Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

17 Publications


2022 | Dissertation | LibreCat-ID: 29769 | OA
Ahmed, Qazi Arbab. Hardware Trojans in Reconfigurable Computing. Paderborn University, Paderborn, Germany, 2022, doi:10.17619/UNIPB/1-1271.
LibreCat | DOI | Download (ext.)
 

2022 | Conference Paper | LibreCat-ID: 37157
Eyilmez, Kaan, et al. “A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication.” Australasian Conference on Information Systems (ACIS), AIS Electronic Library (AISel), 2022.
LibreCat
 

2020 | Book Chapter | LibreCat-ID: 21396
Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.” Lecture Notes in Computer Science, 2020, doi:10.1007/978-3-030-38471-5_13.
LibreCat | Files available | DOI | Download (ext.)
 

2020 | Journal Article | LibreCat-ID: 16249 | OA
Szubartowicz, Eva, and Guido Schryen. “Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements.” Journal of Information System Security, vol. 16, no. 1, Information Institute Publishing, Washington DC, USA, 2020, pp. 3–31.
LibreCat | Files available
 

2019 | Conference Paper | LibreCat-ID: 17667
Koning, Ralph, et al. “Approaches for Collaborative Security Defences in Multi Network Environments.” 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 113–23, doi:10.1109/CSCloud/EdgeCom.2019.000-9.
LibreCat | DOI | Download (ext.)
 

2018 | Journal Article | LibreCat-ID: 17666
Koning, R., et al. “Measuring the Efficiency of SDN Mitigations against Attacks on Computer Infrastructures.” Future Generation Computer Systems, 2018, doi:https://doi.org/10.1016/j.future.2018.08.011.
LibreCat | DOI
 

2018 | Journal Article | LibreCat-ID: 5586 | OA
Weishäupl, Eva, et al. “Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning.” Computers & Security, vol. 77, Elsevier, 2018, pp. 807–23.
LibreCat | Files available
 

2016 | Conference Paper | LibreCat-ID: 20719
Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–90, doi:http://doi.acm.org/10.1145/2976749.2978361.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 5588 | OA
Weishäupl, Eva, et al. “A Multi-Theoretical Literature Review on Information Security Investments Using the Resource-Based View and the Organizational Learning Theory.” International Conference on Information Systems, 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 5590 | OA
Weishäupl, Eva, et al. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15), 2015.
LibreCat | Files available
 

2009 | Journal Article | LibreCat-ID: 5621 | OA
Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” IEEE Transactions on Information Forensics \& Security, vol. 4, no. 4 Part, IEEE, 2009, pp. 729–44.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5625 | OA
Schryen, Guido, and Rouven Kadura. “Open Source vs. Closed Source Software: Towards Measuring Security.” 24th Annual ACM Symposium on Applied Computing, 2009.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5647 | OA
Schryen, Guido. “Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.” 15th Americas Conference on Information Systems, 2009.
LibreCat | Files available
 

2008 | Conference Paper | LibreCat-ID: 5649 | OA
Schryen, Guido. “Practical Security of Large-Scale Elections: An Exploratory Case Study of Internet Voting in Estonia.” 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.
LibreCat | Files available
 

2007 | Journal Article | LibreCat-ID: 5658 | OA
Schryen, Guido. “The Impact That Placing Email Addresses on the Internet Has on the Receipt of Spam ? An Empirical Analysis.” Computers & Security, vol. 2, no. 5, Elsevier, 2007, pp. 361–72.
LibreCat | Files available
 

2005 | Conference Paper | LibreCat-ID: 39050
Ziegler, Max, et al. “Secure Profile Management in Smart Home Networks.” Proceedings of the 1st International Workshop on Secure and Ubiquitous Networks (SUN-2005), IEEE, 2005, doi:10.1109/DEXA.2005.171.
LibreCat | DOI
 

2003 | Book Chapter | LibreCat-ID: 5667
Schryen, Guido. “E-Democracy: Internet Voting.” Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2, IADIS Press, 2003, pp. 1017–21.
LibreCat
 

Filters and Search Terms

keyword="security"

Search

Filter Publications

Display / Sort

Citation Style: MLA

Export / Embed