Lecture Notes in Informatics
Sicherheit 2016 - Sicherheit, Schutz und Zuverlässigkeit
Gesellschaft für Informatik, Bonn
2016
Editors
Michael Meier (ed.), Delphine Reinhardt (ed.), Steffen Wendzel (ed.)
Copyright © Gesellschaft für Informatik, Bonn
Contents
Articles
- Jens Braband
Why 2 times 2 ain't neccessarily 4 - at least not in IT security risk assessment
Pages: 1-10... Full Text
- Juergen Graf, Martin Hecker, Martin Mohr, Gregor Snelting
Sicherheitsanalyse mit JOANA
Pages: 11-21... Full Text
- Fabian Beterke
Distributed evolutionary fuzzing with evofuzz
Pages: 23-32... Full Text
- Jakob Rieck
Attacks on fitness trackers revisited: a case-study of unfit firmware security
Pages: 33-44... Full Text
- Christopher Corbett, Elmar Schoch, Frank Kargl, Felix Preussner
Automotive Ethernet: security opportunity or challenge?
Pages: 45-54... Full Text
- Ronny Merkel, Christian Kraetzer, Mario Hildebrandt, Stefan Kiltz, Sven Kuhlmann, Jana Dittmann
A semantic framework for a better understanding, investigation and prevention of organized financial crime
Pages: 55-66... Full Text
- Dominik Schürmann, Lars Wolf
Surreptitious sharing on android
Pages: 67-78... Full Text
- Sebastian Hahn, Mykola Protsenko, Tilo Müller
Comparative evaluation of machine learning-based malware detection on android.
Pages: 79-88... Full Text
- Christian Röpke
SDN malware: problems of current protection systems and potential countermeasures
Pages: 89-100... Full Text
- Vincent Haupert, Tilo Müller
Auf dem Weg verTAN:Über die Sicherheit App-basierter TAN-Verfahren
Pages: 101-112... Full Text
- Mariia Astrakhantceva, Günter Karjoth, Bettina Hübscher
Die Bordkarte als Authentifikationsmittel bei Flugreisen
Pages: 113-124... Full Text
- Moazzam Butt, Johannes Merkle, Ulrike Korte, Christoph Busch
Correlation-resistant fuzzy vault for fingerprints
Pages: 125-136... Full Text
- Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar Weippl
Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin
Pages: 137-148... Full Text
- Dominik Herrmann, Jens Lindemann
Obtaining personal data and asking for erasure: do app vendors and website owners honour your privacy rights?
Pages: 149-160... Full Text
- Severin Rast, Timo Brecher, Sabine Kammerhofer
IT-grundschutz in großen institutionen - herausforderungen und lösungsstrategien
Pages: 161-170... Full Text
- Florian Hertle
PT: Lessons learned bei KMUs aus dem Befall durch Ransomware
Pages: 171-175... Full Text
- Felix Schuckert
PT: Generating security vulnerabilities in source code
Pages: 177-182... Full Text
- Stefanie Jasser
Sicherheit im Softwareentwurf - Integrierte Modellierung von Security und Softwarearchitektur
Pages: 185-190... Full Text
- Saffija Kasem-Madani
A framework for encrypted computation on shared data
Pages: 191-196... Full Text
- Leonard Renners
Towards adaptive event prioritization for network security - ideas and challenges
Pages: 197-202... Full Text
- Siavash Valipour
Designing resilient and secure smart micro grids
Pages: 203-208... Full Text
- Tim Waage
Order preserving encryption for wide column stores
Pages: 209-214... Full Text
- Friedrich Praus, Wolfgang Kastner, Peter Palensky
Software security requirements in building automation
Pages: 217-228... Full Text
- Christian Müller, Frederik Armknecht, Zinaida Benenson, Philipp Morgner
On the security of the ZigBee light link touchlink commissioning procedure
Pages: 229-240... Full Text
- Harald Glanzer, Lukas Krammer, Wolfgang Kastner
Increasing security and availability in KNX networks
Pages: 241-252... Full Text
- Jernej Tonejc, Jaspreet Kaur, Alexandra Kobekova
Detecting anomalies in BACnet network data
Pages: 253-264... Full Text
Gesellschaft für Informatik, Bonn
ISBN 978-3-88579-650-3
Last changed 03.06.2016 15:41:47