Folgen
Norbert Pohlmann
Norbert Pohlmann
Professor and Director
Bestätigte E-Mail-Adresse bei norbert-pohlmann.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE symposium on security and privacy, 65-79, 2012
3252012
On botnets that use DNS for command and control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann
2011 seventh european conference on computer network defense, 9-16, 2011
1922011
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
CJ Dietrich, C Rossow, N Pohlmann
Computer Networks 57 (2), 475-486, 2013
1382013
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1372011
Cyber-Sicherheit
N Pohlmann
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …, 2019
1092019
Design rationale behind the identity metasystem architecture
N Pohlmann, H Reimer, W Schneider, K Cameron, MB Jones
Isse/secure 2007 Securing Electronic Business Processes: Highlights of the …, 2007
1072007
Beyond the front page: Measuring third party dynamics in the field
T Urban, M Degeling, T Holz, N Pohlmann
Proceedings of the web conference 2020, 1275-1286, 2020
962020
Measuring the impact of the GDPR on data sharing in ad networks
T Urban, D Tatang, M Degeling, T Holz, N Pohlmann
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
842020
A study on subject data access in online advertising after the GDPR
T Urban, D Tatang, M Degeling, T Holz, N Pohlmann
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2019
822019
Threat modeling for mobile health systems
M Cagnazzo, M Hertlein, T Holz, N Pohlmann
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW …, 2018
672018
Firewall-Systeme. Firewall-Elemente und Sicherheitskonzepte, Verschlüsselungs-und Authentikationsverfahren, Security Audit, Bedrohungsprofile, IT-Kostenschätzung
N Pohlmann
55*2003
European Multilateral Secure Computing Base. Open Trusted Computing for You and Me
AR Sadeghi, C Stüble, N Pohlmann
532004
Managing information security in small and medium sized enterprises: a holistic approach
N Pohlmann, H Reimer, W Schneider, A Tawileh, J Hilton, S McIntosh
ISSE/SECURE 2007 Securing Electronic Business Processes: Highlights of the …, 2007
502007
Dealing with Privacy Obligations in Enterprises.
MC Mont
ISSE, 198-208, 2004
392004
Reproducibility and replicability of web measurement studies
N Demir, M Große-Kampmann, T Urban, C Wressnegger, T Holz, ...
Proceedings of the ACM Web Conference 2022, 533-544, 2022
382022
Setting up an effective information security awareness programme
N Pohlmann, H Reimer, W Schneider, D De Maeyer
ISSE/SECURE 2007 Securing Electronic Business Processes: Highlights of the …, 2007
382007
The unwanted sharing economy: An analysis of cookie syncing and user transparency under GDPR
T Urban, D Tatang, M Degeling, T Holz, N Pohlmann
arXiv preprint arXiv:1811.08660, 2018
372018
SPEECH: Secure personal end-to-end communication with handheld
S Paulus, N Pohlmann, H Reimer, A Castiglione, G Cattaneo, A De Santis, ...
ISSE 2006—Securing Electronic Busines Processes: Highlights of the …, 2006
312006
Information assurance education in two-and four-year institutions
LC Pérez, S Cooper, EK Hawthorne, S Wetzel, J Brynielsson, AG Gökce, ...
Proceedings of the 16th annual conference reports on Innovation and …, 2011
302011
"Your hashed IP address: Ubuntu." perspectives on transparency tools for online advertising
T Urban, M Degeling, T Holz, N Pohlmann
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
262019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20