Norbert Pohlmann
Norbert Pohlmann
Professor and Director
Verified email at - Homepage
Cited by
Cited by
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE symposium on security and privacy, 65-79, 2012
On Botnets that use DNS for Command and Control
CJ Dietrich, C Rossow, FC Freiling, H Bos, M Van Steen, N Pohlmann
2011 seventh european conference on computer network defense, 9-16, 2011
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M Van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
CJ Dietrich, C Rossow, N Pohlmann
Computer Networks 57 (2), 475-486, 2013
N Pohlmann
Cyber-Sicherheit, 353-401, 2022
Beyond the front page: Measuring third party dynamics in the field
T Urban, M Degeling, T Holz, N Pohlmann
Proceedings of The Web Conference 2020, 1275-1286, 2020
European Multilateral Secure Computing Base. Open Trusted Computing for You and Me
AR Sadeghi, C Stüble, N Pohlmann
Threat modeling for mobile health systems
M Cagnazzo, M Hertlein, T Holz, N Pohlmann
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW …, 2018
A study on subject data access in online advertising after the gdpr
T Urban, D Tatang, M Degeling, T Holz, N Pohlmann
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 61-79, 2019
Measuring the impact of the gdpr on data sharing in ad networks
T Urban, D Tatang, M Degeling, T Holz, N Pohlmann
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
Cyber-Sicherheit: Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von Cyber-Sicherheitssystemen in der Digitalisierung
N Pohlmann
Springer-Verlag, 2019
Information assurance education in two-and four-year institutions
LC Pérez, S Cooper, EK Hawthorne, S Wetzel, J Brynielsson, AG Gökce, ...
Proceedings of the 16th annual conference reports on Innovation and …, 2011
Wie wirtschaftlich sind IT-Sicherheitsmaßnahmen
N Pohlmann
HMD-Praxis Wirtschaftsinformatik 248, 26-34, 2006
The unwanted sharing economy: An analysis of cookie syncing and user transparency under GDPR
T Urban, D Tatang, M Degeling, T Holz, N Pohlmann
arXiv preprint arXiv:1811.08660, 2018
Exploiting visual appearance to cluster and detect rogue software
CJ Dietrich, C Rossow, N Pohlmann
Proceedings of the 28th annual ACM symposium on applied computing, 1776-1783, 2013
Der IT-Sicherheitsleitfaden. Das Pflichtenheft zur Implementierung von IT-Sicherheitsstandards im Unternehmen
N Pohlmann, HF Blumberg
Security analysis of OpenID, followed by a reference implementation of an nPA-based OpenID provider
S Feld, N Pohlmann
ISSE 2010 Securing Electronic Business Processes, 13-25, 2011
Towards understanding privacy implications of adware and potentially unwanted programs
T Urban, D Tatang, T Holz, N Pohlmann
European Symposium on Research in Computer Security, 449-469, 2018
Gdpirated–stealing personal information on-and offline
M Cagnazzo, T Holz, N Pohlmann
European Symposium on Research in Computer Security, 367-386, 2019
Blockchain-Technologie revolutioniert das digitale Business. Vertrauenswürdige Zusammenarbeit ohne zentrale Instanz
R Palkovits, N Pohlmann, I Schwedt
The system can't perform the operation now. Try again later.
Articles 1–20