Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
17 Publications
2022 | Dissertation | LibreCat-ID: 29769 |
Q. A. Ahmed, Hardware Trojans in Reconfigurable Computing. Paderborn: Paderborn University, Paderborn, Germany, 2022.
LibreCat
| DOI
| Download (ext.)
2022 | Conference Paper | LibreCat-ID: 37157
K. Eyilmez et al., “A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication,” 2022.
LibreCat
2020 | Book Chapter | LibreCat-ID: 21396
T. Jager and D. Niehues, “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions,” in Lecture Notes in Computer Science, Cham, 2020.
LibreCat
| Files available
| DOI
| Download (ext.)
2020 | Journal Article | LibreCat-ID: 16249 |
E. Szubartowicz and G. Schryen, “Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements,” Journal of Information System Security, vol. 16, no. 1, pp. 3–31, 2020.
LibreCat
| Files available
2019 | Conference Paper | LibreCat-ID: 17667
R. Koning, G. Polevoy, L. Meijer, C. de Laat, and P. Grosso, “Approaches for Collaborative Security Defences in Multi Network Environments,” in 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 113–123.
LibreCat
| DOI
| Download (ext.)
2018 | Journal Article | LibreCat-ID: 5586 |
E. Weishäupl, E. Yasasin, and G. Schryen, “Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning,” Computers & Security, vol. 77, pp. 807–823, 2018.
LibreCat
| Files available
2016 | Conference Paper | LibreCat-ID: 20719
P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790, doi: http://doi.acm.org/10.1145/2976749.2978361.
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 5588 |
E. Weishäupl, E. Yasasin, and G. Schryen, “A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory,” in International Conference on Information Systems, 2015.
LibreCat
| Files available
2015 | Conference Paper | LibreCat-ID: 5590 |
E. Weishäupl et al., “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory,” in 2nd International Workshop on Security in highly connected IT Systems (SHCIS?15), 2015.
LibreCat
| Files available