; Reuter, Christian; Wulf, Volker
International reports on socio-informatics, p.41-47
[Journal Article]
An Attack on Facial Soft-biometric Privacy Enhancement
Osorio-Roig, D.; Rathgeb, C.; Drozdowski, P; Terhörst, P.; Štruc, V.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Zelle, Daniel; Plappert, Christian; Rieke, Roland; Scheuermann, Dirk; Krauß, Christoph
Microprocessors and Microsystems, Vol.90, p.104461
[Journal Article]
Integrating Privacy into the Electric Vehicle Charging Architecture
Kern, Dustin; Lauser, Timm; Krauß, Christoph
Proceedings on Privacy Enhancing Technologies, Vol.2022, p.140-158
[Journal Article]
Towards a maturity model for crypto-agility assessment
Hohm, Julian; Heinemann, Andreas; Wiesmaier, Alexander
CoRR, Vol.abs/2202.07645
[Journal Article]
Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations
Nichols, R.; Rathgeb, C.; Drozdowski, P.; Busch, C.
IEEE Access, Vol.10, p.31359-31376
[Journal Article]
Signal-level fusion for indexing and retrieval of facial biometric data
Drozdowski, P.; Stockhardt, F.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.11, p.1-16
[Journal Article]
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study
Qin, L.; Peng, F.; Long, M.; Raghavendra, R.; Busch, C.
ACM Trans. on Privacy and Security, Vol.25, p.1-28
[Journal Article]