Publications
Publications
P4RROT: Generating P4 Code for the Application Layer
Györgyi, Csaba; Schmid, Stefan; Laki, Sándor
[Journal Article]
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
Guo, Qian; Hlauschek, Clemens; Johansson, Thomas; Lahr, Norman; Nilsson, Alexander; Schröder, Robin Leander
[Journal Article]
Complete and Improved FPGA Implementation of Classic McEliece
Chen, Pojen; Chou, Tung; Deshpande, Sanjay; Lahr, Norman; Niederhagen, Ruben; Szefer, Jakub M.; Wang, Wen
[Journal Article]
Optimizing multicast flows in high-bandwidth reconfigurable datacenter networks
Luo, L.; Foerster, K.T.; Schmid, Stefan; Yu, H.
[Journal Article]
Konsequenzen des § 4 TTDSG für die Praxis von Telekommunikationsanbietern
Diel, Sarah; Selzer, Annika
[Journal Article]
Maschinelles Lernen im Jugendschutz
Steinebach, Martin
[Journal Article]
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Zelle, Daniel; Plappert, Christian; Rieke, Roland; Scheuermann, Dirk; Krauß, C.
[Journal Article]
Anwendungsszenarien und Bedenken beim Einsatz Künstlicher Intelligenz in der öffentlichen Verwaltung
Heeremann, Wendy; Abagnale, Giusi
[Journal Article]
Application layer denial-of-service attacks and defense mechanisms: A survey
Tripathi, N.; Hubballi, N.
[Journal Article]
Recognition of objects from looted excavations by smartphone app and deep learning
Berchtold, Waldemar; Liu, Huajian; Bugert, Simon; Yannikos, York; Wang, Jingcun; Heeger, Julian; Steinebach, Martin; Frühwein, Marco
Conference "Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications" 2022
[Journal Article]
Robust face recognition: How much face is needed?
Bunzel, Niklas
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]
A survey on Bluetooth Low Energy security and privacy
Cäsar, Matthias; Pawelke, Tobias; Steffan, Jan; Terhorst, Gabriel
[Journal Article]
Learning classical readout quantum PUFs based on single-qubit gates
Pirnay, Niklas; Pappa, Anna; Seifert, Jean-Pierre
[Journal Article]
NoiseSeg: An image splicing localization fusion CNN with noise extraction and error level analysis branches
Gotkowski, Karol; Liu, Huajian; Steinebach, Martin
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]
On the Benefits of Joint Optimization of Reconfigurable CDN-ISP Infrastructure
Zerwas, Johannes; Poese, Ingmar; Schmid, Stefan; Blenk, Andreas
[Journal Article]
Smartphone-supported integrity verification of printed documents
Berchtold, Waldemar; El-Soufi, Dani; Steinebach, Martin
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]
Image montage detection based on image segmentation and robust hashing techniques
Steinebach, Martin; Berwanger, Tiberius; Liu, Huajian
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]
Cultural assets identification using transfer learning
Burgert, Simon; Liu, Huajian; Berchtold, Waldemar; Steinebach, Martin
Conference "Imaging and Multimedia Analytics at the Edge" 2022
[Journal Article]
An Introduction to the exFAT File System and How to Hide Data Within
Heeger, Julian; Yannikos, York; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2021
[Journal Article]
Similarity Analysis of Single-Vendor Marketplaces in the Tor-Network
Platzer, Florian; Brenner, Fabian; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2021
[Journal Article]
Kontrollen bei Auftragsverarbeitern
Durmus, Erdem; Engelhardt, Jens; Selzer, Annika
[Journal Article]
Technologie- und Securityprognose System Bahn - Bedrohungen rechtzeitig erkennen
Heinrich, Markus; Iffländer, Lukas; Scheuermann, Dirk; Katzenbeißer, Stefan; Unger, Simon
[Journal Article]
ML-basierte Unterstützung von Lösch- und Aufbewahrungspflichten
Kunz, Thomas; Waldmann, Ulrich
[Journal Article]
IT and more: Anonymisierung unstrukturierter Daten
Steinebach, Martin; Vogel, Inna
[Journal Article]
Auswahl cloudbasierter Dienste
Geissler, Ines; Pordesch, Ulrich; Selzer, Annika; Wilmer, Thomas
[Journal Article]