Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Hanno Langweg"'
Publikováno v:
Computers & Security. 128:103121
Publikováno v:
2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW).
Publikováno v:
Computer Security ISBN: 9783030420505
IOSec/MSTEC/FINSEC@ESORICS
IOSec/MSTEC/FINSEC@ESORICS
We present source code patterns that are difficult for modern static code analysis tools. Our study comprises 50 different open source projects in both a vulnerable and a fixed version for XSS vulnerabilities reported with CVE IDs over a period of se
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::08aa16454fea2520ee82cb3aec1ad9f6
https://doi.org/10.1007/978-3-030-42051-2_9
https://doi.org/10.1007/978-3-030-42051-2_9
Publikováno v:
ICISSP
We propose and apply a requirements engineering approach that focuses on security and privacy properties and takes into account various stakeholder interests. The proposed methodology facilitates the integration of security and privacy by design into
Publikováno v:
BIOSIG
With the increased deployment of biometric authentication systems, some security concerns have also arisen. In particular, presentation attacks directed to the capture device pose a severe threat. In order to prevent them, liveness features such as t
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030026707
OTM Conferences (2)
OTM Conferences (2)
We identify 74 generic, reusable technical requirements based on the GDPR that can be applied to software products which process personal data. The requirements can be traced to corresponding articles and recitals of the GDPR and fulfill the key prin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::358d88814e668ad8144b07182aa504d8
https://doi.org/10.1007/978-3-030-02671-4_15
https://doi.org/10.1007/978-3-030-02671-4_15
Publikováno v:
CNS
We present an analysis of how to determine security requirements for software that controls routing decisions in the distribution of discrete physical goods. Requirements are derived from stakeholder interests and threat scenarios. Three deployment s
Autor:
Daniel Steidinger, Philipp Hehnle, Sabrina Lejn, Pascal Keilbach, Hanno Langweg, Marina Weinbrenner, Hyun-Jin Lee
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319662831
SAFECOMP Workshops
SAFECOMP Workshops
We present an approach to reduce the complexity of adjusting privacy preferences for multiple online social networks. To achieve this, we quantify the effect on privacy for choices that users make, and simplify configuration by introducing privacy co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::aba9fcc50f4dc8185efc7dcfc574928d
https://doi.org/10.1007/978-3-319-66284-8_37
https://doi.org/10.1007/978-3-319-66284-8_37
Autor:
Hanno Langweg, Yi-Ching Liao
Publikováno v:
The Journal of Digital Forensics, Security and Law
To learn from the past, we analyse 1,088 "computer as a target" judgements for evidential reasoning by extracting four case elements: decision, intent, fact, and evidence. Analysing the decision element is essential for studying the scale of sentence