Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

17 Publications


2022 | Dissertation | LibreCat-ID: 29769 | OA
Ahmed, Q. A. (2022). Hardware Trojans in Reconfigurable Computing. Paderborn University, Paderborn, Germany. https://doi.org/10.17619/UNIPB/1-1271
LibreCat | DOI | Download (ext.)
 

2022 | Conference Paper | LibreCat-ID: 37157
Eyilmez, K., Basyurt, A. S., Stieglitz, S., Fuchss, C., Kaufhold, M.-A., Reuter, C., & Mirbabaie, M. (2022). A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication. Australasian Conference on Information Systems (ACIS).
LibreCat
 

2020 | Book Chapter | LibreCat-ID: 21396
Jager, T., & Niehues, D. (2020). On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. In Lecture Notes in Computer Science. Cham. https://doi.org/10.1007/978-3-030-38471-5_13
LibreCat | Files available | DOI | Download (ext.)
 

2020 | Journal Article | LibreCat-ID: 16249 | OA
Szubartowicz, E., & Schryen, G. (2020). Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements. Journal of Information System Security, 16(1), 3–31.
LibreCat | Files available
 

2019 | Conference Paper | LibreCat-ID: 17667
Koning, R., Polevoy, G., Meijer, L., de Laat, C., & Grosso, P. (2019). Approaches for Collaborative Security Defences in Multi Network Environments. In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (pp. 113–123). https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9
LibreCat | DOI | Download (ext.)
 

2018 | Journal Article | LibreCat-ID: 17666
Koning, R., de Graaff, B., Polevoy, G., Meijer, R., de Laat, C., & Grosso, P. (2018). Measuring the efficiency of SDN mitigations against attacks on computer infrastructures. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2018.08.011
LibreCat | DOI
 

2018 | Journal Article | LibreCat-ID: 5586 | OA
Weishäupl, E., Yasasin, E., & Schryen, G. (2018). Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning. Computers & Security, 77, 807–823.
LibreCat | Files available
 

2016 | Conference Paper | LibreCat-ID: 20719
Holzinger, P., Triller, S., Bartel, A., & Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–790. http://doi.acm.org/10.1145/2976749.2978361
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 5588 | OA
Weishäupl, E., Yasasin, E., & Schryen, G. (2015). A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory. In International Conference on Information Systems.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 5590 | OA
Weishäupl, E., Kunz, M., Yasasin, E., Wagner, G., Prester, J., Schryen, G., & Pernul, G. (2015). Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In 2nd International Workshop on Security in highly connected IT Systems (SHCIS?15).
LibreCat | Files available
 

Filters and Search Terms

keyword="Security"

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed