Items in division
- TU Darmstadt (106997)
- Forschungsfelder (160)
- Information and Intelligence (112)
- Cognitive Science (12)
- Information and Intelligence (112)
- Forschungsfelder (160)
A
Almon, Lars ; Krause, Arno ; Fietze, Oliver ; Hollick, Matthias (2021)
Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN.
19th ACM International Symposium on Mobility Management and Wireless Access (MobiWac’21). virtual Conference (22.11.2021-26.11.2021)
doi: 10.1145/3479241.3486689
Conference or Workshop Item, Bibliographie
Avramidis, Mario ; Kellner, Christiane ; Staudt, Josefine ; Zimmermann, Verena ; Gerber, Nina
eds.: Wienrich, Carolin ; Wintersberger, Philipp ; Weyers, Benjamin (2021)
Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance.
doi: 10.18420/muc2021-mci-ws10-351
Conference or Workshop Item, Bibliographie
B
Behrens, Thea ; Kühn, Adrian ; Jäkel, Frank (2024)
Connecting process models to response times through Bayesian hierarchical regression analysis.
In: Behavior Research Methods
doi: 10.3758/s13428-024-02400-9
Article, Bibliographie
Benedikt, Barbara Jiabao ; Fischlin, Marc ; Huppert, Moritz (2022)
Nostradamus Goes Quantum.
28th International Conference on the Theory and Application of Cryptology and Information Security. Taipei, Taiwan (05.12.2022-09.12.2022)
doi: 10.1007/978-3-031-22969-5_20
Conference or Workshop Item, Bibliographie
Balthasar, Mandy ; Gerber, Nina ; Schmitt, Hartmut
eds.: Ludewig, Elske ; Jackstädt, Thomas (2022)
Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen.
doi: 10.18420/muc2021-up-448
Conference or Workshop Item, Bibliographie
Bekaert, Paul ; Alotaibi, Norah ; Mathis, Florian ; Gerber, Nina ; Rafferty, Aidan Christopher ; Khamis, Mohamed ; Marky, Karola (2022)
Are thermal attacks a realistic threat? Investigating the preconditions of thermal attacks in users’ daily lives.
Nordic Human-Computer Interaction Conference (NordiCHI '22). Aarhus, Denmark (08.10.2022-12.10.2022)
doi: 10.1145/3546155.3546706
Conference or Workshop Item, Bibliographie
Burkhardt, Sophie ; Brugger, Jannis ; Wagner, Nicolas ; Ahmadi, Zahra ; Kersting, Kristian ; Kramer, Stefan (2022)
Rule Extraction From Binary Neural Networks With Convolutional Rules for Model Validation.
In: Frontiers in Artificial Intelligence, 4
doi: 10.3389/frai.2021.642263
Article, Bibliographie
Bernardi, Ansgar ; Becker, Sandra ; Struve, Carsten ; Linsner, Sebastian ; Reuter, Christian ; Müller, Georg
eds.: Meyer-Aurich, Andreas ; Gandorfer, Markus ; Hoffmann, Christa ; Weltzien, Cornelia ; Bellingrath-Kimura, Sonoko D. ; Floto, Helga ; Gesellschaft für Informatik (2021)
Erfolgsorientierte Dienstleistung: Neue Perspektiven für die landwirtschaftliche Arbeitsteilung durch hybride Dienstleistungen.
41. Jahrestagung der Gesellschaft für Informatik in der Landwirtschaft. Potsdam, Germany (08.03.2021-09.03.2021)
Conference or Workshop Item, Bibliographie
Bayer, Markus ; Kaufhold, Marc-André ; Reuter, Christian (2021)
A Survey on Data Augmentation for Text Classification.
doi: 10.48550/arXiv.2107.03158
Report, Bibliographie
Bayer, Markus ; Kaufhold, Marc-André ; Reuter, Christian (2021)
Information Overload in Crisis Management: Bilingual Evaluation of Embedding Models for Clustering Social Media Posts in Emergencies.
