default search action
11. Sicherheit 2022: Karlsruhe, Germany
- Christian Wressnegger, Delphine Reinhardt, Thomas Barber, Bernhard C. Witt, Daniel Arp, Zoltán Ádám Mann:
Sicherheit, Schutz und Zuverlässigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022. LNI P-323, Gesellschaft für Informatik e.V. 2022, ISBN 978-3-88579-717-3 - Nurullah Demir, Daniel Theis, Tobias Urban, Norbert Pohlmann:
Towards Understanding First-Party Cookie Tracking in the Field. 19-34 - Jan Gruber, Felix C. Freiling:
Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator. 49-64 - Matthias Güdemann:
SMT-Based Verification of Concurrent Critical System. 67-82 - Dominik Doerner, Jeremias Mechler, Jörn Müller-Quade:
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules. 83-99 - Christian Burkert, Jonathan Balack, Hannes Federrath:
PrivacyDates: A Framework for More Privacy-Preserving Timestamp Data Types. 101-112 - Florian Jacob, Saskia Bayreuther, Hannes Hartenstein:
On CRDTs in Byzantine Environments. 113-126 - Viktor Garske, Andreas Noack:
Recovering information from pixelized credentials. 129-141 - Christoph Saatjohann, Fabian Ising, Matthias Gierlings, Dominik Noss, Sascha Schimmler, Alexander Klemm, Leif Grundmann, Tilman Frosch, Sebastian Schinzel:
Sicherheit medizintechnischer Protokolle im Krankenhaus. 143-158 - Robin Müller, Julius Ruppert, Katharina Will, Lukas Wüsteney, Tobias Heer:
Analyzing the Software Patch Discipline Across Different Industries and Countries. 159-170 - Nico Mayer, Steffen Wendzel, Jörg Keller:
Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen. 173-182 - Jan Breig, Dirk Westhoff:
Short Paper: Debating Ethics with Cybersecurity Students. 183-192 - Moritz Gruber, Christian Höfig, Matteo Große-Kampmann, Tobias Urban, Norbert Pohlmann:
Short Paper: Business Chat ist verwirrt. Es hat sich vor Verwirrung selbst verletzt! 193-202 - Fabian Lochmann, Sebastian Schmerl:
Cyber-Defense "Gemessen, Bewertet und Ausgerichtet" - Ein Praxisbericht. 205-208 - Carsten Strotmann, Patrick Ben Koetter, Roland van Rijswijk-Deij, Markus de Brün, Anders Kölligan:
Studie über das Gefahrenpotential und Gegenmaßnahmen zu Angriffen auf das DNS Protokoll durch IP-Fragmentierung. 209-212 - Bernhard Beckert, Jurlind Budurushi, Armin Grunwald, Robert Krimmer, Oksana Kulyk, Ralf Küsters, Andreas Mayer, Jörn Müller-Quade, Stephan Neumann, Melanie Volkamer:
Recent Developments in the Context of Online Elections and Digital Polls in Germany. 213-217 - Torge Hinrichs:
Ongoing Automated Data Set Generation for Vulnerability Prediction from Github Data. 219-222 - Anne Hennig:
Your website has been hijacked: Raising awareness for an invisible problem. 225-230 - Bastian Fraune:
Automated Monitoring of Operational Technology Security and Compliance for Power Grids. 231-236 - Hauke Heseding:
Reinforcement Learning-Controlled Mitigation of Volumetric DDoS Attacks. 237-242 - Jonas Möller:
Differential Testing: How to find differences between programs that mostly behave identically? 243-248
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.