Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

APT RPG: Design of a Gamified Attacker/Defender Meta Model., , , and . ICISSP, page 526-537. SciTePress, (2018)Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space., , , , and . USENIX Security Symposium, USENIX Association, (2011)Security and privacy of smartphone messaging applications., , , , and . Int. J. Pervasive Comput. Commun., 11 (2): 132-150 (2015)PenQuest: a gamified attacker/defender meta model for cyber security assessment and education., , , , and . J. Comput. Virol. Hacking Tech., 16 (1): 19-61 (2020)Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process., , , , and . ICISSP, page 211-218. SCITEPRESS, (2024)Compiling and Analyzing Open Source Malware for Research Purposes., , , and . ICSSA, page 32-37. IEEE, (2020)InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles., , , , and . Sicherheit, volume P-228 of LNI, page 363-374. GI, (2014)Spoiled Onions: Exposing Malicious Tor Exit Relays., , , , , , and . Privacy Enhancing Technologies, volume 8555 of Lecture Notes in Computer Science, page 304-331. Springer, (2014)Trees Cannot Lie: Using Data Structures for Forensics Purposes., , , , and . EISIC, page 282-285. IEEE Computer Soecity, (2011)What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications., , , , and . iiWAS, page 142-151. ACM, (2014)