European Conference on Information Systems (ECIS 2021). Marrakech (14.06.2021-16.06.2021)
Conference or Workshop Item, Bibliographie
Bayer, Markus ; Kaufhold, Marc-André ; Buchhold, Björn ; Keller, Marcel ; Dallmeyer, Jörg ; Reuter, Christian (2021)
Data Augmentation in Natural Language Processing: A Novel Text Generation Approach for Long and Short Text Classifiers.
doi: 10.48550/arXiv.2103.14453
Report, Bibliographie
Biselli, Tom ; Reuter, Christian (2021)
On the Relationship between IT Privacy and Security Behavior: A Survey among German Private Users.
16th International Conference on Business Information Systems (WI 2021). virtual Conference (09.03.2021-11.03.2021)
Conference or Workshop Item, Bibliographie
Bayer, Markus ; Kaufhold, Marc-André ; Buchhold, Björn ; Keller, Marcel ; Dallmeyer, Jörg ; Reuter, Christian (2021)
Data augmentation in natural language processing: a novel text generation approach for long and short text classifiers.
In: International Journal of Machine Learning and Cybernetics
doi: 10.1007/s13042-022-01553-3
Article, Bibliographie
Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix
eds.: Sako, Kazue ; Schneider, Steve A. ; Ryan, Peter Y. A. (2019)
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
24th European Symposium on Research in Computer Security. Luxembourg (23.09.2019-27.09.2019)
doi: 10.1007/978-3-030-29962-0_25
Conference or Workshop Item, Bibliographie
Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas
eds.: Ding, Jintai ; Steinwandt, Rainer (2019)
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
10th International Conference on Post-Quantum Cryptography. Chongqing, People's Republic China (08.05.2019-10.05.2019)
doi: 10.1007/978-3-030-25510-7_12
Conference or Workshop Item, Bibliographie
C
Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
42nd IEEE Symposium on Security and Privacy. virtual Conference (24.05.2021-27.05.2021)
doi: 10.1109/SP40001.2021.00093
Conference or Workshop Item, Bibliographie
D
Depeweg, Stefan ; Rothkopf, Contantin A. ; Jäkel, Frank (2024)
Solving Bongard Problems With a Visual Language and Pragmatic Constraints.
In: Cognitive Science, 48 (5)
doi: 10.1111/cogs.13432
Article, Bibliographie
Degabriele, Jean Paul ; Fischlin, Marc ; Govinden, Jérôme (2023)
The Indifferentiability of the Duplex and Its Practical Applications.
29th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2023). Guangzhou, Peoples Republic of China (04.12.2023-08.12.2023)
doi: 10.1007/978-981-99-8742-9_8
Conference or Workshop Item, Bibliographie
Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2021)
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
In: Journal of Cryptology, 34 (4)
doi: 10.1007/s00145-021-09384-1
Article, Bibliographie
Delpech de Saint Guilhem, Cyprien ; Fischlin, Marc ; Warinschi, Bogdan (2020)
Authentication in Key-Exchange: Definitions, Relations and Composition.
33rd IEEE Computer Security Foundations Symposium. virtual Conference (22.-26.06.2020)
doi: 10.1109/CSF49147.2020.00028
Conference or Workshop Item, Bibliographie
E
Eberz-Eder, Daniel ; Kuntke, Franz ; Schneider, Wolfgang ; Reuter, Christian
ed.: Gesellschaft für Informatik (2021)
Technologische Umsetzung des Resilient Smart Farming (RSF) durch den Einsatz von Edge-Computing.
41. Jahrestagung der Gesellschaft für Informatik in der Landwirtschaft. Potsdam, Germany (08.03.2021-09.03.2021)
Conference or Workshop Item, Bibliographie
Egert, Rolf ; Gerber, Nina ; Haunschild, Jasmin ; Kuehn, Philipp ; Zimmermann, Verena (2021)
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience.
In: i-com: Journal of Interactive Media, 20 (2)
doi: 10.1515/icom-2021-0021
Article, Bibliographie
Egert, Rolf ; Gerber, Nina ; Haunschild, Jasmin ; Kuehn, Philipp ; Zimmermann, Verena (2021)
Towards Resilient Critical Infrastructures – Motivating Users to Contribute to Smart Grid Resilience.
In: i-com, 20 (2)
doi: 10.1515/icom-2021-0021
Article, Bibliographie
F
Fischlin, Marc ; Günther, Felix ; Janson, Christian (2024)
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
In: Journal of Cryptology, 37 (2)
doi: 10.1007/s00145-023-09489-9
Article, Bibliographie
Fischlin, Marc ; Rohrbach, Felix
eds.: Rothblum, Guy N. ; Wee, Hoeteck (2023)
Searching for ELFs in the Cryptographic Forest.
