TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 6.

Whitmore, Jim and Türpe, Sven and Triller, Stefan and Poller, Andreas and Carlson, Christina (2014):
Threat analysis in the software development lifecycle.
In: IBM journal of research and development 58 (2014), (1), pp. 6:1-6:13, DOI: 10.1147/JRD.2013.2288060,

Heumann, Thomas and Türpe, Sven and Keller, Jörg Freiling, Felix (ed.) (2010):
Quantifying the Attack Surface of a Web Application.
P-170In: Lecture Notes in Informatics (LNI), In: Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit., Bonner Köllen Verlag, Bonn, pp. 305-316, ISBN 978-3-88579-264-2,
[Conference or Workshop Item]

Türpe, Sven and Poller, Andreas and Steffan, Jan and Stotz, Jan-Peter and Trukenmüller, Jan (2009):
Attacking the BitLocker Boot Process.
5471In: International Conference on the Technical and Socio-economic Aspects of Trusted Computing (Trust 2009), Springer, pp. 183-196, [Conference or Workshop Item]

Türpe, Sven and Eichler, Jörn (2009):
Testing Production Systems Safely: Common Precautions in Penetration Testing.
In: 4th Testing: Academic and Industrial Conference (TAIC PART 2009), [Conference or Workshop Item]

Türpe, Sven (2009):
What Is the Shape of Your Security Policy? Security as a Classification Problem.
In: New Security Paradigms Workshop 2009, ACM, [Conference or Workshop Item]

Türpe, Sven and Poller, Andreas and Trukenmüller, Jan and Repp, Jürgen and Bornmann, Christian (2008):
Supporting Security Testers in Discovering Injection Flaws.
In: Proc. TAIC-PART 2008, pp. 64-68, ISBN 978-0-7695-3383-4,
DOI: 10.1109/TAIC-PART.2008.7,
[Conference or Workshop Item]

This list was generated on Tue Jul 7 02:09:03 2020 CEST.