


Остановите войну!
for scientists:


default search action
Günther Pernul
Person information

- affiliation: University of Regensburg, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j53]Philip Empl
, Günther Pernul
:
Digital-Twin-Based Security Analytics for the Internet of Things. Inf. 14(2): 95 (2023) - 2022
- [j52]Sascha Kern
, Thomas Baumer
, Sebastian Groll, Ludwig Fuchs, Günther Pernul
:
Optimization of Access Control Policies. J. Inf. Secur. Appl. 70: 103301 (2022) - [j51]Fabian Böhm
, Manfred Vielberth
, Günther Pernul
:
Formalizing and Integrating User Knowledge into Security Analytics. SN Comput. Sci. 3(5): 347 (2022) - [c138]Philip Empl, Daniel Schlette, Daniel Zupfer, Günther Pernul:
SOAR4IoT: Securing IoT Assets with Digital Twins. ARES 2022: 4:1-4:10 - [c137]Benedikt Putz, Manfred Vielberth, Günther Pernul:
BISCUIT - Blockchain Security Incident Reporting based on Human Observations. ARES 2022: 27:1-27:6 - [c136]Marietheres Dietz
, Leon Hageman, Constantin von Hornung, Günther Pernul:
Employing Digital Twins for Security-by-Design System Testing. SAT-CPS@CODASPY 2022: 97-106 - [c135]Marietheres Dietz, Daniel Schlette, Günther Pernul:
Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence. COMPSAC 2022: 789-797 - [c134]Andreas Reisser, Manfred Vielberth, Sofia Fohringer, Günther Pernul:
Security Operations Center Roles and Skills: A Comparison of Theory and Practice. DBSec 2022: 316-327 - [c133]Magdalena Glas
, Manfred Vielberth
, Tobias Reittinger
, Fabian Böhm
, Günther Pernul
:
Visual Programming in Cyber Range Training to Improve Skill Development. HAISA 2022: 3-13 - [c132]Benedikt Putz, Günther Pernul:
Comparing Successful DLT Consortia: A Lifecycle Perspective. HICSS 2022: 1-10 - [c131]Sabrina Friedl
, Magdalena Glas
, Ludwig Englbrecht
, Fabian Böhm
, Günther Pernul
:
ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics. World Conference on Information Security Education 2022: 77-91 - [c130]Sabrina Friedl
, Ludwig Englbrecht
, Fabian Böhm
, Günther Pernul
:
Support Tool Selection in Digital Forensics Training. UbiSec 2022: 3-21 - 2021
- [j50]Florian Menges, Tobias Latzo, Manfred Vielberth
, Sabine Sobola, Henrich C. Pöhls, Benjamin Taubmann, Johannes Köstler, Alexander Puchta, Felix C. Freiling, Hans P. Reiser, Günther Pernul:
Towards GDPR-compliant data processing in modern SIEM systems. Comput. Secur. 103: 102165 (2021) - [j49]Daniel Schlette
, Manfred Vielberth, Günther Pernul:
CTI-SOC2M2 - The quest for mature, intelligence-driven security operations and incident response capabilities. Comput. Secur. 111: 102482 (2021) - [j48]Daniel Schlette
, Marco Caselli
, Günther Pernul:
A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective. IEEE Commun. Surv. Tutorials 23(4): 2525-2556 (2021) - [j47]Daniel Schlette
, Fabian Böhm
, Marco Caselli, Günther Pernul:
Measuring and visualizing cyber threat intelligence quality. Int. J. Inf. Sec. 20(1): 21-38 (2021) - [j46]Florian Menges
, Benedikt Putz
, Günther Pernul:
DEALER: decentralized incentives for threat intelligence reporting and exchange. Int. J. Inf. Sec. 20(5): 741-761 (2021) - [j45]Manfred Vielberth
, Ludwig Englbrecht, Günther Pernul:
Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information. Inf. Comput. Secur. 29(2): 332-349 (2021) - [j44]Benedikt Putz
, Marietheres Dietz
, Philip Empl
, Günther Pernul:
EtherTwin: Blockchain-based Secure Digital Twin Information Management. Inf. Process. Manag. 58(1): 102425 (2021) - [j43]Ludwig Englbrecht
, Günther Pernul
:
A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises. J. Cyber Secur. Mobil. 10(1): 27-64 (2021) - [c129]Philip Empl
, Günther Pernul:
A Flexible Security Analytics Service for the Industrial IoT. SAT-CPS@CODASPY 2021: 23-32 - [c128]Manfred Vielberth
, Magdalena Glas
, Marietheres Dietz
, Stylianos Karagiannis
, Emmanouil Magkos
, Günther Pernul
:
A Digital Twin-Based Cyber Range for SOC Analysts. DBSec 2021: 293-311 - [c127]Fabian Böhm, Manfred Vielberth
, Günther Pernul:
Bridging Knowledge Gaps in Security Analytics. ICISSP 2021: 98-108 - [c126]Alexander Puchta, Sebastian Groll, Günther Pernul:
Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture. ICISSP 2021: 611-618 - [c125]Marietheres Dietz
, Ludwig Englbrecht, Günther Pernul:
Enhancing Industrial Control System Forensics Using Replication-Based Digital Twins. IFIP Int. Conf. Digital Forensics 2021: 21-38 - [c124]Benedikt Putz
, Fabian Böhm
, Günther Pernul
:
HyperSec: Visual Analytics for Blockchain Security Monitoring. SEC 2021: 165-180 - [c123]Sebastian Groll, Sascha Kern
, Ludwig Fuchs, Günther Pernul:
Monitoring Access Reviews by Crowd Labelling. TrustBus 2021: 3-17 - [c122]Fabian Böhm
, Ludwig Englbrecht, Sabrina Friedl
, Günther Pernul:
Visual Decision-Support for Live Digital Forensics. VizSec 2021: 58-67 - [i2]Benedikt Putz, Fabian Böhm, Günther Pernul:
HyperSec: Visual Analytics for blockchain security monitoring. CoRR abs/2103.14414 (2021) - 2020
- [j42]Manfred Vielberth
, Fabian Böhm
, Ines Fichtinger
, Günther Pernul
:
Security Operations Center: A Systematic Study and Open Challenges. IEEE Access 8: 227756-227779 (2020) - [j41]Marietheres Dietz
, Günther Pernul:
Digital Twin: Empowering Enterprises Towards a System-of-Systems Approach. Bus. Inf. Syst. Eng. 62(2): 179-184 (2020) - [j40]Christian Richthammer
, Günther Pernul:
Situation awareness for recommender systems. Electron. Commer. Res. 20(4): 783-806 (2020) - [j39]Marietheres Dietz
, Günther Pernul:
Unleashing the Digital Twin's Potential for ICS Security. IEEE Secur. Priv. 18(4): 20-27 (2020) - [j38]Ludwig Englbrecht
, Stefan Meier, Günther Pernul:
Towards a capability maturity model for digital forensic readiness. Wirel. Networks 26(7): 4895-4907 (2020) - [c121]Marietheres Dietz
, Manfred Vielberth
, Günther Pernul:
Integrating digital twin security simulations in the security operations center. ARES 2020: 18:1-18:9 - [c120]Ludwig Englbrecht, Günther Pernul:
A privacy-aware digital forensics investigation in enterprises. ARES 2020: 58:1-58:10 - [c119]Benedikt Putz, Günther Pernul:
Detecting Blockchain Security Threats. Blockchain 2020: 313-320 - [c118]Daniel Schlette
, Florian Menges
, Thomas Baumer
, Günther Pernul:
Security Enumerations for Cyber-Physical Systems. DBSec 2020: 64-76 - [c117]Fabian Böhm
, Ludwig Englbrecht
, Günther Pernul:
Designing a Decision-Support Visualization for Live Digital Forensic Investigations. DBSec 2020: 223-240 - [c116]Ludwig Englbrecht
, Stefan Schönig
, Günther Pernul:
Supporting Process Mining with Recovered Residual Data. PoEM 2020: 389-404 - [c115]Rafael Belchior, Benedikt Putz, Günther Pernul, Miguel Correia, André Vasconcelos
, Sérgio Guerreiro:
SSIBAC: Self-Sovereign Identity Based Access Control. TrustCom 2020: 1935-1943 - [c114]Ludwig Englbrecht
, Günther Pernul:
A Serious Game-Based Peer-Instruction Digital Forensics Workshop. WISE 2020: 127-141
2010 – 2019
- 2019
- [j37]Benedikt Putz
, Florian Menges, Günther Pernul:
A secure and auditable logging infrastructure based on a permissioned blockchain. Comput. Secur. 87 (2019) - [j36]Manfred Vielberth
, Florian Menges, Günther Pernul:
Human-as-a-security-sensor for harvesting threat intelligence. Cybersecur. 2(1): 23 (2019) - [j35]Michael Kunz, Alexander Puchta, Sebastian Groll, Ludwig Fuchs, Günther Pernul:
Attribute quality management for dynamic identity and access management. J. Inf. Secur. Appl. 44: 64-79 (2019) - [j34]Benedikt Putz
, Günther Pernul:
Trust Factors and Insider Threats in Permissioned Distributed Ledgers - An Analytical Study and Evaluation of Popular DLT Frameworks. Trans. Large Scale Data Knowl. Centered Syst. 42: 25-50 (2019) - [c113]Ludwig Englbrecht
, Gregor Langner
, Günther Pernul, Gerald Quirchmayr:
Enhancing credibility of digital evidence through provenance-based incident response handling. ARES 2019: 26:1-26:6 - [c112]Alexander Puchta, Fabian Böhm
, Günther Pernul:
Contributing to Current Challenges in Identity and Access Management with Visual Analytics. DBSec 2019: 221-239 - [c111]Marietheres Dietz, Benedikt Putz
, Günther Pernul:
A Distributed Ledger Approach to Digital Twin Secure Data Sharing. DBSec 2019: 281-300 - [c110]Florian Menges, Christine Sperl, Günther Pernul:
Unifying Cyber Threat Intelligence. TrustBus 2019: 161-175 - 2018
- [j33]Johannes Sänger, Günther Pernul:
Interactive Reputation Systems - How to Cope with Malicious Behavior in Feedback Mechanisms. Bus. Inf. Syst. Eng. 60(4): 273-287 (2018) - [j32]Florian Menges
, Günther Pernul:
A comparative analysis of incident reporting formats. Comput. Secur. 73: 87-101 (2018) - [j31]Fabian Böhm
, Florian Menges, Günther Pernul:
Graph-based visual analytics for cyber threat intelligence. Cybersecur. 1(1): 16 (2018) - [j30]Christian Richthammer, Michael Weber, Günther Pernul:
State of the art of reputation-enhanced recommender systems. Web Intell. 16(4): 273-286 (2018) - [c109]Marietheres Dietz, Günther Pernul:
Big Log Data Stream Processing: Adapting an Anomaly Detection Technique. DEXA (2) 2018: 159-166 - [c108]Matthias Hummer, Sebastian Groll, Michael Kunz, Ludwig Fuchs, Günther Pernul:
Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators. ICISSP 2018: 233-240 - [e18]Sven Hartmann, Hui Ma, Abdelkader Hameurlain, Günther Pernul, Roland R. Wagner:
Database and Expert Systems Applications - 29th International Conference, DEXA 2018, Regensburg, Germany, September 3-6, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11029, Springer 2018, ISBN 978-3-319-98808-5 [contents] - [e17]Sven Hartmann, Hui Ma, Abdelkader Hameurlain, Günther Pernul, Roland R. Wagner:
Database and Expert Systems Applications - 29th International Conference, DEXA 2018, Regensburg, Germany, September 3-6, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11030, Springer 2018, ISBN 978-3-319-98811-5 [contents] - [e16]Steven Furnell, Haralambos Mouratidis, Günther Pernul:
Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings. Lecture Notes in Computer Science 11033, Springer 2018, ISBN 978-3-319-98384-4 [contents] - 2017
- [j29]Rolf Oppliger, Günther Pernul, Sokratis K. Katsikas:
New Frontiers: Assessing and Managing Security Risks. Computer 50(4): 48-51 (2017) - [c107]Christian Richthammer, Johannes Sänger, Günther Pernul:
Interactive Visualization of Recommender Systems Data. SHCIS@DAIS 2017: 19-24 - [c106]Christian Richthammer, Michael Weber, Günther Pernul:
Reputation-Enhanced Recommender Systems. IFIPTM 2017: 163-179 - 2016
- [j28]Matthias Hummer
, Michael Kunz, Michael Netter, Ludwig Fuchs, Günther Pernul:
Adaptive identity and access management - contextual data based policies. EURASIP J. Inf. Secur. 2016: 19 (2016) - [c105]Christian Richthammer, Günther Pernul:
Explorative Analysis of Recommendations Through Interactive Visualization. EC-Web 2016: 46-57 - 2015
- [c104]Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs, Günther Pernul:
Advanced Identity and Access Policy Management Using Contextual Data. ARES 2015: 40-49 - [c103]Johannes Sänger, Christian Richthammer, André Kremser, Günther Pernul:
Personalized Composition of Trustful Reputation Systems. DBSec 2015: 207-214 - [c102]Johannes Sänger, Christian Richthammer, Michael Kunz, Stefan Meier, Günther Pernul:
Visualizing Unfair Ratings in Online Reputation Systems. ECIS 2015 - [c101]Michael Kunz, Ludwig Fuchs, Matthias Hummer, Günther Pernul:
Introducing Dynamic Identity and Access Management in Organizations. ICISS 2015: 139-158 - [c100]Michael Netter, Günther Pernul, Christian Richthammer, Moritz Riesner:
Privacy in Social Networks: Existing Challenges and Proposals for Solutions. ICISSP (Revised Selected Papers) 2015: 16-27 - [c99]Michael Kunz, Ludwig Fuchs, Michael Netter, Günther Pernul:
How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining. ICISSP (Revised Selected Papers) 2015: 49-67 - [c98]Michael Kunz, Ludwig Fuchs, Michael Netter, Günther Pernul:
Analyzing Quality Criteria in Role-based Identity and Access Management. ICISSP 2015: 64-72 - [c97]Günther Pernul:
Privacy in Social Networks - Existing Challenges and Proposals for Solution. ICISSP 2015: IS-11 - [c96]Johannes Sänger, Christian Richthammer, Artur Rösch, Günther Pernul:
Reusable Defense Components for Online Reputation Systems. IFIPTM 2015: 195-202 - [e15]Günther Pernul, Peter Y. A. Ryan
, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9326, Springer 2015, ISBN 978-3-319-24173-9 [contents] - [e14]Günther Pernul, Peter Y. A. Ryan
, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9327, Springer 2015, ISBN 978-3-319-24176-0 [contents] - 2014
- [j27]Christian Richthammer, Michael Netter, Moritz Riesner, Johannes Sänger, Günther Pernul:
Taxonomy of social network data types. EURASIP J. Inf. Secur. 2014: 11 (2014) - [c95]Johannes Sänger, Günther Pernul:
Visualizing Transaction Context in Trust and Reputation Systems. ARES 2014: 94-103 - [c94]Sabri Hassan, Johannes Sänger, Günther Pernul:
SoDA: Dynamic visual analytics of big social data. BigComp 2014: 183-188 - [c93]Michael Kunz, Matthias Hummer, Ludwig Fuchs, Michael Netter, Günther Pernul:
Analyzing Recent Trends in Enterprise Identity Management. DEXA Workshops 2014: 273-277 - [c92]Johannes Sänger, Christian Richthammer, Sabri Hassan, Günther Pernul:
Trust and Big Data: A Roadmap for Research. DEXA Workshops 2014: 278-282 - [c91]Ludwig Fuchs, Michael Kunz, Günther Pernul:
Role Model Optimization for Secure Role-Based Identity Management. ECIS 2014 - [c90]Michael Netter, Michael Weber, Michael Diener, Günther Pernul:
Visualizing Social Roles - Design and Evaluation of a Bird's-eye View of Social Network Privacy Settings. ECIS 2014 - [c89]Johannes Sänger, Günther Pernul:
Reusability for Trust and Reputation Systems. IFIPTM 2014: 28-43 - [c88]Sabri Hassan, Günther Pernul:
Efficiently Managing the Security and Costs of Big Data Storage using Visual Analytics. iiWAS 2014: 180-184 - [c87]Stefan Meier, Günther Pernul:
Einsatz von digitaler Forensik in Unternehmen und Organisationen. Sicherheit 2014: 103-114 - [e13]Vijay Atluri, Günther Pernul:
Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings. Lecture Notes in Computer Science 8566, Springer 2014, ISBN 978-3-662-43935-7 [contents] - [e12]Claudia Eckert, Sokratis K. Katsikas, Günther Pernul:
Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings. Lecture Notes in Computer Science 8647, Springer 2014, ISBN 978-3-319-09769-5 [contents] - [i1]Alexandra Cetto, Michael Netter, Günther Pernul, Christian Richthammer, Moritz Riesner, Christian Roth, Johannes Sänger:
Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks. CoRR abs/1402.5878 (2014) - 2013
- [j26]Javier López, Svetla Nikova
, Andreas Pashalidis, Günther Pernul, Bart Preneel
:
Preface. Comput. Math. Appl. 65(5): 747 (2013) - [j25]Ludwig Fuchs, Günther Pernul:
Qualitätssicherung im Identity- und Access Management. HMD Prax. Wirtsch. 289: 88-97 (2013) - [j24]Moritz Riesner, Michael Netter, Günther Pernul:
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments. Inf. Secur. Tech. Rep. 17(4): 185-198 (2013) - [c86]Christian Richthammer, Michael Netter, Moritz Riesner, Günther Pernul:
Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control. ARES 2013: 141-150 - [c85]Michael Netter, Moritz Riesner, Michael Weber, Günther Pernul:
Privacy Settings in Online Social Networks - Preferences, Perception, and Reality. HICSS 2013: 3219-3228 - [c84]Stefan Meier, Ludwig Fuchs, Günther Pernul:
Managing the Access Grid - A Process View to Minimize Insider Misuse Risks. Wirtschaftsinformatik 2013: 66 - 2012
- [j23]Ludwig Fuchs, Günther Pernul:
Minimizing insider misuse through secure Identity Management. Secur. Commun. Networks 5(8): 847-862 (2012) - [c83]Moritz Riesner, Michael Netter, Günther Pernul:
An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites. ARES 2012: 103-112 - [c82]Moritz Riesner, Günther Pernul:
Provider-Independent Online Social Identity Management-Enhancing Privacy Consistently Across Multiple Social Networking Sites. HICSS 2012: 800-809 - [c81]Christoph Fritsch, Günther Pernul:
User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection. ICEBE 2012: 193-200 - [c80]Moritz Riesner, Günther Pernul:
Maintaining a Consistent Representation of Self across Multiple Social Networking Sites - A Data-centric Perspective. SocialCom/PASSAT 2012: 860-867 - [c79]Michael Netter, Sabri Hassan, Günther Pernul:
An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control. TrustBus 2012: 65-78 - [c78]Oliver Gmelch, Günther Pernul:
A Generic Architecture for User-Centric Portlet Integration. CEC 2012: 70-77 - [e11]Svetla Petkova-Nikova, Andreas Pashalidis, Günther Pernul:
Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7163, Springer 2012, ISBN 978-3-642-29803-5 [contents] - 2011
- [j22]Ludwig Fuchs, Günther Pernul, Ravi S. Sandhu:
Roles in information security - A survey and classification of the research area. Comput. Secur. 30(8): 748-769 (2011) - [j21]Stefan Dürbeck, Jan Paul Kolter, Günther Pernul, Rolf Schillinger:
Eine verteilte Autorisierungsinfrastruktur unter Berücksichtigung von Datenschutzaspekten. Inform. Spektrum 34(3): 265-275 (2011) - [j20]Edgar R. Weippl, A Min Tjoa, Günther Pernul:
Guest Editorial: Advances in Applied Security. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(4): 1-3 (2011) - [c77]Christoph Fritsch, Peter Bednár, Günther Pernul:
DS3I - A Dynamic Semantically Enhanced Service Selection Infrastructure. EC-Web 2011: 13-24 - [c76]Michael Netter, Sebastian Herbst, Günther Pernul:
Analyzing Privacy in Social Networks-An Interdisciplinary Approach. SocialCom/PASSAT 2011: 1327-1334 - [c75]Michael Netter, Moritz Riesner, Günther Pernul:
Assisted Social Identity Management. Wirtschaftsinformatik 2011: 6 - [c74]Oliver Gmelch, Günther Pernul:
A portal-based approach for user-centric legacy application integration in collaborative environments. Wirtschaftsinformatik 2011: 45 - [e10]Steven Furnell
, Costas Lambrinoudakis
, Günther Pernul:
Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings. Lecture Notes in Computer Science 6863, Springer 2011, ISBN 978-3-642-22889-6 [contents] - [r1]Günther Pernul, Moritz Riesner:
Conceptual Design of Secure Databases. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 245-248 - 2010
- [j19]Jan Paul Kolter, Thomas Kernchen, Günther Pernul:
Collaborative privacy management. Comput. Secur. 29(5): 580-591 (2010) - [j18]Ludwig Fuchs, Günther Pernul:
Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 14-28 (2010) - [c73]Jan Paul Kolter, Michael Netter, Günther Pernul:
Visualizing Past Personal Data Disclosures. ARES 2010: 131-139 - [c72]Stefan Durbeck, Christoph Fritsch, Günther Pernul, Rolf Schillinger:
A Semantic Security Architecture for Web Services. ARES 2010: 222-227 - [c71]Michael Netter, Eduardo B. Fernández, Günther Pernul:
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. ARES 2010: 560-564 - [c70]Günther Pernul, Matti Rossi:
6th International Workshop on Foundations and Practices of UML (FP-UML 2010). ER Workshops 2010: 242 - [c69]Oliver Gmelch, Günther Pernul:
Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals. SECRYPT 2010: 177-182 - [c68]Christoph Fritsch, Michael Netter, Andreas Reisser, Günther Pernul:
Attacking Image Recognition Captchas - A Naive but Effective Approach. TrustBus 2010: 13-25 - [c67]Christoph Fritsch, Günther Pernul:
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. TrustBus 2010: 214-226
2000 – 2009
- 2009
- [c66]Ludwig Fuchs, Christian Broser, Günther Pernul:
Different Approaches to In-House Identity Management - Justification of an Assumption. ARES 2009: 122-129 - [c65]