21st Theory of Cryptography Conference (TCC 2023). Taipei, Taiwan (29.11.-02.12.2023)
doi: 10.1007/978-3-031-48621-0_8
Conference or Workshop Item, Bibliographie
Fischlin, Marc
eds.: Meng, Weizhi ; Jensen, Christian Damsgaard ; Cremers, Cas ; Kirda, Engin (2023)
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3.
2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 2023). Copenhagen, Denmark (26.-30.11.2023)
doi: 10.1145/3576915.3623099
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Günther, Felix
eds.: Meng, Weizhi ; Jensen, Christian Damsgaard ; Cremers, Cas ; Kirda, Engin (2023)
Verifiable Verification in Cryptographic Protocols.
2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 2023). Copenhagen, Denmark (26.-30.11.2023)
doi: 10.1145/3576915.3623151
Conference or Workshop Item, Bibliographie
Franke, Marlon ; Klein, Dominik K. ; Weeger, Oliver ; Betsch, Peter (2023)
Advanced discretization techniques for hyperelastic physics-augmented neural networks.
In: Computer Methods in Applied Mechanics and Engineering, 416
doi: 10.1016/j.cma.2023.116333
Article, Bibliographie
Fischlin, Marc ; Heyden, Jonas von der ; Margraf, Marian ; Morgner, Frank ; Wallner, Andreas ; Bock, Holger (2023)
Post-quantum Security for the Extended Access Control Protocol.
8th International Conference Security Standardisation Research (SSR 2023). Lyon, France (22.04.2023-23.04.2023)
doi: 10.1007/978-3-031-30731-7_2
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Rohrbach, Felix ; Schmalz, Tobias (2022)
A Random Oracle for All of Us.
13th International Conference on Cryptology in Africa (AFRICACRYPT 2022). Fes, Morocco (18.07.2022-20.07.2022)
doi: 10.1007/978-3-031-17433-9_20
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Sanina, Olga
eds.: Tibouchi, Mehdi ; Wang, Huaxiong (2021)
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.
27th International Conference on the Theory and Application of Cryptology and Information Security. virtual Conference (06.12.2021-10.12.2021)
doi: 10.1007/978-3-030-92075-3_24
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Müller, Sven-Andre ; Münch, Jean-Pierre ; Porth, Lars
eds.: Bertino, Elisa ; Shulman, Haya ; Waidner, Michael (2021)
Multipath TLS 1.3.
26th European Symposium on Research in Computer Security. Darmstadt, Germany (04.10.2021-08.10.2021)
doi: 10.1007/978-3-030-88428-4_5
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Rohrbach, Felix (2021)
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.
24th International Conference on Practice and Theory of Public-Key Cryptography. virtual Conference (10.05.2021-13.05.2021)
doi: 10.1007/978-3-030-75248-4_8
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Harasser, Patrick ; Janson, Christian
eds.: Canteaut, Anne ; Ishai, Yuval (2020)
Signatures from Sequential-OR Proofs.
39th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Zagreb, Croatia (10.05.2020-14.05.2020)
doi: 10.1007/978-3-030-45727-3_8
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Günther, Felix
ed.: Jarecki, Stanislaw (2020)
Modeling Memory Faults in Signature and Authenticated Encryption Schemes.
2020 RSA Conference Cryptographer’s Track (CT-RSA 2020). San Francisco, USA (24.-28.02.2020)
doi: 10.1007/978-3-030-40186-3_4
Conference or Workshop Item, Bibliographie
Fladung, Lukas ; Nikolopoulos, Georgios M. ; Alber, Gernot ; Fischlin, Marc (2019)
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
In: Cryptography, 3 (4)
doi: 10.3390/cryptography3040025
Article, Bibliographie
Fischlin, Marc ; Haagh, Helene
eds.: Schwabe, Peter ; Theriault, Nicolas (2019)
How to Sign with White-Boxed AES.
