Publications
Intervenierbarkeit zum Schutz informationeller Selbstbestimmung
2018 - Martin Degeling, Thomas Herrmann
In "Die Fortentwicklung des Datenschutzes: Zwischen Systemgestaltung und Selbstregulierung", edited by Alexander Roßnagel, Michael Friedewald, and Marit Hansen, 193–208. DuD-Fachbeiträge. Wiesbaden: Springer Fachmedien Wiesbaden. [Springer.com] [DOI]Googles Interessenprofiling
2017 - Martin Degeling
in "Profile: Interdisziplinäre Beiträge"On Locational Privacy in the Absence of Anonymous Payments
2015 - Tilman Frosch, Sven Schäge, Martin Goll, Thorsten Holz
Gutwirth, S., Leenes R., P. De Hert and Y. Poullet, Data protection on the Move. Current Developments in ICT and Privacy/Data Protection. Springer (forthcoming, 2015), Dordrecht. [pdf]Security and Privacy as Hygiene Factors of Developer Behavior in Small and Agile Teams
2014 - Kai-Uwe Loser, Martin Degeling
In ICT and Society, edited by Kai Kimppa, Diane Whitehouse, Tiina Kuusela, and Jackie Phahlamohlaka, 255–65. IFIP Advances in Information and Communication Technology 431. Springer Berlin Heidelberg. [doi]Scriptless attacks: Stealing more pie without touching the sill
2014 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk
Journal of Computer Security, Volume 22, Number 4 / 2014, Web Application Security – Web @ 25 [URL]Profiling, Prediction und Privatheit: Über das Verhältnis eines liberalen Privatheitbegriffs zu neueren Techniken der Verhaltensvorhersage
2014 - Martin Degeling
In Medien und Privatheit, edited by Simon Garnett, Stefan Halft, Matthias Herz, and Julia Maria Mönig, 69–92. Medien, Texte, Semiotik 7. Passau: Verlag Karl Stutz. [pdf]Predentifier: Detecting Botnet C&C Domains From Passive DNS Data
2013 - Tilman Frosch, Marc Kührer, Thorsten Holz
Advances in IT Early Warning, Fraunhofer Verlag, February 2013. ISBN: 978-3-8396-0474-8 [Book Website] [PDF]Securing the Access to Electronic Health Records on Mobile Phones
2011 - Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
Biomedical Engineering Systems and Technologies 2011 - Revised Selected Papers, Springer-Verlag, 2011. [PDF]Verfolgen und Abschwächen von Malicious Remote Control Networks
2010 - Thorsten Holz
Ausgezeichnete Informatikdissertationen 2009. LNI D-10, pages 101-110, May 2010 [Dagstuhl Seminar]Analyzing Mobile Malware
2008 - Michael Becher, Ralf Hund
Chapter 8 in "Mobile Malware Attacks and Defense", Syngress Media, October 2008Security Measurements and Metrics for Networks
2005 - Thorsten Holz
Dependability Metrics (Lecture Notes in Computer Science 4909, Advanced Lectures), pages 157-165, 2005 [Link]