Zobrazeno 1 - 10
of 236
pro vyhledávání: '"Federrath, Hannes"'
Autor:
McDougall, Johanna Ansohn, Brighente, Alessandro, Kunstmann, Anne, Zapatka, Niklas, Federrath, Hannes
Abstract. Since the introduction of active discovery in Wi-Fi networks, users can be tracked via their probe requests. Although manufacturers typically try to conceal Media Access Control (MAC) addresses using MAC address randomisation, probe request
Externí odkaz:
http://arxiv.org/abs/2405.09230
Autor:
McDougall, Johanna Ansohn, Brighente, Alessandro, Großmann, Willi, McDougall, Ben Ansohn, Stock, Joshua, Federrath, Hannes
The Automatic Dependant Surveillance-Broadcast (ADS-B) message scheme was designed without any authentication or encryption of messages in place. It is therefore easily possible to attack it, e.g., by injecting spoofed messages or modifying the trans
Externí odkaz:
http://arxiv.org/abs/2308.15104
This work investigates the potential of Federated Learning (FL) for official statistics and shows how well the performance of FL models can keep up with centralized learning methods.F L is particularly interesting for official statistics because its
Externí odkaz:
http://arxiv.org/abs/2307.15503
Autor:
Ackermann, Ulrike, Albers, Marion, Albrecht, Jan Philipp, Dobusch, Leonhard, Federrath, Hannes, Ghiglieri, Marco, Hofstetter, Yvonne, Lange, Benjamin, Lichdi, Johannes, Näder, Johannes, Rosenbach, Marcel, Schaar, Peter, Simo, Hervais, Spielkamp, Matthias, Stark, Holger, Waidner, Michael
Publikováno v:
Netzpolitik.
Eine Welt digitaler Techniken im weitesten Sinne verändert die Kommunikationsbeziehungen, die sozialen Beziehungen der Menschen untereinander und damit auch die sozialen Verhältnisse der Menschen in der Gesellschaft in fundamentaler Weise. Wir steh
Autor:
McDougall, Johanna Ansohn, Burkert, Christian, Demmler, Daniel, Schwarz, Monina, Hubbe, Vincent, Federrath, Hannes
Probe requests help mobile devices discover active Wi-Fi networks. They often contain a multitude of data that can be used to identify and track devices and thereby their users. The past years have been a cat-and-mouse game of improving fingerprintin
Externí odkaz:
http://arxiv.org/abs/2206.03745
Case studies of application software data models indicate that timestamps are excessively used in connection with user activity. This contradicts the principle of data minimisation which demands a limitation to data necessary for a given purpose. Pri
Externí odkaz:
http://arxiv.org/abs/2205.13776
Publikováno v:
Proceedings of the 20th International Conference on Security and Cryptography SECRYPT (2023) 312-323
This work investigates and evaluates multiple defense strategies against property inference attacks (PIAs), a privacy attack against machine learning models. Given a trained machine learning model, PIAs aim to extract statistical properties of its un
Externí odkaz:
http://arxiv.org/abs/2205.08821
Cyber attacks in the maritime sector can have a major impact on world economy. However, the severity of this threat can be underestimated because many attacks remain unknown or unnoticed. We present an overview about publicly known cyber incidents in
Externí odkaz:
http://arxiv.org/abs/2112.06545
In today's digital society, the Tor network has become an indispensable tool for individuals to protect their privacy on the Internet. Operated by volunteers, relay servers constitute the core component of Tor and are used to geographically escape su
Externí odkaz:
http://arxiv.org/abs/2106.04277