Publikationen

Publikationen

ML-basierte Unterstützung von Lösch- und Aufbewahrungspflichten
Kunz, Thomas; Waldmann, Ulrich
[Journal Article]


IT and more: Anonymisierung unstrukturierter Daten
Steinebach, Martin; Vogel, Inna
[Journal Article]


Auswahl cloudbasierter Dienste
Geissler, Ines; Pordesch, Ulrich; Selzer, Annika; Wilmer, Thomas
[Journal Article]


BusCount: A Provable Replay Protection Solution for Automotive CAN Networks
Zelle, Daniel; Gürgens, Sigrid
[Journal Article]


On the quantum versus classical learnability of discrete distributions
Sweke, R.; Seifert, J.-P.; Hangleiter, D.; Eisert, J.
[Journal Article]


Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Bienhaus, Diethelm; Ebner, Andreas; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
[Journal Article]


Datenschutzkonformes Löschen bei Datenschutz- und Informationssicherheitsvorfällen
Rudolph, Louisa; Selzer, Annika; Pordesch, Ulrich
[Journal Article]


Smart Governance for Cybersecurity
Scheel, Kristin; Kreutzer, Michael
[Journal Article]


Einschätzen von Kulturgütern per App
Steinebach, Martin
[Journal Article]


Cover-aware Steganalysis
Bunzel, Niklas; Steinebach, Martin; Liu, Huajian
[Journal Article]


The appropriateness of technical and organisational measures under article 32 GDPR
Selzer, Annika
[Journal Article]


Preventing time synchronization in NTP broadcast mode
Tripathi, N.; Hubballi, N.
[Journal Article]


Machine Learning use case in manufacturing - an evaluation of the model's reliability from an IT security perspective
Cassoli Bretones, Beatriz; Ziegenbein, Amina; Metternich, Joachim; Dukanovic, Sinia; Hachenberger, Julien; Laabs, Martin
Conference on Manufacturing Systems (CMS) 2021
[Journal Article]


Microgrid Systems: Towards a Technical Performance Assessment Frame
Marchand, Sophie; Monsalve, Cristian; Reimann, Thorsten; Heckmann, Wolfram; Ungerland, Jakob; Lauer, Hagen; Ruhe, Stephan; Krauß, Christoph
[Journal Article]


Recognition of manual forest work for time on task recording
Dilger, Stefan
Annual Symposium on Electronic Imaging, Science and Technology 2021
[Journal Article]


Grösser Denken - Die Technologieprognose System Bahn 2050
Iffländer, Lukas; Buder, Thomas; Leining, Michael; Schubert, Max; Heinrich, Markus; Katzenbeißer, Stefan; Unger, Simon; Scheuermann, Dirk
[Journal Article]


Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass
Renaud, Karen; Volkamer, Melanie; Mayer, Peter; Grimm, Rüdiger
[Journal Article]


Rock'n'roll PUFs: Crafting provably secure pufs from less secure ones (extended version)
Ganji, Fatemeh; Tajik, Shahin; Stauss, Pascal; Seifert, Jean-Pierre; Tehranipoor, Mark Mohammad; Forte, Domenic
International Workshop on Security Proofs for Embedded Systems (PROOFS) 2019
[Journal Article]


Privacy-Enhanced Robust Image Hashing with Bloom Filters
Breidenbach, Uwe; Steinebach, Martin; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) 2020
[Journal Article]


Phishing detection on tor hidden services
Steinebach, Martin; Zenglein, Sascha; Brandl, Katharina
European Digital Forensics Research Workshop (DFRWS) 2021
[Journal Article]


An Economic Analysis of Appropriateness under Article 32 GDPR
Selzer, Annika; Woods, Daniel; Böhme, Rainer
[Journal Article]


Potenziale anonymer Da­ten­verarbeitungen nutzen. Ein Vorschlag für Smart Cities
Selzer, Annika; Timm, Ingo J.
[Journal Article]


Improved scalability of demand-aware datacenter topologies with minimal route lengths and congestion
Pacut, Maciej; Dai, Wenkai; Labbe, Alexandre; Foerster, Klaus-T.; Schmid, Stefan
[Journal Article]


Linking loose ends: An interdisciplinary privacy and communication model
Bräunlich, Katharina; Dienlin, Tobias; Eichenhofer, Johannes; Helm, Paula; Trepte, Sabine; Grimm, Rüdiger; Seubert, Sandra; Gusy, Christoph
[Journal Article]


Einsatz von FIDO2 im PSD II-konformen Zahlungsverkehr
Heider, Jens
[Journal Article]


Cyber­sicher­heits­forschung als Teil der nationalen Sicherheitsarchitektur
Kreutzer, Michael; Schneider, Markus
[Journal Article]


Preacher: Network Policy Checker for Adversarial Environments
Thimmaraju, K.; Schiff, L.; Schmid, S.
[Journal Article]


Das digitale Erbe
Selzer, Annika; Waldmann, Ulrich
[Journal Article]


RNNIDS: Enhancing network intrusion detection systems through deep learning
Sohi, Soroush M.; Seifert, Jean-Pierre; Ganji, Fatemeh
[Journal Article]


Gestaltung eines Treuhand-Systems zum anonymen Datenaustausch in einer Smart-City-Umgebung. Gewährleistung angemessener Schutz­maß­nahmen
Selzer, Annika; Timm, Ingo J.
[Journal Article]