Publications
Publications
Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises
Schmid, Stefka; Hartwig, Katrin; Cieslinski, Robert; Reuter, Christian
Information Systems Frontiers, p.477-499
[Journal Article]
Marionette: Manipulate Your Touchscreen via A Charging Cable
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza
IEEE Transactions on Dependable and Secure Computing
[Journal Article]
Practitioners’ Corner ∙ How Effectively Do Consent Notices Inform Users About the Risks to Their Fundamental Rights?
Grassl, Paul; Gerber, Nina; Max, von Grafenstein
European Data Protection Law Review, p.96-104
[Journal Article]
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Fischlin, Marc; Günther, Felix; Janson, Christian
Journal of Cryptology
[Journal Article]
A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Huss, Sorin; Stein, Oliver
Journal of Low Power Electronics and Applications
[Journal Article]
Data augmentation in natural language processing: a novel text generation approach for long and short text classifiers
Bayer, Markus; Kaufhold, Marc-André; Buchhold, Björn; Keller, Marcel; Dallmeyer, Jörg; Reuter, Christian
International Journal of Machine Learning and Cybernetics, p.135-150
[Journal Article]
Psychotechnik, human factors, engineering psychology, Technikpsychologie — 100 years of interdisciplinary cooperation between engineering and human sciences
Vogt, Joachim; Keil, Udo; Cornel, Christin; Gerber, Nina; Ferreira, Yvonne
Zeitschrift für Arbeitswissenschaft, p.1-6
[Journal Article]
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires
Nieminen, Raine; Schneider, Thomas
Journal of Cryptology
[Journal Article]
Investigating how Users Imagine their Personal Privacy Assistant
Stöver, Alina; Hahn, Sara; Kretschmer, Felix; Gerber, Nina
Proceedings on Privacy Enhancing Technologies (PoPETs), p.384-402
[Journal Article]
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges
Stöver, Alina; Gerber, Nina; Pridöhl, Henning; Maass, Max; Bretthauer, Sebastian; Spiecker gen. Döhmann, Indra; Hollick, Matthias; Herrmann, Dominik
Proceedings on Privacy Enhancing Technologies (PoPETs), p.251-264
[Journal Article]
Don’t accept all and continue: Exploring nudges for more deliberate interaction with tracking consent notices
Gerber, Nina; Stöver, Alina; Peschke, Justin; Zimmermann, Verena
ACM Transactions on Computer-Human Interaction
[Journal Article]
Psychotechnik, human factors, engineering psychology, Technikpsychologie—100 years of interdisciplinary cooperation between engineering and human sciences
Vogt, Joachim; Keil, Udo; Cornel, Christin; Gerber, Nina; Ferreira, Yvonne
Zeitschrift für Arbeitswissenschaft, p.1-6
[Journal Article]
ExTRUST: Reducing exploit stockpiles with a privacy-preserving depletion system for inter-state relationships
Reinhold, Thomas; Kühn, Philipp; Günther, Daniel; Schneider, Thomas; Reuter, Christian
IEEE Transactions on Technology and Society, p.158-170
[Journal Article]
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung
Riebe, Thea; Nordmann, Alfred; Reuter, Christian
Wissenschaft & Frieden, p.60-61
[Journal Article]
Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries”
Schneider, Thomas; Suresh, Ajith; Yalame, Hossein
IEEE Transactions on Information Forensics and Security, p.1407-1409
[Journal Article]
Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden, p.46-48
[Journal Article]
Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André; Spielhofer, Thomas
Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, p.64-66
[Journal Article]
Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D
Schmid, Stefka; Riebe, Thea; Reuter, Christian
Science and Engineering Ethics
[Journal Article]
LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios
Kuntke, Franz; Romanenko, Vladimir; Linsner, Sebastian; Steinbrink, Enno; Reuter, Christian
Transactions on Emerging Telecommunications Technologies
[Journal Article]
Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software
Reinhold, Thomas; Reuter, Christian
IEEE Transactions on Technology and Society, p.226-239
[Journal Article]
Zwischen Destabilisierung und der Ermöglichung von Resilienz: Perspektiven aus den Technikwissenschaften, den Sozialwissenschaften und den Rechtswissenschaften
Reuter, Christian; Göttsche, Malte; Frieß, Friederike; Thielbörger, Pierre; Vüllers, Johannes
Die Friedens-Warte : journal of international peace and organization, p.241-243
[Journal Article]
Trustworthy and Explainable: A European Vision of (Weaponised) Artificial Intelligence
Schmid, Stefka
Die Friedens-Warte : journal of international peace and organization, p.290-315
[Journal Article]
A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead
Reuter, Christian; Lo Iacono, Luigi; Benlian, Alexander
Behaviour & Information Technology, p.2035-2048
[Journal Article]
U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance
Riebe, Thea; Kuehn, Philipp; Imperatori, Philipp; Reuter, Christian
European Journal for Security Research, p.39-65
[Journal Article]
Zur Schnittmenge von Informatik mit Friedens- und Sicherheitsforschung: Erfahrungen aus der interdisziplinären Lehre in der Friedensinformatik
Reuter, Christian; Riebe, Thea; Haunschild, Jasmin; Reinhold, Thomas; Schmid, Stefka
Zeitschrift für Friedens- und Konfliktforschung, p.129-140
[Journal Article]
Using Digitally Mediated Methods in Sensitive Contexts: A Threat Analysis and Critical Reflection on Security, Privacy, and Ethical Concerns in the Case of Afghanistan
Guntrum, Laura Gianna; Güldenring, Benjamin; Kuntke, Franz; Reuter, Christian
Zeitschrift für Friedens- und Konfliktforschung, p.95-128
[Journal Article]
Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations
Hartwig, Katrin; Reuter, Christian
Behaviour & Information Technology, p.1357-1380
[Journal Article]
Resilience in Agriculture: Communication and Energy Infrastructure Dependencies of German Farmers
Kuntke, Franz; Linsner, Sebastian; Steinbrink, Enno; Franken, Jonas; Reuter, Christian
International Journal of Disaster Risk Science, p.214-229
[Journal Article]
Remotely Accessing the Field and Building Trust with Distant Sources. Perspectives from Journalism Practice for Ethnographic Research
Guntrum, Laura Gianna; Keßler, Mira; Patel, Jignesh; Varfolomeeva, Anna
Global Media Journal - German Edition
[Journal Article]
Book Review: Artificial Intelligence and The Future of Warfare: The USA China and Strategic Stability. Johnson,J. Manchester: University Press. (2021)
Reinhold, Thomas; Reuter, Christian
Zeitschrift für Außen- und Sicherheitspolitik, p.353-355
[Journal Article]