Folgen
Dennis Tatang
Dennis Tatang
Bestätigte E-Mail-Adresse bei rub.de
Titel
Zitiert von
Zitiert von
Jahr
Measuring the impact of the GDPR on data sharing in ad networks
T Urban, D Tatang, M Degeling, T Holz, N Pohlmann
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
752020
A study on subject data access in online advertising after the GDPR
T Urban, D Tatang, M Degeling, T Holz, N Pohlmann
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2019
662019
SDN-GUARD: Protecting SDN Controllers Against SDN Rootkits
D Tatang, F Quinkert, J Frank, C Röpke, T Holz
IEEE Conference on Network Function Virtualization and Software Defined …, 2017
542017
An empirical study on online price differentiation
T Hupperich, D Tatang, N Wilkop, T Holz
Proceedings of the eighth ACM conference on data and application security …, 2018
452018
The unwanted sharing economy: An analysis of cookie syncing and user transparency under GDPR
T Urban, D Tatang, M Degeling, T Holz, N Pohlmann
arXiv preprint arXiv:1811.08660, 2018
332018
Reining in the web's inconsistencies with site policy
S Calzavara, T Urban, D Tatang, M Steffens, B Stock
Proceedings of the Network and Distributed System Security Symposium 2021, 2021
282021
Towards understanding privacy implications of adware and potentially unwanted programs
T Urban, D Tatang, T Holz, N Pohlmann
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
222018
Masters of time: An overview of the NTP ecosystem
T Rytilahti, D Tatang, J Köpper, T Holz
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 122-136, 2018
202018
The evolution of dns-based email authentication: Measuring adoption and finding flaws
D Tatang, F Zettl, T Holz
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
182021
A study of newly observed hostnames and DNS tunneling in the wild
D Tatang, F Quinkert, N Dolecki, T Holz
arXiv preprint arXiv:1902.08454, 2019
142019
Large-scale Analysis of Infrastructure-leaking DNS Servers
D Tatang, C Schneider, T Holz
Con­fe­rence on De­tec­tion of In­tru­si­ons and Mal­wa­re & Vul­nerabi­li­ty As­sess­ment …, 2019
132019
A first large-scale analysis on usage of mta-sts
D Tatang, R Flume, T Holz
Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021
122021
Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces
T Urban, M Große-Kampmann, D Tatang, T Holz, N Pohlmann
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
92020
Measuring the Impact of the GDPR on Data Sharing
T Urban, D Tatang, M Degeling, T Holz, N Pohlmann
ACM Asia Conference on Computer and Communications Security (AsiaCCS). https …, 2020
72020
Below the radar: spotting DNS tunnels in newly observed hostnames in the wild
D Tatang, F Quinkert, T Holz
2019 APWG Symposium on Electronic Crime Research (eCrime), 1-15, 2019
72019
Study of DNS rebinding attacks on smart home devices
D Tatang, T Suurland, T Holz
Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE …, 2020
62020
Cybersecurity research: Challenges and course of action
J Müller-Quade, M Backes, P Buxmann, C Eckert, T Holz
Tech. Rep, 2019
52019
Analyzing leakage of personal information by malware
T Urban, D Tatang, T Holz, N Pohlmann
Journal of Computer Security 27 (4), 459-481, 2019
32019
An Empirical Study on Price Differentiation Based on System Fingerprints
T Hupperich, D Tatang, N Wilkop, T Holz
arXiv preprint arXiv:1712.03031, 2017
32017
Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy
F Quinkert, D Tatang, T Holz
Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021
22021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20