Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
19 Publications
2024 | Conference Paper | LibreCat-ID: 53811
Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report
S. Taaibi, S. Dziwok, L. Hermerschmidt, T. Koch, S. Merschjohann, M. Vollmary, in: n.d.
LibreCat
| Files available
S. Taaibi, S. Dziwok, L. Hermerschmidt, T. Koch, S. Merschjohann, M. Vollmary, in: n.d.
2023 | Conference Paper | LibreCat-ID: 48012 |
Security Analysis of the 3MF Data Format
J. Rossel, V. Mladenov, J. Somorovsky, in: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, ACM, 2023.
LibreCat
| Files available
| DOI
| Download (ext.)
J. Rossel, V. Mladenov, J. Somorovsky, in: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, ACM, 2023.
2022 | Dissertation | LibreCat-ID: 29769 |
Hardware Trojans in Reconfigurable Computing
Q.A. Ahmed, Hardware Trojans in Reconfigurable Computing, Paderborn University, Paderborn, Germany, Paderborn, 2022.
LibreCat
| DOI
| Download (ext.)
Q.A. Ahmed, Hardware Trojans in Reconfigurable Computing, Paderborn University, Paderborn, Germany, Paderborn, 2022.
2022 | Conference Paper | LibreCat-ID: 37157
A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication
K. Eyilmez, A.S. Basyurt, S. Stieglitz, C. Fuchss, M.-A. Kaufhold, C. Reuter, M. Mirbabaie, in: Australasian Conference on Information Systems (ACIS), AIS Electronic Library (AISel), 2022.
LibreCat
K. Eyilmez, A.S. Basyurt, S. Stieglitz, C. Fuchss, M.-A. Kaufhold, C. Reuter, M. Mirbabaie, in: Australasian Conference on Information Systems (ACIS), AIS Electronic Library (AISel), 2022.
2020 | Book Chapter | LibreCat-ID: 21396
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
T. Jager, D. Niehues, in: Lecture Notes in Computer Science, Cham, 2020.
LibreCat
| Files available
| DOI
| Download (ext.)
T. Jager, D. Niehues, in: Lecture Notes in Computer Science, Cham, 2020.
2020 | Journal Article | LibreCat-ID: 16249 |
Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements
E. Szubartowicz, G. Schryen, Journal of Information System Security 16 (2020) 3–31.
LibreCat
| Files available
E. Szubartowicz, G. Schryen, Journal of Information System Security 16 (2020) 3–31.
2019 | Conference Paper | LibreCat-ID: 17667
Approaches for Collaborative Security Defences in Multi Network Environments
R. Koning, G. Polevoy, L. Meijer, C. de Laat, P. Grosso, in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 113–123.
LibreCat
| DOI
| Download (ext.)
R. Koning, G. Polevoy, L. Meijer, C. de Laat, P. Grosso, in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 113–123.
2018 | Journal Article | LibreCat-ID: 17666
Measuring the efficiency of SDN mitigations against attacks on computer infrastructures
R. Koning, B. de Graaff, G. Polevoy, R. Meijer, C. de Laat, P. Grosso, Future Generation Computer Systems (2018).
LibreCat
| DOI
R. Koning, B. de Graaff, G. Polevoy, R. Meijer, C. de Laat, P. Grosso, Future Generation Computer Systems (2018).
2018 | Journal Article | LibreCat-ID: 5586 |
Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning
E. Weishäupl, E. Yasasin, G. Schryen, Computers & Security 77 (2018) 807–823.
LibreCat
| Files available
E. Weishäupl, E. Yasasin, G. Schryen, Computers & Security 77 (2018) 807–823.
2016 | Conference Paper | LibreCat-ID: 20719
An In-Depth Study of More Than Ten Years of Java Exploitation
P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.
LibreCat
| DOI
P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.
2015 | Conference Paper | LibreCat-ID: 5588 |
A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory
E. Weishäupl, E. Yasasin, G. Schryen, in: International Conference on Information Systems, 2015.
LibreCat
| Files available
E. Weishäupl, E. Yasasin, G. Schryen, in: International Conference on Information Systems, 2015.
2015 | Conference Paper | LibreCat-ID: 5590 |
Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory
E. Weishäupl, M. Kunz, E. Yasasin, G. Wagner, J. Prester, G. Schryen, G. Pernul, in: 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15), 2015.
LibreCat
| Files available
E. Weishäupl, M. Kunz, E. Yasasin, G. Wagner, J. Prester, G. Schryen, G. Pernul, in: 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15), 2015.
2009 | Journal Article | LibreCat-ID: 5621 |
Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland
G. Schryen, E. Rich, IEEE Transactions on Information Forensics \& Security 4 (2009) 729–744.
LibreCat
| Files available
G. Schryen, E. Rich, IEEE Transactions on Information Forensics \& Security 4 (2009) 729–744.
2009 | Conference Paper | LibreCat-ID: 5625 |
Open Source vs. Closed Source Software: Towards Measuring Security
G. Schryen, R. Kadura, in: 24th Annual ACM Symposium on Applied Computing, 2009.
LibreCat
| Files available
G. Schryen, R. Kadura, in: 24th Annual ACM Symposium on Applied Computing, 2009.
2009 | Conference Paper | LibreCat-ID: 5647 |
Security of open source and closed source software: An empirical comparison of published vulnerabilities
G. Schryen, in: 15th Americas Conference on Information Systems, 2009.
LibreCat
| Files available
G. Schryen, in: 15th Americas Conference on Information Systems, 2009.
2008 | Conference Paper | LibreCat-ID: 5649 |
Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia
G. Schryen, in: 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.
LibreCat
| Files available
G. Schryen, in: 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.
2007 | Journal Article | LibreCat-ID: 5658 |
The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam ? An Empirical Analysis
G. Schryen, Computers & Security 2 (2007) 361–372.
LibreCat
| Files available
G. Schryen, Computers & Security 2 (2007) 361–372.
2005 | Conference Paper | LibreCat-ID: 39050
Secure Profile Management in Smart Home Networks
M. Ziegler, W. Müller, R. Schäfer, C. Loeser, in: Proceedings of the 1st International Workshop on Secure and Ubiquitous Networks (SUN-2005), IEEE, Copenhagen, Denmark , 2005.
LibreCat
| DOI
M. Ziegler, W. Müller, R. Schäfer, C. Loeser, in: Proceedings of the 1st International Workshop on Secure and Ubiquitous Networks (SUN-2005), IEEE, Copenhagen, Denmark , 2005.
2003 | Book Chapter | LibreCat-ID: 5667
E-Democracy: Internet Voting
G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2, IADIS Press, Algarve, 2003, pp. 1017–1021.
LibreCat
G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2, IADIS Press, Algarve, 2003, pp. 1017–1021.