Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

17 Publications


2022 | Dissertation | LibreCat-ID: 29769 | OA
Ahmed, Qazi Arbab. Hardware Trojans in Reconfigurable Computing. Paderborn: Paderborn University, Paderborn, Germany, 2022. https://doi.org/10.17619/UNIPB/1-1271.
LibreCat | DOI | Download (ext.)
 

2022 | Conference Paper | LibreCat-ID: 37157
Eyilmez, Kaan, Ali Sercan Basyurt, Stefan Stieglitz, Christoph Fuchss, Marc-André Kaufhold, Christian Reuter, and Milad Mirbabaie. “A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication.” In Australasian Conference on Information Systems (ACIS). AIS Electronic Library (AISel), 2022.
LibreCat
 

2020 | Book Chapter | LibreCat-ID: 21396
Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.” In Lecture Notes in Computer Science. Cham, 2020. https://doi.org/10.1007/978-3-030-38471-5_13.
LibreCat | Files available | DOI | Download (ext.)
 

2020 | Journal Article | LibreCat-ID: 16249 | OA
Szubartowicz, Eva, and Guido Schryen. “Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements.” Journal of Information System Security 16, no. 1 (2020): 3–31.
LibreCat | Files available
 

2019 | Conference Paper | LibreCat-ID: 17667
Koning, Ralph, Gleb Polevoy, Lydia Meijer, Cees de Laat, and Paola Grosso. “Approaches for Collaborative Security Defences in Multi Network Environments.” In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 113–23. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019. https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9.
LibreCat | DOI | Download (ext.)
 

2018 | Journal Article | LibreCat-ID: 17666
Koning, R., B. de Graaff, Gleb Polevoy, R. Meijer, C. de Laat, and P. Grosso. “Measuring the Efficiency of SDN Mitigations against Attacks on Computer Infrastructures.” Future Generation Computer Systems, 2018. https://doi.org/10.1016/j.future.2018.08.011.
LibreCat | DOI
 

2018 | Journal Article | LibreCat-ID: 5586 | OA
Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning.” Computers & Security 77 (2018): 807–23.
LibreCat | Files available
 

2016 | Conference Paper | LibreCat-ID: 20719
Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–90. CCS ’16, 2016. http://doi.acm.org/10.1145/2976749.2978361.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 5588 | OA
Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “A Multi-Theoretical Literature Review on Information Security Investments Using the Resource-Based View and the Organizational Learning Theory.” In International Conference on Information Systems, 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 5590 | OA
Weishäupl, Eva, Michael Kunz, Emrah Yasasin, Gerit Wagner, Julian Prester, Guido Schryen, and Günther Pernul. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” In 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15), 2015.
LibreCat | Files available
 

Filters and Search Terms

keyword="security"

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed