default search action
Sicherheit 2016: Bonn, Germany
- Michael Meier, Delphine Reinhardt, Steffen Wendzel:
Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-7. April 2016, Bonn. LNI P-256, GI 2016, ISBN 978-3-88579-650-3
Risiko- und Sicherheitsanalyse
- Jens Braband:
Why 2 times 2 ain't neccessarily 4 - at least not in IT security risk assessment. 1-10 - Juergen Graf, Martin Hecker, Martin Mohr, Gregor Snelting:
Sicherheitsanalyse mit JOANA. 11-22 - Fabian Beterke:
Distributed evolutionary fuzzing with Evofuzz. 23-32
Internet of Things & Cybercrime
- Jakob Rieck:
Attacks on fitness trackers revisited: a case-study of unfit firmware security. 33-44 - Christopher Corbett, Elmar Schoch, Frank Kargl, Felix Preussner:
Automotive Ethernet: security opportunity or challenge? 45-54 - Ronny Merkel, Christian Kraetzer, Mario Hildebrandt, Stefan Kiltz, Sven Kuhlmann, Jana Dittmann:
A semantic framework for a better understanding, investigation and prevention of organized financial crime. 55-66
Malware
- Dominik Schürmann, Lars C. Wolf:
Surreptitious sharing on Android. 67-78 - Sebastian Hahn, Mykola Protsenko, Tilo Müller:
Comparative evaluation of machine learning-based malware detection on Android. 79-88 - Christian Röpke:
SDN malware: problems of current protection systems and potential countermeasures. 89-100
Authentifikation und Biometrie
- Vincent Haupert, Tilo Müller:
Auf dem Weg verTAN: Über die Sicherheit App-basierter TAN-Verfahren. 101-112 - Mariia Astrakhantceva, Günter Karjoth, Bettina Hübscher:
Die Bordkarte als Authentifikationsmittel bei Flugreisen. 113-124 - Moazzam Butt, Johannes Merkle, Ulrike Korte, Christoph Busch:
Correlation-resistant fuzzy vault for fingerprints. 125-136
E-Commerce & Sicherheitsmanagement
- Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:
Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin. 137-148 - Dominik Herrmann, Jens Lindemann:
Obtaining personal data and asking for erasure: do app vendors and website owners honour your privacy rights? 149-160 - Severin Rast, Timo Brecher, Sabine Kammerhofer:
IT-Grundschutz in großen Institutionen - Herausforderungen und Lösungsstrategien. 161-170
Practitioners Track
- Florian Hertle:
Lessons learned bei KMUs aus dem Befall durch Ransomware. 171-176 - Felix Schuckert:
Generating security vulnerabilities in source code. 177-184
Doktoranden-Forum "Sicherheit 2016"
- Stefanie Jasser:
Sicherheit im Softwareentwurf - Integrierte Modellierung von Security und Softwarearchitektur. 185-190 - Saffija Kasem-Madani:
A framework for encrypted computation on shared data. 191-196 - Leonard Renners:
Towards adaptive event prioritization for network security - ideas and challenges. 197-202 - Siavash Valipour:
Designing resilient and secure smart micro grids. 203-208 - Tim Waage:
Order preserving encryption for wide column stores. 209-216
International Workshop on Security, Privacy and Reliability of Smart Buildings
- Friedrich Praus, Wolfgang Kastner, Peter Palensky:
Software security requirements in building automation. 217-228 - Christian Müller, Frederik Armknecht, Zinaida Benenson, Philipp Morgner:
On the security of the ZigBee Light Link touchlink commissioning procedure. 229-240 - Harald Glanzer, Lukas Krammer, Wolfgang Kastner:
Increasing security and availability in KNX networks. 241-252 - Jernej Tonejc, Jaspreet Kaur, Alexandra Kobekova:
Detecting anomalies in BACnet network data. 253-264
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.