Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space., , , , and . USENIX Security Symposium, USENIX Association, (2011)APT RPG: Design of a Gamified Attacker/Defender Meta Model., , , and . ICISSP, page 526-537. SciTePress, (2018)Security and privacy of smartphone messaging applications., , , , and . Int. J. Pervasive Comput. Commun., 11 (2): 132-150 (2015)PenQuest: a gamified attacker/defender meta model for cyber security assessment and education., , , , and . J. Comput. Virol. Hacking Tech., 16 (1): 19-61 (2020)Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process., , , , and . ICISSP, page 211-218. SCITEPRESS, (2024)Compiling and Analyzing Open Source Malware for Research Purposes., , , and . ICSSA, page 32-37. IEEE, (2020)Spoiled Onions: Exposing Malicious Tor Exit Relays., , , , , , and . Privacy Enhancing Technologies, volume 8555 of Lecture Notes in Computer Science, page 304-331. Springer, (2014)Using the structure of B+-trees for enhancing logging mechanisms of databases., , , , , and . iiWAS, page 301-304. ACM, (2011)Trees Cannot Lie: Using Data Structures for Forensics Purposes., , , , and . EISIC, page 282-285. IEEE Computer Soecity, (2011)What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications., , , , and . iiWAS, page 142-151. ACM, (2014)