6th International Conference on Cryptology and Information Security in Latin America. Santiago de Chile, Chile (02.10.2019-04.10.2019)
doi: 10.1007/978-3-030-30530-7_13
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Mazaheri, Sogol (2018)
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
2018 IEEE 31st Computer Security Foundations Symposium (CSF). Oxford, United Kingdom (09.07.2018-12.07.2018)
doi: 10.1109/CSF.2018.00013
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Janson, Christian ; Mazaheri, Sogol (2018)
Backdoored Hash Functions: Immunizing HMAC and HKDF.
31st IEEE Computer Security Foundations Symposium. Oxford, United Kingdom (09.-12.07.2018)
doi: 10.1109/CSF.2018.00015
Conference or Workshop Item, Bibliographie
G
Gerber, Nina ; Stöver, Alina ; Mayer, Peter (2024)
Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field.
Symposium on Usable Privacy and Security (SOUPS 2024). Philadelphia (08/2024)
Conference or Workshop Item, Bibliographie
Grassl, Paul ; Gerber, Nina ; Max, von Grafenstein (2024)
Practitioners’ Corner ∙ How Effectively Do Consent Notices Inform Users About the Risks to Their Fundamental Rights?
In: European Data Protection Law Review, 10 (1)
doi: 10.21552/edpl/2024/1/14
Article, Bibliographie
Gerber, Nina ; Stöver, Alina
eds.: Gerber, Nina ; Stöver, Alina ; Marky, Karola (2023)
From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior.
In: Human Factors in Privacy Research
doi: 10.1007/978-3-031-28643-8_2
Book Section, Bibliographie
Gerber, Nina ; Stöver, Alina ; Peschke, Justin ; Zimmermann, Verena (2023)
Don’t accept all and continue: Exploring nudges for more deliberate interaction with tracking consent notices.
In: ACM Transactions on Computer-Human Interaction
doi: 10.1145/3617363
Article, Bibliographie
Günther, Daniel ; Holz, Marco ; Judkewitz, Benjamin ; Möllering, Helen ; Pinkas, Benny ; Schneider, Thomas ; Suresh, Ajith (2022)
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs.
CCS '22: ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-11.11.2022)
doi: 10.1145/3548606.3563497
Conference or Workshop Item, Bibliographie
Gerber, Nina ; Marky, Karola
ed.: USENIX Association (2022)
The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User’s Quest for More Secure and Privacy-Preserving Behavior.
18th Symposium on Usable Privacy and Security. Boston, USA (07.08.2022-09.08.2022)
Conference or Workshop Item, Bibliographie
Gerber, Paul ; Heidinger, Marvin ; Stiegelmayer, Julia ; Gerber, Nina (2021)
LOKI: Development of an interface for task-based, privacy-friendly smart home control through LOCal Information Processing.
doi: 10.1145/3473856.3474094
Conference or Workshop Item, Bibliographie
Gabel, Sabrina ; Reichert, Lilian ; Reuter, Christian (2020)
Discussing Conflict in Social Media - The Use of Twitter in the Jammu and Kashmir Conflict.
In: Media, War & Conflict, 13
doi: 10.1177/1750635220970997
Article, Bibliographie
Gerber, Nina ; Reinheimer, Benjamin ; Volkamer, Melanie (2019)
Investigating People’s Privacy Risk Perception.
In: Proceedings on Privacy Enhancing Technologies, 2019 (3)
doi: 10.2478/popets-2019-0047
Article, Bibliographie
Ghiglieri, Marco ; Henhapl, Birgit ; Gerber, Nina
eds.: Dachselt, Raimund ; Weber, Gerhard (2018)
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird.
doi: 10.18420/muc2018-ws08-0542
Conference or Workshop Item, Bibliographie
Gerber, Nina ; Gerber, Paul ; Volkamer, Melanie (2018)
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior.
In: Computers & Security, 77 (1)
doi: 10.1016/j.cose.2018.04.002
Article, Bibliographie
Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017)
Das Privacy-Paradoxon – Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017
doi: 10.1007/978-3-658-16835-3_8
Book Section, Bibliographie
Gerber, Nina
eds.: Prinz, Wolfgang ; Borchers, Jan ; Jarke, Matthias (2016)
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Conference or Workshop Item, Bibliographie
H
Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2022)
Cultural Violence and Fragmentation on Social Media: Interventions and Countermeasures by Humans and Social Bots.
