BibTeX records: Eckehard Hermann

download as .bib file

@inproceedings{DBLP:conf/histocrypt/FurthauerMKELH22,
  author       = {Nino F{\"{u}}rthauer and
                  Vasily Mikhalev and
                  Nils Kopal and
                  Bernhard Esslinger and
                  Harald Lampesberger and
                  Eckehard Hermann},
  editor       = {Carola Dahlke and
                  Be{\'{a}}ta Megyesi},
  title        = {Evaluating Deep Learning Techniques for Known-Plaintext Attacks on
                  the Complete Columnar Transposition Cipher},
  booktitle    = {Proceedings of the 5th International Conference on Historical Cryptology,
                  HistoCrypt 2022, Amsterdam, The Netherlands, June 20-22, 2022},
  series       = {Link{\"{o}}ping Electronic Conference Proceedings},
  volume       = {188},
  pages        = {82--90},
  publisher    = {Link{\"{o}}ping University Electronic Press},
  year         = {2022},
  url          = {https://doi.org/10.3384/ecp188394},
  doi          = {10.3384/ECP188394},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/histocrypt/FurthauerMKELH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausdm/LeierzopfMKELH21,
  author       = {Ernst Leierzopf and
                  Vasily Mikhalev and
                  Nils Kopal and
                  Bernhard Esslinger and
                  Harald Lampesberger and
                  Eckehard Hermann},
  editor       = {Yue Xu and
                  X. Rosalind Wang and
                  Anton R. Lord and
                  Yee Ling Boo and
                  Richi Nayak and
                  Yanchang Zhao and
                  Graham Williams},
  title        = {Detection of Classical Cipher Types with Feature-Learning Approaches},
  booktitle    = {Data Mining - 19th Australasian Conference on Data Mining, AusDM,
                  Brisbane, QLD, Australia, December 14-15, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1504},
  pages        = {152--164},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-8531-6\_11},
  doi          = {10.1007/978-981-16-8531-6\_11},
  timestamp    = {Tue, 03 Jan 2023 15:21:32 +0100},
  biburl       = {https://dblp.org/rec/conf/ausdm/LeierzopfMKELH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/histocrypt/LeierzopfKELH21,
  author       = {Ernst Leierzopf and
                  Nils Kopal and
                  Bernhard Esslinger and
                  Harald Lampesberger and
                  Eckehard Hermann},
  editor       = {Carola Dahlke},
  title        = {A Massive Machine-Learning Approach For Classical Cipher Type Detection
                  Using Feature Engineering},
  booktitle    = {Proceedings of the 4th International Conference on Historical Cryptology,
                  HistoCrypt 2021, Amsterdam, The Netherlands, postponed to June 20-22,
                  2022},
  series       = {Link{\"{o}}ping Electronic Conference Proceedings},
  volume       = {183},
  pages        = {111--120},
  publisher    = {Link{\"{o}}ping University Electronic Press},
  year         = {2021},
  url          = {https://doi.org/10.3384/ecp183164},
  doi          = {10.3384/ECP183164},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/histocrypt/LeierzopfKELH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ism2/ZurheideHL20,
  author       = {Frank T. Zurheide and
                  Eckehard Hermann and
                  Harald Lampesberger},
  editor       = {Francesco Longo and
                  Michael Affenzeller and
                  Antonio Padovano},
  title        = {pyBNBowTie: Python library for Bow-Tie Analysis based on Bayesian
                  Networks},
  booktitle    = {Proceedings of the 2nd International Conference on Industry 4.0 and
                  Smart Manufacturing {(ISM} 2020), Virtual Event, Austria, 23-25 November
                  2020},
  series       = {Procedia Computer Science},
  volume       = {180},
  pages        = {344--351},
  publisher    = {Elsevier},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.procs.2021.01.172},
  doi          = {10.1016/J.PROCS.2021.01.172},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ism2/ZurheideHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HermannLHA19,
  author       = {Eckehard Hermann and
                  Harald Lampesberger and
                  Lena Heimberger and
                  Michael Altenhuber},
  title        = {Authentizit{\"{a}}t und Integrit{\"{a}}t des Aufnahmekontextes
                  von Bildern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {5},
  pages        = {281--286},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1108-4},
  doi          = {10.1007/S11623-019-1108-4},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/HermannLHA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Hermann13a,
  author       = {Eckehard Hermann},
  title        = {Entwicklung eines Sicherheitsmodells f{\"{u}}r offene verteilte
                  Web-Services-Anwendungen},
  school       = {University of Koblenz-Landau},
  year         = {2013},
  url          = {https://d-nb.info/1038020891},
  isbn         = {978-3-99033-162-0},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Hermann13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HermannG13,
  author       = {Eckehard Hermann and
                  R{\"{u}}diger Grimm},
  title        = {The Common Limes Security Model for Asset Flow Control in Decentralized,
                  Insecure Systems},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {208--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.28},
  doi          = {10.1109/ARES.2013.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HermannG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HermannLF12,
  author       = {Eckehard Hermann and
                  Udo Litschauer and
                  J{\"{u}}rgen Fu{\ss}},
  editor       = {Gerald Quirchmayr and
                  Josef Basl and
                  Ilsun You and
                  Lida Xu and
                  Edgar R. Weippl},
  title        = {A Formal Equivalence Classes Based Method for Security Policy Conformance
                  Checking},
  booktitle    = {Multidisciplinary Research and Practice for Information Systems -
                  {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and
                  Workshop on Availability, Reliability, and Security, {CD-ARES} 2012,
                  Prague, Czech Republic, August 20-24, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7465},
  pages        = {146--160},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32498-7\_12},
  doi          = {10.1007/978-3-642-32498-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HermannLF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HermannF11,
  author       = {Eckehard Hermann and
                  Dirk Fox},
  title        = {Blick in die Glaskugel},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {231},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0056-4},
  doi          = {10.1007/S11623-011-0056-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HermannF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WinterLZH11,
  author       = {Philipp Winter and
