Publikationen

Method, computer program and system for providing a control signal for a software development environment
Eichler, Jörn; Holzinger, Philipp; Laabs, Martin; Poller, Andreas; Türpe, Sven; Weber, Heiko; Zenkoff, Albert
Sprache: English
[Patent, Electronic Publication]

CodeMatch: Obfuscation Won't Conceal Your Repackaged App
Glanz, Leonid; Amann, Sven; Eichberg, Michael; Reif, Michael; Mezini, Mira
Software Engineering und Software Management 2018, p.117-118
Sprache: English

‘Home, Smart Home’ – Exploring End Users’ Mental Models of Smart Homes
Zimmermann, Verena; Bennighof, Merve; Edel, Miriam; Hofmann, Oliver; Jung, Judith; von Wick, Melina
Mensch und Computer 2018 - Workshopband
Sprache: English
[Conference Proceedings]

Nudging folks towards stronger password choices: Providing certainty is the key.
Renaud, Karen; Zimmermann, Verena
Behavioural Public Policy (BPP), p.1-31
Sprache: English
[Journal Article]

Ethical guidelines for nudging in information security & privacy
Renaud, Karen; Zimmermann, Verena
International Journal of Human-Computer Studies (IJHCS), Vol.120, p.22-35
Sprache: English
[Journal Article]

Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie; Hilt, Tobias
Datenschutz und Datensicherheit (DuD), Vol.42, p.680-685
Sprache: German
[Journal Article]

Guidelines For Ethical Nudging in Password Authentication
Renaud, Karen; Zimmermann, Verena
South African Institute Of Electrical Engineers (SAIEE), Vol.109, p.102-118
Sprache: English
[Journal Article]

The Quest to Replace Passwords Revisited – Rating Authentication Schemes
Zimmermann, Verena; Gerber, Nina; Kleboth, Marius; von Preuschen, Alexandra; Schmidt, Konstantin; Mayer, Peter
Twelth International Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), p.38-48
Sprache: English
[Conference Proceedings]

Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie
International Conference on Availability, Reliability and Security (ARES)
Sprache: English
[Conference Proceedings]

EWV Ergebnisreport (Ergebnisse des Projekts Erkennung vor Wirtschaftskriminalität und Versicherungsbetrug)
Winter, Christian; Marschall, Kevin; Herfurth, Constantin; Riedel, Oliver; Halvani, Oren; Liu, Huajian; Yannikos, York; Friedrich, Stephanie; Finzen, Jan; Kintz, Maximilian; Schneider, Andrea; Ossege, Tobias; Steinebach, Martin; Steinebach, Martin; Roßnagel, Alexander; Hornung, Gerrit; Riedel, Oliver; Rener, Thomas; Teichert, Jochen
Sprache: German
[Report]

Roadmap to Privacy: Presentation held at Amsterdam Privacy Conference, APC 2018
Winter, Christian; Schäfer, Marcel
Amsterdam Privacy Conference (APC) <2018, Amsterdam>
Sprache: English
[Presentation, Electronic Publication]

Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
Workshop on Hot Topics in Networks (HotNets) <17, 2018, Redmond/Wash.>
Sprache: English
[Conference Paper]

Collective Attestation: for a Stronger Security in Embedded Networks
Ibrahim, Ahmad
IEEE
Sprache: English
[Conference Proceedings]

Artificial Intelligence in IT Security
Steinebach, Martin; Waidner, Michael
Sprache: English
[Book Article, Electronic Publication]

The Future of IoT Security: Special Session
Mohan, Sibin; Asplund, Mikael; Bloom, Gedare; Sadeghi, Ahmad-Reza; Ibrahim, Ahmad; Salajageh, Negin; Griffioen, Paul; Sinopoli, Bruno
International Conference on Embedded Software (EMSOFT 2018), 2018
Sprache: English
[Conference Proceedings]

Securing Embedded Networks Through Secure Collective Attestation
Ibrahim, Ahmad
Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018
Sprache: German
[Conference Proceedings]

Verbundprojekt. Erkennung von Wirtschaftskriminalität und Versicherungsbetrug EWV. Schlussbericht EWV: Schlussbericht des Fraunhofer SIT zu dem Teilvorhaben "Softwarebasierte Betrugserkennung"
Winter, Christian
Sprache: German
[Report]

Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Habib, S.M.; Alexopoulos, N.; Islam, M.M.; Heider, J.; Marsh, S.; Mühlhäuser, M.
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <17, 2018, New York/NY>
Sprache: English
[Conference Paper]

One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
Sprache: English
[Conference Proceedings]

Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
Sprache: English
[Conference Proceedings]

VVV - Vertrauenswürdige Verteilung von Verschlüsselungsschlüsseln: Laufzeit des Vorhabens: 01.01.2016-30.04.2018
Selzer, Annika; Waldmann, Ulrich
Sprache: German
[Report]

Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards
Heidt, Margareta
European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress]
Sprache: English
[Journal Article]

The Influence of SME Constraints in an Organizational IT Security Context
Heidt, Margareta; Gerlach, Jin
International Conference on Information Systems (ICIS), 13.-16.12.2018, San Francisco, USA.
Sprache: German
[Conference Proceedings]

Wie lässt sich eine Manipulation von Dokumenten und Bildern erkennen?
Steinebach, Martin; Winter, Christian
Sprache: German
[Journal Article]

Performance analysis of OpenFlow based software defined wired and wireless network
Jany, M.H.R.; Islam, N.; Khondoker, R.; Habib, M.A.
International Conference of Computer and Information Technology (ICCIT) <20, 2017, Dhaka>
Sprache: English
[Conference Paper]