In: Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, Edition: 1st Edition
doi: 10.4324/9781003110224-5
Book Section, Bibliographie
Hartwig, Katrin ; Englisch, Atlas ; Thomson, Jan Pelle ; Reuter, Christian
ed.: ACM (2021)
Finding Secret Treasure? Improving Memorized Secrets Through Gamification.
2021 European Symposium on Usable Security (EuroUSEC). virtual Conference (11.10.2021-12.10.2021)
Conference or Workshop Item, Bibliographie
Haesler, Steffen ; Schmid, Stefka ; Vierneisel, Annemike Sophia ; Reuter, Christian (2021)
Stronger Together: How Neighborhood Groups Build up a Virtual Network during the COVID-19 Pandemic.
In: Proceedings of the ACM on Human Computer Interaction, 5 (CSCW2)
doi: 10.1145/3476045
Article, Bibliographie
Haunschild, Jasmin ; Reuter, Christian
ed.: ACM (2021)
Bridging from Crisis to Everyday Life – An Analysis of User Reviews of the Warning App NINA and the COVID-19 Information Apps CoroBuddy and DarfIchDas.
24th ACM Conference on Computer-Supported Cooperative Work and Social Computing. virtual Conference (23.10.2021-27.10.2021)
doi: 10.1145/3462204.3481745
Conference or Workshop Item, Bibliographie
Haunschild, Jasmin ; Pauli, Selina ; Reuter, Christian
ed.: ACM (2021)
Citizens' Perceived Information Responsibilities and Information Challenges During the COVID-19 Pandemic.
Conference on Information Technology for Social Good. Roma, Italy (09.09.2021-11.09.2021)
doi: 10.1145/3462203.3475886
Conference or Workshop Item, Bibliographie
Herbert, Franziska ; Schmidbauer-Wolf, Gina Maria ; Reuter, Christian
eds.: Schneegass, S. ; Pfleging, B. ; Kern, D. (2021)
Who Should Get My Private Data in Which Case? Evidence in the Wild.
MuC'21: Mensch und Computer 2021. Ingolstadt, Germany (05.09.2021-08.09.2021)
doi: 10.1145/3473856.3473879
Conference or Workshop Item, Bibliographie
Haunschild, Jasmin ; Demuth, Kilian ; Geiß, Henri-Jacques ; Richter, Christian ; Reuter, Christian (2021)
Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities.
In: HMD : Praxis der Wirtschaftsinformatik, 58 (5)
doi: 10.1365/s40702-021-00770-8
Article, Bibliographie
Hartwig, Katrin ; Reuter, Christian (2021)
Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations.
In: Behaviour & Information Technology
doi: 10.1080/0144929X.2021.1876167
Article, Bibliographie
Hartwig, Katrin ; Reuter, Christian (2021)
Transparenz im technischen Umgang mit Fake News.
In: Technik & Mensch, 2021 (2)
Article, Bibliographie
Hartwig, Katrin ; Reuter, Christian
ed.: ACM (2021)
Nudge or Restraint: How do People Assess Nudging in Cybersecurity - A Representative Study in Germany.
2021 European Symposium on Usable Security (EuroUSEC). virtual Conference (11.10.2021-12.10.2021)
Conference or Workshop Item, Bibliographie
Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2020)
Cultural violence and fragmentation on social media.
In: Cyber Security Politics
doi: 10.4324/9781003110224-5
Book Section, Bibliographie
I
Ibs, Inga ; Ott, Claire ; Jäkel, Frank ; Rothkopf, Constantin A. (2024)
From human explanations to explainable AI: Insights from constrained optimization.
In: Cognitive Systems Research, 88
doi: 10.1016/j.cogsys.2024.101297
Article, Bibliographie
K
Klein, Dominik K. ; Ortigosa, Rogelio ; Martínez-Frutos, Jesús ; Weeger, Oliver (2024)
Nonlinear electro-elastic finite element analysis with neural network constitutive models.
In: Computer Methods in Applied Mechanics and Engineering, 425
doi: 10.1016/j.cma.2024.116910
Article, Bibliographie
Koß, C. ; de la Cuesta Ferrer, L. ; Stüttgen, M. C. ; Jäkel, F. (2024)
Reconciling Signal-Detection Models of Criterion Learning with the Generalized Matching Law.
In: Computational Brain & Behavior
doi: 10.1007/s42113-024-00212-w
Article, Bibliographie
Klein, Dominik K. ; Ortigosa, Rogelio ; Martínez-Frutos, Jesús ; Weeger, Oliver (2022)
Finite electro-elasticity with physics-augmented neural networks.
In: Computer Methods in Applied Mechanics and Engineering, 400
doi: 10.1016/j.cma.2022.115501
Article, Bibliographie
Kordjamshidi, Parisa ; Roth, Dan ; Kersting, Kristian (2022)
Declarative Learning-Based Programming as an Interface to AI Systems.
In: Frontiers in Artificial Intelligence, 5
doi: 10.3389/frai.2022.755361
Article, Bibliographie
Kaufhold, Marc-André ; Reuter, Christian ; Comes, Tina ; Mirbabaie, Milad ; Stieglitz, Stefan
ed.: ACM (2021)
2nd Workshop on Mobile Resilience: Designing Mobile Interactive Systems for Crisis Response.
23rd International Conference on Human-Computer Interaction with Mobile Devices and Services. virtual Conference (27.09.2021-01.10.2021)
doi: 10.1145/3447527.3474869
Conference or Workshop Item, Bibliographie
Kaufhold, Marc-André ; Bayer, Markus ; Hartung, Daniel ; Reuter, Christian (2021)
Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter.
30th International Conference on Artificial Neural Networks (ICANN 2021). Bratislava, Slovakia (14.09.2021-17.09.2021)
doi: 10.1007/978-3-030-86383-8_32
Conference or Workshop Item, Bibliographie
Kuntke, Franz ; Sinn, Marcel ; Reuter, Christian
ed.: ARES (2021)
Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications.
16th International Conference on Availability, Reliability and Security. Vienna, Austria (17.08.2021-20.08.2021)
doi: 10.1145/3465481.3469191
Conference or Workshop Item, Bibliographie
Kuehn, Philipp ; Bayer, Markus ; Wendelborn, Marc ; Reuter, Christian
ed.: ACM (2021)
OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases.
16th International Conference on Availability, Reliability and Security. Vienna, Austria (17.08.2021-20.08.2021)
doi: 10.1145/3465481.3465744
Conference or Workshop Item, Bibliographie
Kuntke, Franz ; Sinn, Marcel ; Linsner, Sebastian ; Reuter, Christian
eds.: Meyer-Aurich, Andreas ; Gandorfer, Markus ; Hoffmann, Christa ; Weltzien, Cornelia ; Bellingrath-Kimura, Sonoko D. ; Floto, Helga ; Gesellschaft für Informatik (2021)
Low Power Wide Area Networks (LPWAN) für krisentaugliche Datenübertragung in landwirtschaftlichen Betrieben.
41. Jahrestagung der Gesellschaft für Informatik in der Landwirtschaft. Potsdam, Germany (08.03.2021-09.03.2021)
Conference or Workshop Item, Bibliographie
Kaufhold, Marc-André ; Fromm, Jennifer ; Riebe, Thea ; Mirbabaie, Milad ; Kuehn, Philipp ; Basyurt, Ali Sercan ; Bayer, Markus ; Stöttinger, Marc ; Eyilmez, Kaan ; Möller, Reinhard ; Fuchß, Christoph ; Stieglitz, Stefan ; Reuter, Christian (2021)
CYWARN: Strategy and Technology Development for Cross-Platform Cyber Situational Awareness and Actor-Specific Cyber Threat Communication.
MuC'21: Mensch und Computer 2021. Ingolstadt, Germany (05.09.2021-08.09.2021)
doi: 10.18420/muc2021-mci-ws08-263
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Reinheimer, Benjamin ; Aldag, Lukas ; Mayer, Peter ; Gerber, Nina ; Volkamer, Melanie (2020)
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation.
doi: 10.1007/978-3-030-54455-3_7
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Gerber, Nina ; Volkamer, Melanie ; Hilt, Annika (2019)
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen.
In: Datenschutz und Datensicherheit - DuD, 43 (2)
doi: 10.1007/s11623-019-1068-8
Article, Bibliographie
Karegar, Farzaneh ; Gerber, Nina ; Volkamer, Melanie ; Fischer-Hübner, Simone (2018)
Helping john to make informed decisions on using social login.
doi: 10.1145/3167132.3167259
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Hilt, Annika ; Gerber, Nina ; Volkamer, Melanie (2018)
"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer.
