Publikationen
Publikationen
Precisely Extracting Complex Variable Values from Android Apps
Miltenberger, Marc; Arzt, Steven
[Journal Article]
Erste Schritte im Rahmen der Datenschutz-Vorsorge
Boll, Alina; Stummer, Sarah
[Journal Article]
A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet
Vincenzi, Marco de; Costantino, Gianpiero; Matteucci, Ilaria; Fenzl, Florian; Plappert, Christian; Rieke, Roland; Zelle, Daniel
[Journal Article]
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Bagia, Alexis; Tibouchi, Mehdi; Seifert, Jean-Pierre
[Journal Article]
Datenschutzvorsorge in der offensiven Cybersicherheitsforschung
Selzer, Annika; Spiecker gen. Döhmann, Indra; Boll, Alina
[Journal Article]
Resource Management for Programmable Metasurfaces: Concept, Prospects and Challenges
Liaskos, Christos; Katsalis, Kostas; Triay, Joan; Schmid, Stefan
[Journal Article]
Runtime Verification for Programmable Switches
Shukla, Apoorv; Hudemann, Kevin; Vági, Zsolt; Hügerich, Lily; Smaragdakis, Georgios; Hecker, Artur; Schmid, Stefan; Feldmann, Anja
[Journal Article]
Load-Optimization in Reconfigurable Networks: Algorithms and Complexity of Flow Routing
Dai, Wenkai; Foerster, Klaus-Tycho; Fuchssteiner, David; Schmidt, Stefan
[Journal Article]
Künstliche Intelligenz als Instrument des Kinder- und Jugendmedienschutzes
Steinebach, Martin
[Journal Article]
Intermezzo. Welcher Technologie kann man vertrauen?
Schulmann, Haya; Waidner, Michael
[Journal Article]
Aktive Cyberabwehr
Schulmann, Haya; Waidner, Michael
[Journal Article]
Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Frieß, Jens; Schulmann, Haya; Waidner, Michael
International Conference on Emerging Networking EXperiments and Technologies 2023
[Journal Article]
Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht
Büscher, Maximilian; Hornung, Gerrit; Schindler, Stephan; Zurawski, Paul; Gutjahr, Amina; Spiecker gen. Döhmann, Indra; Selzer, Annika; Stummer, Sarah; Wilmer, Thomas
[Journal Article]
Zulässigkeit der Zweckänderung durch Auftragsverarbeiter
Boll, Alina; Gärtner, Tanya; Geissler, Ines; Stummer, Sarah
[Journal Article]
Superpolynomial quantum-classical separation for density modeling
Pirnay, Niklas; Sweke, Ryan; Eisert, Jens; Seifert, Jean-Pierre
[Journal Article]
Evaluating the applicability of hardware trust anchors for automotive applications
Plappert, Christian; Lorych, Dominik; Eckel, Michael; Jäger, Lukas; Fuchs, Andreas; Heddergott, Ronald
[Journal Article]
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)
Krachenfels, Thilo; Seifert, Jean-Pierre; Tajik, Shahin
[Journal Article]
Securing the Future Railway System: Technology Forecast, Security Measures, and Research Demands
Unger, Simon; Heinrichs, Markus; Scheuermann, Dirk; Katzenbeisser, Stefan; Schubert, Max; Hagemann, Leon; Iffländer, Lukas
[Journal Article]
Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud
Saxena, Deepika; Kumar, Jitendra; Singh, Ashutosh Kumar; Schmid, Stefan
[Journal Article]
Duo: A High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control
Zerwas, Johannes; Györgyi, Csaba; Blenk, Andreas; Schmid, Stefan; Avin, Chen
Association for Computing Machinery, Special Interest Group on Performance Evaluation (ACM SIGMETRICS Conference) 2023
[Journal Article]
Identifizierbarkeit und Anonymität im Internet
Stummer, Sarah
[Journal Article]
Angemessene technische und organisatorische Maßnahmen
Gärtner, Tanya; Selzer, Annika
[Journal Article]
Metrikensysteme als Beitrag zur Umsetzung des risikobasierten Ansatzes
Gärtner, Tanya; Selzer, Annika
[Journal Article]
Personenbezogenheit vs. Anonymität
Stummer, Sarah
[Journal Article]
Digitalisierung in Deutschland: Ein Vergleich zu Südkorea und Singapur
Engelbrecht, Stefan; Gerber, Jens; Gyollai, Michael; Rosch, Philipp; Schulz, Cord C.; Selzer, Annika
[Journal Article]
Ohne Cybersicherheit kein Datenschutz, ohne Datenschutz keine Cybersicherheit?
Boll, Alina
[Journal Article]
Inconsistencies in Darknet Researches
Platzer, Florian; Lux, Alexandra
International Conference on Availability, Reliability and Security 2022
[Journal Article]
Scraping and Analyzing Data of a Large Darknet Marketplace
Yannikos, York; Heeger, Julian; Steinebach, Martin
International Conference on Availability, Reliability and Security 2022
[Journal Article]
Image Hashing Robust Against Cropping and Rotation
Steinebach, Martin; Berwanger, Tiberius; Liu, Huajian
International Conference on Availability, Reliability and Security 2022
[Journal Article]
Wenn aus Worten Bilder werden
Steinebach, Martin
[Journal Article]