Publications
Publications
Fake News Detection by Image Montage Recognition
Steinebach, Martin; Liu, Huajian; Gotkowski, Karol
[Journal Article]
Datenschutz und Datensicherheit im Digital Public Health
Kunz, Thomas; Lange, Benjamin; Selzer, Annika
[Journal Article]
IT-Sicherheitsarchitektur für die nächste Generation der Leit- und Sicherheitstechnik
Heinrich, Markus; Krauß, Christoph; Zhdanova, Maria; Eckel, Michael; Katzenbeisser, Stefan; Kuzhiyelil, Don; Cosic, Jasmin; Drodt, Matthias
[Journal Article]
Ensuring the Integrity and Security of Network Equipment is Critical in the Fight Against Cyber Attacks
Eckel, Michael; Laffey, Tom
[Journal Article]
Machine Learning Application for Prediction of Sapphire Crystals Defects
Klunnikova, Yulia Vladimirovna; Anikeev, Maxim Vladimirovich; Filimonov, Alexey Vladimirovich; Kumar, Ravi
[Journal Article]
Detection and Analysis of Tor Onion Services
Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina
[Journal Article]
Sicherheitskennzahlen: Metriken aus Angreifer-Sicht
Stöwer, Mechthild; Klaus, Marko
[Journal Article]
A location privacy analysis of Bluetooth mesh
Caesar, Matthias; Steffan, Jan
[Journal Article]
Detecting and tracking criminals in the real world through an IoT-based system
Tundis, A.; Kaleem, H.; Mühlhäuser, M.
[Journal Article]
Cortex-M4 Optimizations for {R, M}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, François
[Journal Article]
Applying machine intelligence in practice. Selected results of the 2019 Dagstuhl Workshop on Applied Machine Intelligence
Humm, Bernhard; Bense, Hermann; Bock, Jürgen; Classen, Mario; Halvani, Oren; Herta, Christian; Hoppe, Thomas; Juwig, Oliver; Siegel, Melanie
Workshop on Applied Machine Intelligence 2019
[Journal Article]
Datenschutzkonformes Löschen personenbezogener Daten in Kundenbeziehungsmanagementsystemen
Macit, Tugba Koc; Selzer, Annika
[Journal Article]
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
[Journal Article]
Motion Vector based Robust Video Hash
Liu, Huajian; Fach, Sebastian; Steinebach, Martin
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
Nikolopoulos, Georgios M.; Fischlin, Marc
Cryptography
[Journal Article]
An Overview of the Botnet Simulation Framework
Böck, Leon; Shankar, Karuppayah; Mühlhäuser, Max; Emmanouil, Vasilomanolakis
The Journal on Cybercrime & Digital Investigations, p.1-10
[Journal Article]
Benefits of formalized computational modeling for understanding user behavior in online privacy research
Schürmann, Tim; Gerber, Nina; Gerber, Paul
Journal of Intellectual Capital, p.431-458
[Journal Article]
Has the GDPR hype affected users’ reaction to cookie disclaimers?
Kulyk, Oksana; Gerber, Nina; Hilt, Annika; Volkamer, Melanie
Journal of Cybersecurity
[Journal Article]
Biometric Presentation Attack Detection: Beyond the Visible Spectrum
Tolosana, R.; Gomez-Barrero, M.; Busch, C.; Ortega-Garcia, J.
IEEE Trans. on Information Forensics and Security, Vol.15, p.1261-1275
[Journal Article]
An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris
Tapia, J.; Gomez-Barrero, M.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]
Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach
Scherhag, U.; Kunze, J.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.9, p.278-289
[Journal Article]
Morphing Attack Detection using Laplace operator based features
Scherhag, U.; Fischer, D.; Isadskiy, S.; Otte, J.; Busch, C.
in Proc. Norwegian Information Security Conf. (NISK)
[Journal Article]
Deep Face Representations for Differential Morphing Attack Detection
Scherhag, U.; Rathgeb, C.; Merkle, J.; Busch, Christoph
IEEE Trans. on Information Forensics and Security
[Journal Article]
Makeup Presentation Attacks: Review and Detection Performance Benchmark
Rathgeb, C.; Drozdowski, P.; Busch, C.
IEEE Access, Vol.8, p.224958-224973
[Journal Article]
Morphing Attack Detection - Database, Evaluation Platform and Benchmarking
Raja, K.; Ferrara, M.; Franco, A.; Spreeuwers, L.; Batskos, I.; others
IEEE Trans. on Information Forensics and Security
[Journal Article]
Morphing-Angriffe - Ein Sicherheitsrisiko für Gesichtserkennungssysteme
Merkle, J.; Rathgeb, C.; Scherhag, U.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.38-42
[Journal Article]
Reversing the irreversible: A survey on inverse biometrics
Gomez-Barrero, M.; Galbally, J.
Computers & Security, Vol.90
[Journal Article]
Erkennung von Präsentationsangriffen auf Fingerabdruck Systemen
Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.26-31
[Journal Article]
Language-Integrated Privacy-Aware Distributed Queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.1-30
[Journal Article]
How to nudge in cyber security
Renaud, Karen; Zimmermann, Verena
Network Security, p.20-20
[Journal Article]