Conference or Workshop Item, Bibliographie
L
Linsner, Sebastian ; Kuntke, Franz ; Steinbrink, Enno ; Franken, Jonas ; Reuter, Christian (2021)
The Role of Privacy in Digitalization - Analysing the German Farmers' Perspective.
In: Proceedings on Privacy Enhancing Technologies, 2021 (3)
doi: 10.2478/popets-2021-0050
Article, Bibliographie
M
Marky, Karola ; Gerber, Nina ; Krumb, Henry John ; Khamis, Mohamed ; Mühlhäuser, Max (2024)
Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting.
2024 IEEE Symposium on Security and Privacy (SP). San Francisco, CA, USA (19.5.2024-23.5.2024)
doi: 10.1109/SP54263.2024.00136
Conference or Workshop Item, Bibliographie
Marky, Karola ; Gerber, Nina ; Pelzer, Michelle Gabriela ; Khamis, Mohamed ; Mühlhäuser, Max (2022)
You offer privacy like you offer tea: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2022 (4)
doi: 10.56553/popets-2022-0115
Article, Bibliographie
Mentler, Tilo ; Reuter, Christian ; Nestler, Simon ; Kaufhold, Marc-André ; Herczeg, Michael ; Pottebaum, Jens
ed.: ACM (2021)
8. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen: Ausnahmezustand.
MuC'21: Mensch und Computer 2021. Ingolstadt, Germany (05.09.2021-08.09.2021)
doi: 10.18420/muc2021-mci-ws08-117
Conference or Workshop Item, Bibliographie
Mittelbach, Arno ; Fischlin, Marc (2021)
The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography.
doi: 10.1007/978-3-030-63287-8
Book, Bibliographie
Mentler, Tilo ; Reuter, Christian ; Nestler, Simon ; Kaufhold, Marc-André ; Herczeg, Michael ; Pottebaum, Jens
ed.: Gesellschaft für Informatik e. V. (2020)
7. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
Conference on Mensch und Computer 2020 (MuC'20). Magdeburg, Germany (06.09.2020-09.09.2020)
doi: 10.18420/muc2020-ws117
Conference or Workshop Item, Bibliographie
Mayer, Peter ; Gerber, Nina ; Reinheimer, Benjamin ; Rack, Philipp ; Braun, Kristoffer ; Volkamer, Melanie (2019)
I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads.
doi: 10.1145/3290605.3300779
Conference or Workshop Item, Bibliographie
N
Nikolopoulos, Georgios M. ; Fischlin, Marc (2020)
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources.
In: Cryptography, 4 (4)
doi: 10.3390/cryptography4040031
Article, Bibliographie
O
Ott, Claire ; Jäkel, Frank (2024)
SimplifEx: Simplifying and Explaining Linear Programs.
In: Cognitive Systems Research, 88
doi: 10.1016/j.cogsys.2024.101298
Article, Bibliographie
P
Pasnicu, Otilia ; Zmmermann, Verena ; Gerber, Nina ; Cardoso, Sarah (2022)
Autonomous Driving - Analysing the Impact of Resilience Engineering Features in Smart Car Interfaces.
Mensch und Computer 2022. Darmstadt, Germany (04.09.2022-07.09.2022)
doi: 10.1145/3543758.3547573
Conference or Workshop Item, Bibliographie
R
Rawal, Niyati ; Koert, Dorothea ; Turan, Cigdem ; Kersting, Kristian ; Peters, Jan ; Stock-Homburg, Ruth (2022)
ExGenNet: Learning to Generate Robotic Facial Expression Using Facial Expression Recognition.
In: Frontiers in Robotics and AI, 8
doi: 10.3389/frobt.2021.730317
Article, Bibliographie
Riebe, Thea ; Wirth, Tristan ; Bayer, Markus ; Kuehn, Philipp ; Kaufhold, Marc-André ; Knauthe, Volker ; Guthe, Stefan ; Reuter, Christian (2021)
CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data.
23rd International Conference on Information and Communications Security (ICICS 2021). Chongqing, PR China (19.09.2021-21.09.2021)
doi: 10.1007/978-3-030-86890-1_24
Conference or Workshop Item, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André
ed.: Reuter, Christian (2021)
Soziale Medien in Notfällen, Krisen und Katastrophen.
