7 Publications

Mark all

[7]
2023 | Conference Paper | LibreCat-ID: 47842
M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security,” 2023, doi: 10.1109/sp46215.2023.10179320.
LibreCat | DOI
 
[6]
2023 | Journal Article | LibreCat-ID: 53348
M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” IEEE Secur. Priv., vol. 21, no. 6, pp. 59–63, 2023, doi: 10.1109/MSEC.2023.3316569.
LibreCat | DOI
 
[5]
2023 | Journal Article | LibreCat-ID: 53368
M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” IEEE Security & Privacy, vol. 21, no. 6, pp. 59–63, 2023.
LibreCat
 
[4]
2022 | Conference Paper | LibreCat-ID: 47844
J. Jancar et al., “‘They’re not that hard to mitigate’: What Cryptographic Library Developers Think About Timing Attacks,” 2022, doi: 10.1109/sp46214.2022.9833713.
LibreCat | DOI
 
[3]
2022 | Conference Paper | LibreCat-ID: 47843
D. Wermke, N. Wohler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects,” 2022, doi: 10.1109/sp46214.2022.9833686.
LibreCat | DOI
 
[2]
2014 | Book Chapter | LibreCat-ID: 47839
M. Fourné, K. Stegemann, D. Petersen, and N. Pohlmann, “Aggregation of Network Protocol Data Near Its Source,” in Information and Communication Technology, Berlin, Heidelberg: Springer Berlin Heidelberg, 2014.
LibreCat | DOI
 
[1]
2013 | Book Chapter | LibreCat-ID: 47841
M. Fourné, D. Petersen, and N. Pohlmann, “Attack-test and verification systems, steps towards verifiable anomaly detection,” in INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt, Bonn: Gesellschaft für Informatik e.V., 2013, pp. 2213–2224.
LibreCat
 

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed

7 Publications

Mark all

[7]
2023 | Conference Paper | LibreCat-ID: 47842
M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security,” 2023, doi: 10.1109/sp46215.2023.10179320.
LibreCat | DOI
 
[6]
2023 | Journal Article | LibreCat-ID: 53348
M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” IEEE Secur. Priv., vol. 21, no. 6, pp. 59–63, 2023, doi: 10.1109/MSEC.2023.3316569.
LibreCat | DOI
 
[5]
2023 | Journal Article | LibreCat-ID: 53368
M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” IEEE Security & Privacy, vol. 21, no. 6, pp. 59–63, 2023.
LibreCat
 
[4]
2022 | Conference Paper | LibreCat-ID: 47844
J. Jancar et al., “‘They’re not that hard to mitigate’: What Cryptographic Library Developers Think About Timing Attacks,” 2022, doi: 10.1109/sp46214.2022.9833713.
LibreCat | DOI
 
[3]
2022 | Conference Paper | LibreCat-ID: 47843
D. Wermke, N. Wohler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects,” 2022, doi: 10.1109/sp46214.2022.9833686.
LibreCat | DOI
 
[2]
2014 | Book Chapter | LibreCat-ID: 47839
M. Fourné, K. Stegemann, D. Petersen, and N. Pohlmann, “Aggregation of Network Protocol Data Near Its Source,” in Information and Communication Technology, Berlin, Heidelberg: Springer Berlin Heidelberg, 2014.
LibreCat | DOI
 
[1]
2013 | Book Chapter | LibreCat-ID: 47841
M. Fourné, D. Petersen, and N. Pohlmann, “Attack-test and verification systems, steps towards verifiable anomaly detection,” in INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt, Bonn: Gesellschaft für Informatik e.V., 2013, pp. 2213–2224.
LibreCat
 

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed