Katharina Kohls
Katharina Kohls
Verified email at rub.de
Title
Cited by
Cited by
Year
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
L Schönherr, K Kohls, S Zeiler, T Holz, D Kolossa
Network and Distributed System Security Symposium (NDSS), 2019
612019
Breaking LTE on Layer Two
D Rupprecht, K Kohls, T Holz, C Pöpper
IEEE Symposium on Security and Privacy, 0, 2019
432019
Neuralyzer: flexible expiration times for the revocation of online data
A Zarras, K Kohls, M Dürmuth, C Pöpper
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
172016
Skypeline: Robust hidden data transmission for VoIP
K Kohls, T Holz, D Kolossa, C Pöpper
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
82016
I-DWRR—An insolvency enabled scheduling scheme extending Deficit Weighted Round Robin
PB Bök, K Kohls, Y Tüchelmann, K Kollorz
2011 IEEE GLOBECOM Workshops (GC Wkshps), 695-700, 2011
62011
POSTER: Traffic Analysis Attacks in Anonymity Networks
KS Kohls, C Pöpper
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
52017
Distributed flow permission inspection for mission-critical communication of untrusted autonomous vehicles
PB Bok, KS Kohls, D Behnke, C Wietfeld
2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), 1-6, 2014
42014
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two
K Kohls, D Rupprecht, T Holz, C Pöpper
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
32019
On the Challenges of Geographical Avoidance for Tor
K Kohls, K Jansen, D Rupprecht, T Holz, C Pöpper
Network and Distributed System Security Symposium (NDSS), 2019
32019
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
K Kohls, C Pöpper
European Symposium on Research in Computer Security, 512-530, 2018
32018
BIM-basierte Bauablaufsimulation von Hochbauten
K Kohls, M Block, A Marx, M Hamm
Forum Bauinformatik, 145-152, 2010
32010
Call Me Maybe: Eavesdropping Encrypted {LTE} Calls With ReVoLTE
D Rupprecht, K Kohls, T Holz, C Pöpper
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
2020
Internet Anonymity and Privacy in the Presence of Large-Scale Adversaries
KS Kohls
Ruhr University Bochum, Germany, 2019
2019
Improving the Distributed Fair Congestion Avoidance Protocol for Home Area Networks with Internet Access Links
PB Bok, K Kohls, S Dunhaupt, Y Tuchelmann
2012 21st International Conference on Computer Communications and Networks …, 2012
2012
IMP4GT: IMPersonation Attacks in 4G NeTworks
D Rupprecht, K Kohls, T Holz, C Pöpper
Poster: Application-Layer Routing Attacks on Tor
K Kohls, C Pöpper
Robust Hidden Data Transmission for VoIP
K Kohls, T Holz, D Kolossa, C Pöpper
The system can't perform the operation now. Try again later.
Articles 1–17