                  Harald Lampesberger and
                  Markus Zeilinger and
                  Eckehard Hermann},
  title        = {Anomalieerkennung in Computernetzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {235--239},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0059-1},
  doi          = {10.1007/S11623-011-0059-1},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WinterLZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HermannZ11,
  author       = {Eckehard Hermann and
                  Markus Zeilinger},
  title        = {{IT} Fr{\"{u}}hwarnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {285},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0069-z},
  doi          = {10.1007/S11623-011-0069-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HermannZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Hermann11,
  author       = {Eckehard Hermann},
  editor       = {A Min Tjoa and
                  Gerald Quirchmayr and
                  Ilsun You and
                  Lida Xu},
  title        = {A Security Policy Model for Agent Based Service-Oriented Architectures},
  booktitle    = {Availability, Reliability and Security for Business, Enterprise and
                  Health Information Systems - {IFIP} {WG} 8.4/8.9 International Cross
                  Domain Conference and Workshop, {ARES} 2011, Vienna, Austria, August
                  22-26, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6908},
  pages        = {13--25},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23300-5\_2},
  doi          = {10.1007/978-3-642-23300-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Hermann11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/WinterLZH11,
  author       = {Philipp Winter and
                  Harald Lampesberger and
                  Markus Zeilinger and
                  Eckehard Hermann},
  editor       = {Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Andreas Uhl},
  title        = {On Detecting Abrupt Changes in Network Entropy Time Series},
  booktitle    = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC}
                  11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7025},
  pages        = {194--205},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24712-5\_18},
  doi          = {10.1007/978-3-642-24712-5\_18},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cms/WinterLZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mediaforensics/ZaunerSH11,
  author       = {Christoph Zauner and
                  Martin Steinebach and
                  Eckehard Hermann},
  editor       = {Nasir D. Memon and
                  Jana Dittmann and
                  Adnan M. Alattar and
                  Edward J. Delp III},
  title        = {Rihamark: perceptual image hash benchmarking},
  booktitle    = {Media Forensics and Security III, San Francisco Airport, CA, USA,
                  January 24-26, 2011, Proceedings},
  series       = {{SPIE} Proceedings},
  volume       = {7880},
  pages        = {78800X},
  publisher    = {{SPIE}},
  year         = {2011},
  url          = {https://doi.org/10.1117/12.876617},
  doi          = {10.1117/12.876617},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mediaforensics/ZaunerSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/WinterHZ11,
  author       = {Philipp Winter and
                  Eckehard Hermann and
                  Markus Zeilinger},
  title        = {Inductive Intrusion Detection in Flow-Based Network Data Using One-Class
                  Support Vector Machines},
  booktitle    = {4th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2011, Paris, France, February 7-10, 2011},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/NTMS.2011.5720582},
  doi          = {10.1109/NTMS.2011.5720582},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/WinterHZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LampesbergerWZH11,
  author       = {Harald Lampesberger and
                  Philipp Winter and
                  Markus Zeilinger and
                  Eckehard Hermann},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {An On-Line Learning Statistical Model to Detect Malicious Web Requests},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {19--38},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_2},
  doi          = {10.1007/978-3-642-31909-9\_2},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LampesbergerWZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HermannZ09,
  author       = {Eckehard Hermann and
                  Markus Zeilinger},
  title        = {Schutz kritischer Infrastrukturen mittels IT-Fr{\"{u}}hwarnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {33},
  number       = {1},
  pages        = {42--46},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11623-009-0009-3},
  doi          = {10.1007/S11623-009-0009-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HermannZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LaggnerH07,
  author       = {Manuel Laggner and
                  Eckehard Hermann},
  title        = {Virtualisierende Rootkits, die fast perfekte Tarnung - Aufbau, Funktionsweise
                  {\&} Erkennung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {31},
  number       = {11},
  pages        = {822--826},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11623-007-0266-y},
  doi          = {10.1007/S11623-007-0266-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LaggnerH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LehnerH06,
  author       = {Marcel Lehner and
                  Eckehard Hermann},
  title        = {Auffinden von verschleierter Malware - Einsatz der heuristischen Analyse},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {30},
  number       = {12},
  pages        = {768--772},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11623-006-0237-8},
  doi          = {10.1007/S11623-006-0237-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LehnerH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/HermannK05,
  author       = {Eckehard Hermann and
                  Dieter Kessler},
  editor       = {Jana Dittmann and
                  Stefan Katzenbeisser and
                  Andreas Uhl},
  title        = {{XML} Signatures in an Enterprise Service Bus Environment},
  booktitle    = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2005, Salzburg, Austria, September
                  19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3677},
  pages        = {339--347},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552055\_44},
  doi          = {10.1007/11552055\_44},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/HermannK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HermannK03,
  author       = {Eckehard Hermann and
                  Dieter Kessler},
  title        = {XML-Signaturen in Datenbanken. Archivierung signierter Dokumente und
                  die Unterst{\"{u}}tzung von Signaturen durch Datenbanken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {27},
  number       = {12},
  year         = {2003},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HermannK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics