Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

17 Publications


2022 | Dissertation | LibreCat-ID: 29769 | OA
Ahmed, Q. A. (2022). Hardware Trojans in Reconfigurable Computing. Paderborn University, Paderborn, Germany. https://doi.org/10.17619/UNIPB/1-1271
LibreCat | DOI | Download (ext.)
 

2022 | Conference Paper | LibreCat-ID: 37157
Eyilmez, K., Basyurt, A. S., Stieglitz, S., Fuchss, C., Kaufhold, M.-A., Reuter, C., & Mirbabaie, M. (2022). A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication. Australasian Conference on Information Systems (ACIS).
LibreCat
 

2020 | Book Chapter | LibreCat-ID: 21396
Jager, T., & Niehues, D. (2020). On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. In Lecture Notes in Computer Science. Cham. https://doi.org/10.1007/978-3-030-38471-5_13
LibreCat | Files available | DOI | Download (ext.)
 

2020 | Journal Article | LibreCat-ID: 16249 | OA
Szubartowicz, E., & Schryen, G. (2020). Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements. Journal of Information System Security, 16(1), 3–31.
LibreCat | Files available
 

2019 | Conference Paper | LibreCat-ID: 17667
Koning, R., Polevoy, G., Meijer, L., de Laat, C., & Grosso, P. (2019). Approaches for Collaborative Security Defences in Multi Network Environments. In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (pp. 113–123). https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9
LibreCat | DOI | Download (ext.)
 

2018 | Journal Article | LibreCat-ID: 17666
Koning, R., de Graaff, B., Polevoy, G., Meijer, R., de Laat, C., & Grosso, P. (2018). Measuring the efficiency of SDN mitigations against attacks on computer infrastructures. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2018.08.011
LibreCat | DOI
 

2018 | Journal Article | LibreCat-ID: 5586 | OA
Weishäupl, E., Yasasin, E., & Schryen, G. (2018). Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning. Computers & Security, 77, 807–823.
LibreCat | Files available
 

2016 | Conference Paper | LibreCat-ID: 20719
Holzinger, P., Triller, S., Bartel, A., & Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–790. http://doi.acm.org/10.1145/2976749.2978361
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 5588 | OA
Weishäupl, E., Yasasin, E., & Schryen, G. (2015). A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory. In International Conference on Information Systems.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 5590 | OA
Weishäupl, E., Kunz, M., Yasasin, E., Wagner, G., Prester, J., Schryen, G., & Pernul, G. (2015). Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In 2nd International Workshop on Security in highly connected IT Systems (SHCIS?15).
LibreCat | Files available
 

2009 | Journal Article | LibreCat-ID: 5621 | OA
Schryen, G., & Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics \& Security, 4(4 Part), 729–744.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5625 | OA
Schryen, G., & Kadura, R. (2009). Open Source vs. Closed Source Software: Towards Measuring Security. In 24th Annual ACM Symposium on Applied Computing.
LibreCat | Files available
 

2009 | Conference Paper | LibreCat-ID: 5647 | OA
Schryen, G. (2009). Security of open source and closed source software: An empirical comparison of published vulnerabilities. In 15th Americas Conference on Information Systems.
LibreCat | Files available
 

2008 | Conference Paper | LibreCat-ID: 5649 | OA
Schryen, G. (2008). Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. In 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business).
LibreCat | Files available
 

2007 | Journal Article | LibreCat-ID: 5658 | OA
Schryen, G. (2007). The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam ? An Empirical Analysis. Computers & Security, 2(5), 361–372.
LibreCat | Files available
 

2005 | Conference Paper | LibreCat-ID: 39050
Ziegler, M., Müller, W., Schäfer, R., & Loeser, C. (2005). Secure Profile Management in Smart Home Networks. Proceedings of the 1st International Workshop on Secure and Ubiquitous Networks (SUN-2005). 16th International Workshop on Database and Expert Systems Applications (DEXA’05), Copenhagen, Denmark . https://doi.org/10.1109/DEXA.2005.171
LibreCat | DOI
 

2003 | Book Chapter | LibreCat-ID: 5667
Schryen, G. (2003). E-Democracy: Internet Voting. In Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2 (pp. 1017–1021). Algarve: IADIS Press.
LibreCat
 

Filters and Search Terms

keyword="security"

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed