Search

Your search keyword '"Michael Backes"' showing total 168 results

Search Constraints

Start Over You searched for: Author "Michael Backes" Remove constraint Author: "Michael Backes" Topic business Remove constraint Topic: business
168 results on '"Michael Backes"'

Search Results

1. Controlling my genome with my smartphone: first clinical experiences of the PROMISE system

2. 12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP

3. DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale

4. Accountability in the Decentralised-Adversary Setting

5. Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild

6. Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps

7. Assessing the Impact of Script Gadgets on CSP at Scale

8. Adversarial Attacks on Classifiers for Eye-based User Modelling

9. When Machine Unlearning Jeopardizes Privacy

10. Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication

11. Privacy-Preserving Similar Patient Queries for Combined Biomedical Data

12. How Internet Resources Might Be Helping You Develop Faster but Less Securely

13. On the Security Relevance of Initial Weights in Deep Neural Networks

14. TrollThrottle —Raising the Cost of Astroturfing

15. JStap

16. HideNoSeek

17. Membership Privacy for Fully Dynamic Group Signatures

18. MemGuard

19. How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11

20. Automated Verification of Accountability in Security Protocols

21. Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy

22. Towards automated network mitigation analysis

23. Data Lineage in Malicious Environments

24. A NECTAr-based upgrade for the Cherenkov cameras of the H.E.S.S. 12-meter telescopes

25. Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure

26. Dissecting Privacy Risks in Biomedical Data

27. MLCapsule: Guarded Offline Deployment of Machine Learning as a Service

28. Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications

29. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models

30. Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys

31. Keep me Updated

32. Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs

33. Reconciling Privacy and Utility in Continuous-Time Diffusion Networks

34. Hardware and software architecture of the upgraded H.E.S.S. cameras

35. Identifying Personal DNA Methylation Profiles by Genotype Inference

36. Comparing the Usability of Cryptographic APIs

37. Who Controls the Internet?

38. Efficient and Flexible Discovery of PHP Application Vulnerabilities

39. LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning

40. Quantifying information flow in cryptographic systems

41. AnoA: A Framework for Analyzing Anonymous Communication Protocols

42. Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code

43. Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security

44. Periodicity detection in irregularly sampled light curves by robust regression and outlier detection

45. Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments

46. POSTER

47. Reliable Third-Party Library Detection in Android and its Security Applications

48. Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks

49. POSTER

50. A Survey on Routing in Anonymous Communication Protocols

Catalog

Books, media, physical & digital resources