Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Pöpper, Christina"'
The increasing reliance on AI-driven solutions, particularly Large Language Models (LLMs) like the GPT series, for information retrieval highlights the critical need for their factuality and fairness, especially amidst the rampant spread of misinform
Externí odkaz:
http://arxiv.org/abs/2401.17839
Peer review is the method employed by the scientific community for evaluating research advancements. In the field of cybersecurity, the practice of double-blind peer review is the de-facto standard. This paper touches on the holy grail of peer review
Externí odkaz:
http://arxiv.org/abs/2309.05457
Short Message Service (SMS) remains one of the most popular communication channels since its introduction in 2G cellular networks. In this paper, we demonstrate that merely receiving silent SMS messages regularly opens a stealthy side-channel that al
Externí odkaz:
http://arxiv.org/abs/2306.07695
Mobile instant messengers such as WhatsApp use delivery status notifications in order to inform users if a sent message has successfully reached its destination. This is useful and important information for the sender due to the often asynchronous us
Externí odkaz:
http://arxiv.org/abs/2210.10523
Autor:
Bitsikas, Evangelos, Pöpper, Christina
The Public Warning System (PWS) is an essential part of cellular networks and a country's civil protection. Warnings can notify users of hazardous events (e.g., floods, earthquakes) and crucial national matters that require immediate attention. PWS a
Externí odkaz:
http://arxiv.org/abs/2207.02506
Autor:
Darabseh, Ala', Pöpper, Christina
Automatic Dependent Surveillance Broadcast (ADS-B) sensors deployed on the ground are central to observing aerial movements of aircraft. Their unsystematic placement, however, results in over-densification of sensor coverage in some areas and insuffi
Externí odkaz:
http://arxiv.org/abs/2204.01994
Over the last decades, numerous security and privacy issues in all three active mobile network generations have been revealed that threaten users as well as network providers. In view of the newest generation (5G) currently under development, we now
Externí odkaz:
http://arxiv.org/abs/1710.08932
Publikováno v:
Communications of the ACM. Apr2021, Vol. 64 Issue 4, p96-101. 6p. 1 Color Photograph, 1 Chart, 1 Graph.
To perform successful remote timing attacks, an adversary typically collects a series of network timing measurements and subsequently performs statistical analysis to reveal a difference in execution time. The number of measurements that must be obta
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1131::de751f8f61e6136fd937dbb1c9e7fe09
https://lirias.kuleuven.be/handle/123456789/657938
https://lirias.kuleuven.be/handle/123456789/657938
Autor:
Schnitzler, Theodor (Dr.-Ing.), Utz, Christine (B. Sc.), Farke, Florian, Pöpper, Christina (Prof. Dr.), Dürmuth, Markus (Prof. Dr.-Ing.)
Contemporary mobile messaging provides rich text and multimedia functionality leaving detailed trails of sensitive user information that can span long periods of time. Allowing users to manage the privacy implications both on the sender and the recei
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3579::83e2433befc7875f1392b9be126064cb
https://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/7792
https://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/7792