Refine
Departments, institutes and facilities
- Institut für Cyber Security & Privacy (ICSP) (60) (remove)
Document Type
- Article (60) (remove)
Year of publication
Keywords
- Intelligent Transport System (2)
- Public Key Infrastructure (2)
- Usable Security (2)
- Vehicular Ad hoc Networks (2)
- usable privacy (2)
- API Documentation (1)
- Adaptive Streaming (1)
- Affective computing (1)
- Antifuse memory (1)
- Artificial Intelligence (1)
- Big Data Analysis (1)
- Certificates (1)
- Chip ID (1)
- CoAP (1)
- Code Generation (1)
- Content Security Policies (1)
- Cooperative Awareness Message (1)
- Counterfeit protection (1)
- D [Software] (1)
- DASH (1)
- Developer Centered Security (1)
- Digital signatures (1)
- Disaster area scenario (1)
- Domain-Specific Modeling Languages, (1)
- Domestic service robots (1)
- EM leakage (1)
- Earth Observation (1)
- GDPR (1)
- HTML5 (1)
- HTTP (1)
- HTTPS (1)
- Human robot interaction (1)
- Human-Robot-Interaction (HRI) (1)
- IC identification (1)
- IoT services security (1)
- Language Engineering (1)
- Large-Scale Online Services (1)
- Leakage circuits (1)
- Legal metrology (1)
- Live Streaming (1)
- Machine Learning (1)
- Manipulation tasks (1)
- Mobility modeling (1)
- Model-Driven Engineering (1)
- Privacy (1)
- Process Models (1)
- Pseudonym Concept (1)
- RACS (1)
- REST (1)
- Rapid Prototyping (1)
- Risk-based Authentication (1)
- Robot Perception (1)
- SELMA (1)
- SOA (1)
- Secure Coding Practices (1)
- Secure data transfer (1)
- Semantic scene understanding (1)
- Side channels (1)
- Smart Card (1)
- Smart Card User Interface Design, Interactive Smart Card Applications (1)
- Stream cipher (1)
- TOGBAD (1)
- Testing (1)
- Usability (1)
- Vehicle-2-Vehicle Communication (1)
- Vehicle-to-Infrastructure Communication (1)
- Vehicle-to-Vehicle Com- munication (1)
- Video (1)
- Web Security (1)
- WebSockets (1)
- Wireless multi-hop networks (1)
- emotion recognition (1)
- employee privacy (1)
- factor analysis (1)
- force sensing (1)
- human-centred design (1)
- humanoidrobot (1)
- informational self-determination (1)
- intervention mechanisms (1)
- intrusion detection (1)
- latent class analysis (1)
- mental models (1)
- model-driven engineering (1)
- privacy at work (1)
- privacy by design (1)
- reverse engineering, malware, machine learning (1)
- routing attacks (1)
- run-time adaptation (1)
- security (1)
- security and privacy literacy (1)
- sensor fusion (1)
- services (1)
- simulation (1)
- slip detection (1)
- social robots (1)
- software variability (1)
- structural equation modeling (1)
- tactical environments (1)
- tactical multi-hop networks (1)
- tactile sensing (1)
- transparency-enhancing technologies (1)
- usable privacy controls (1)
- web services security (1)
- wormhole detection (1)
Competitions for Benchmarking: Task and Functionality Scoring Complete Performance Assessment
(2015)
Usable Security und Privacy
(2010)
Today’s computer systems face a vast array of severe threats that are posed by automated attacks performed by malicious software as well as manual attacks by individual humans. These attacks not only differ in their technical implementation but may also be location-dependent. Consequentially, it is necessary to join the information from heterogeneous and distributed attack sensors in order to acquire comprehensive information on current ongoing cyber attacks.
Routing Attacks are a serious threat to communication in tactical MANETs. TOGBAD is a centralised approach, using topology graphs to detect such attacks. In this paper, we present TOGBAD's newly added wormhole detection capability. It is an adaptation of a wormhole detection method developed by Hu et al. This method is based on nodes' positions. We adapted it to the specific properties of tactical environments. Furthermore, we present simulation results which show TOGBAD's performance regarding the detection of wormhole attacks.
We present a systematization of usable security principles, guidelines and patterns to facilitate the transfer of existing knowledge to researchers and practitioners. Based on a literature review, we extracted 23 principles, 11 guidelines and 47 patterns for usable security and identified their interconnection. The results indicate that current research tends to focus on only a subset of important principles. The fact that some principles are not yet addressed by any design patterns suggests that further work on refining these patterns is needed. We developed an online repository, which stores the harmonized principles, guidelines and patterns. The tool enables users to search for relevant guidance and explore it in an interactive and programmatic manner. We argue that both the insights presented in this article and the web-based repository will be highly valuable for students to get a good overview, practitioners to implement usable security and researchers to identify areas of future research.
Web of Services Security
(2015)