Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Eckehard Hermann
@inproceedings{DBLP:conf/histocrypt/FurthauerMKELH22, author = {Nino F{\"{u}}rthauer and Vasily Mikhalev and Nils Kopal and Bernhard Esslinger and Harald Lampesberger and Eckehard Hermann}, editor = {Carola Dahlke and Be{\'{a}}ta Megyesi}, title = {Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher}, booktitle = {Proceedings of the 5th International Conference on Historical Cryptology, HistoCrypt 2022, Amsterdam, The Netherlands, June 20-22, 2022}, series = {Link{\"{o}}ping Electronic Conference Proceedings}, volume = {188}, pages = {82--90}, publisher = {Link{\"{o}}ping University Electronic Press}, year = {2022}, url = {https://doi.org/10.3384/ecp188394}, doi = {10.3384/ECP188394}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/histocrypt/FurthauerMKELH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausdm/LeierzopfMKELH21, author = {Ernst Leierzopf and Vasily Mikhalev and Nils Kopal and Bernhard Esslinger and Harald Lampesberger and Eckehard Hermann}, editor = {Yue Xu and X. Rosalind Wang and Anton R. Lord and Yee Ling Boo and Richi Nayak and Yanchang Zhao and Graham Williams}, title = {Detection of Classical Cipher Types with Feature-Learning Approaches}, booktitle = {Data Mining - 19th Australasian Conference on Data Mining, AusDM, Brisbane, QLD, Australia, December 14-15, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1504}, pages = {152--164}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-8531-6\_11}, doi = {10.1007/978-981-16-8531-6\_11}, timestamp = {Tue, 03 Jan 2023 15:21:32 +0100}, biburl = {https://dblp.org/rec/conf/ausdm/LeierzopfMKELH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/histocrypt/LeierzopfKELH21, author = {Ernst Leierzopf and Nils Kopal and Bernhard Esslinger and Harald Lampesberger and Eckehard Hermann}, editor = {Carola Dahlke}, title = {A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering}, booktitle = {Proceedings of the 4th International Conference on Historical Cryptology, HistoCrypt 2021, Amsterdam, The Netherlands, postponed to June 20-22, 2022}, series = {Link{\"{o}}ping Electronic Conference Proceedings}, volume = {183}, pages = {111--120}, publisher = {Link{\"{o}}ping University Electronic Press}, year = {2021}, url = {https://doi.org/10.3384/ecp183164}, doi = {10.3384/ECP183164}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/histocrypt/LeierzopfKELH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ism2/ZurheideHL20, author = {Frank T. Zurheide and Eckehard Hermann and Harald Lampesberger}, editor = {Francesco Longo and Michael Affenzeller and Antonio Padovano}, title = {pyBNBowTie: Python library for Bow-Tie Analysis based on Bayesian Networks}, booktitle = {Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing {(ISM} 2020), Virtual Event, Austria, 23-25 November 2020}, series = {Procedia Computer Science}, volume = {180}, pages = {344--351}, publisher = {Elsevier}, year = {2020}, url = {https://doi.org/10.1016/j.procs.2021.01.172}, doi = {10.1016/J.PROCS.2021.01.172}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ism2/ZurheideHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HermannLHA19, author = {Eckehard Hermann and Harald Lampesberger and Lena Heimberger and Michael Altenhuber}, title = {Authentizit{\"{a}}t und Integrit{\"{a}}t des Aufnahmekontextes von Bildern}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {5}, pages = {281--286}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1108-4}, doi = {10.1007/S11623-019-1108-4}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/HermannLHA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Hermann13a, author = {Eckehard Hermann}, title = {Entwicklung eines Sicherheitsmodells f{\"{u}}r offene verteilte Web-Services-Anwendungen}, school = {University of Koblenz-Landau}, year = {2013}, url = {https://d-nb.info/1038020891}, isbn = {978-3-99033-162-0}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Hermann13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HermannG13, author = {Eckehard Hermann and R{\"{u}}diger Grimm}, title = {The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {208--217}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.28}, doi = {10.1109/ARES.2013.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HermannG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HermannLF12, author = {Eckehard Hermann and Udo Litschauer and J{\"{u}}rgen Fu{\ss}}, editor = {Gerald Quirchmayr and Josef Basl and Ilsun You and Lida Xu and Edgar R. Weippl}, title = {A Formal Equivalence Classes Based Method for Security Policy Conformance Checking}, booktitle = {Multidisciplinary Research and Practice for Information Systems - {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, {CD-ARES} 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7465}, pages = {146--160}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32498-7\_12}, doi = {10.1007/978-3-642-32498-7\_12}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HermannLF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HermannF11, author = {Eckehard Hermann and Dirk Fox}, title = {Blick in die Glaskugel}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {231}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0056-4}, doi = {10.1007/S11623-011-0056-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HermannF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WinterLZH11, author = {Philipp Winter and Harald Lampesberger and Markus Zeilinger and Eckehard Hermann}, title = {Anomalieerkennung in Computernetzen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {235--239}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0059-1}, doi = {10.1007/S11623-011-0059-1}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WinterLZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HermannZ11, author = {Eckehard Hermann and Markus Zeilinger}, title = {{IT} Fr{\"{u}}hwarnung}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {285}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0069-z}, doi = {10.1007/S11623-011-0069-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HermannZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Hermann11, author = {Eckehard Hermann}, editor = {A Min Tjoa and Gerald Quirchmayr and Ilsun You and Lida Xu}, title = {A Security Policy Model for Agent Based Service-Oriented Architectures}, booktitle = {Availability, Reliability and Security for Business, Enterprise and Health Information Systems - {IFIP} {WG} 8.4/8.9 International Cross Domain Conference and Workshop, {ARES} 2011, Vienna, Austria, August 22-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6908}, pages = {13--25}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23300-5\_2}, doi = {10.1007/978-3-642-23300-5\_2}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Hermann11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/WinterLZH11, author = {Philipp Winter and Harald Lampesberger and Markus Zeilinger and Eckehard Hermann}, editor = {Bart De Decker and Jorn Lapon and Vincent Naessens and Andreas Uhl}, title = {On Detecting Abrupt Changes in Network Entropy Time Series}, booktitle = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC} 11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7025}, pages = {194--205}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24712-5\_18}, doi = {10.1007/978-3-642-24712-5\_18}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/WinterLZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mediaforensics/ZaunerSH11, author = {Christoph Zauner and Martin Steinebach and Eckehard Hermann}, editor = {Nasir D. Memon and Jana Dittmann and Adnan M. Alattar and Edward J. Delp III}, title = {Rihamark: perceptual image hash benchmarking}, booktitle = {Media Forensics and Security III, San Francisco Airport, CA, USA, January 24-26, 2011, Proceedings}, series = {{SPIE} Proceedings}, volume = {7880}, pages = {78800X}, publisher = {{SPIE}}, year = {2011}, url = {https://doi.org/10.1117/12.876617}, doi = {10.1117/12.876617}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mediaforensics/ZaunerSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/WinterHZ11, author = {Philipp Winter and Eckehard Hermann and Markus Zeilinger}, title = {Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines}, booktitle = {4th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2011, Paris, France, February 7-10, 2011}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/NTMS.2011.5720582}, doi = {10.1109/NTMS.2011.5720582}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/WinterHZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LampesbergerWZH11, author = {Harald Lampesberger and Philipp Winter and Markus Zeilinger and Eckehard Hermann}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {An On-Line Learning Statistical Model to Detect Malicious Web Requests}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {19--38}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_2}, doi = {10.1007/978-3-642-31909-9\_2}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LampesbergerWZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HermannZ09, author = {Eckehard Hermann and Markus Zeilinger}, title = {Schutz kritischer Infrastrukturen mittels IT-Fr{\"{u}}hwarnung}, journal = {Datenschutz und Datensicherheit}, volume = {33}, number = {1}, pages = {42--46}, year = {2009}, url = {https://doi.org/10.1007/s11623-009-0009-3}, doi = {10.1007/S11623-009-0009-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HermannZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LaggnerH07, author = {Manuel Laggner and Eckehard Hermann}, title = {Virtualisierende Rootkits, die fast perfekte Tarnung - Aufbau, Funktionsweise {\&} Erkennung}, journal = {Datenschutz und Datensicherheit}, volume = {31}, number = {11}, pages = {822--826}, year = {2007}, url = {https://doi.org/10.1007/s11623-007-0266-y}, doi = {10.1007/S11623-007-0266-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LaggnerH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LehnerH06, author = {Marcel Lehner and Eckehard Hermann}, title = {Auffinden von verschleierter Malware - Einsatz der heuristischen Analyse}, journal = {Datenschutz und Datensicherheit}, volume = {30}, number = {12}, pages = {768--772}, year = {2006}, url = {https://doi.org/10.1007/s11623-006-0237-8}, doi = {10.1007/S11623-006-0237-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LehnerH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/HermannK05, author = {Eckehard Hermann and Dieter Kessler}, editor = {Jana Dittmann and Stefan Katzenbeisser and Andreas Uhl}, title = {{XML} Signatures in an Enterprise Service Bus Environment}, booktitle = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2005, Salzburg, Austria, September 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3677}, pages = {339--347}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552055\_44}, doi = {10.1007/11552055\_44}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/HermannK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HermannK03, author = {Eckehard Hermann and Dieter Kessler}, title = {XML-Signaturen in Datenbanken. Archivierung signierter Dokumente und die Unterst{\"{u}}tzung von Signaturen durch Datenbanken}, journal = {Datenschutz und Datensicherheit}, volume = {27}, number = {12}, year = {2003}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HermannK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.