Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
17 Publications
2022 | Dissertation | LibreCat-ID: 29769 |
Ahmed, Qazi Arbab. Hardware Trojans in Reconfigurable Computing. Paderborn University, Paderborn, Germany, 2022, doi:10.17619/UNIPB/1-1271.
LibreCat
| DOI
| Download (ext.)
2022 | Conference Paper | LibreCat-ID: 37157
Eyilmez, Kaan, et al. “A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication.” Australasian Conference on Information Systems (ACIS), AIS Electronic Library (AISel), 2022.
LibreCat
2020 | Book Chapter | LibreCat-ID: 21396
Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.” Lecture Notes in Computer Science, 2020, doi:10.1007/978-3-030-38471-5_13.
LibreCat
| Files available
| DOI
| Download (ext.)
2020 | Journal Article | LibreCat-ID: 16249 |
Szubartowicz, Eva, and Guido Schryen. “Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements.” Journal of Information System Security, vol. 16, no. 1, Information Institute Publishing, Washington DC, USA, 2020, pp. 3–31.
LibreCat
| Files available
2019 | Conference Paper | LibreCat-ID: 17667
Koning, Ralph, et al. “Approaches for Collaborative Security Defences in Multi Network Environments.” 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 113–23, doi:10.1109/CSCloud/EdgeCom.2019.000-9.
LibreCat
| DOI
| Download (ext.)
2018 | Journal Article | LibreCat-ID: 17666
Koning, R., et al. “Measuring the Efficiency of SDN Mitigations against Attacks on Computer Infrastructures.” Future Generation Computer Systems, 2018, doi:https://doi.org/10.1016/j.future.2018.08.011.
LibreCat
| DOI
2018 | Journal Article | LibreCat-ID: 5586 |
Weishäupl, Eva, et al. “Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning.” Computers & Security, vol. 77, Elsevier, 2018, pp. 807–23.
LibreCat
| Files available
2016 | Conference Paper | LibreCat-ID: 20719
Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–90, doi:http://doi.acm.org/10.1145/2976749.2978361.
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 5588 |
Weishäupl, Eva, et al. “A Multi-Theoretical Literature Review on Information Security Investments Using the Resource-Based View and the Organizational Learning Theory.” International Conference on Information Systems, 2015.
LibreCat
| Files available
2015 | Conference Paper | LibreCat-ID: 5590 |
Weishäupl, Eva, et al. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15), 2015.
LibreCat
| Files available