In: Sicherheitskritische Mensch-Computer-Interaktion : Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Edition: 2., aktualisierte Auflage
doi: 10.1007/978-3-658-32795-8_19
Book Section, Bibliographie
Reuter, Christian ; Aal, Konstantin ; Beham, Frank ; Boden, Alexander ; Brauner, Florian ; Ludwig, Thomas ; Lukosch, Stephan ; Friedrich, Frank ; Fuchs-Kittowski, Frank ; Geisler, Stefan ; Gennen, Klaus ; Herrmann, Dominik ; Kaufhold, Marc-André ; Klafft, Michael ; Lipprandt, Myriam ; Lo Iacono, Luigi ; Pipek, Volkmar ; Mentler, Tilo ; Nestler, Simon ; Pottebaum, Jens ; Quadflieg, Sven ; Stieglitz, Stefan ; Sturm, Christian ; Rusch, Gebhard ; Sackmann, Stefan ; Volkamer, Melanie ; Wulf, Volker
ed.: Reuter, Christian (2021)
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Edition: 2., aktualisierte Auflage
doi: 10.1007/978-3-658-32795-8_31
Book Section, Bibliographie
Reuter, Christian ; Kaufhold, Marc-André
ed.: Reuter, Christian (2021)
Informatik für Frieden-, Konflikt- und Sicherheitsforschung.
In: Sicherheitskritische Mensch-Computer-Interaktion : Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Edition: 2., aktualisierte Auflage
doi: 10.1007/978-3-658-32795-8_28
Book Section, Bibliographie
Reuter, Christian
ed.: Reuter, Christian (2021)
Einleitung in die sicherheitskritische Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion : Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Edition: 2., aktualisierte Auflage
doi: 10.1007/978-3-658-32795-8_1
Book Section, Bibliographie
Riebe, Thea ; Schmid, Stefka ; Reuter, Christian (2021)
LinkedIn als Barometer: Wissenstransfer zwischen ziviler und militärischer F&E.
In: Wissenschaft & Frieden, 2021 (3)
Article, Bibliographie
Reuter, Christian ; Lechner, Ulrike (2021)
Introduction to the WI2021 Track: Digitization and Society – Even in Times of Corona.
International Conference on Wirtschaftsinformatik (WI 2021). Essen, Germany (09.03.2021-11.03.2021)
doi: 10.1007/978-3-030-86797-3
Conference or Workshop Item, Bibliographie
Riebe, Thea (2020)
Umgang mit Killerrobotern.
In: Wissenschaft & Frieden, 38 (2)
Article, Bibliographie
S
Suhre, Niklas (2024)
Developing and integrating scenarios in a virtual city.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00028039
Master Thesis, Primary publication, Publisher's Version
Stüttgen, Maik C. ; Dietl, Andrea ; Stoilova Eckert, Vanya V. ; de la Cuesta-Ferrer, Luis ; Blanke, Jan-Hendrik ; Koß, Christina ; Jäkel, Frank (2024)
Influence of reinforcement and its omission on trial-by-trial changes of response bias in perceptual decision making.
In: Journal of the Experimental Analysis of Behavior
doi: 10.1002/jeab.908
Article, Bibliographie
Salikutluk, V. ; Koert, D. ; Jäkel, F.
eds.: Lukowicz, P. ; Mayer, S. ; Koch, J. ; Shawe-Taylor, J. ; Tiddi, I. (2023)
Interacting with Large Language Models: A Case Study on AI-Aided Brainstorming for Guesstimation Problems.
International Conference on Hybrid Human-Artificial Intelligence (HHAI 2023). München (26.06.2023-30.06.2023)
doi: 10.3233/FAIA230081
Conference or Workshop Item, Bibliographie
Stöver, Alina ; Gerber, Nina ; Pridöhl, Henning ; Maass, Max ; Bretthauer, Sebastian ; Spiecker gen. Döhmann, Indra ; Hollick, Matthias ; Herrmann, Dominik (2023)
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2023 (2)
doi: 10.56553/popets-2023-0051
Article, Bibliographie
Stöver, Alina ; Hahn, Sara ; Kretschmer, Felix ; Gerber, Nina (2023)
Investigating how Users Imagine their Personal Privacy Assistant.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2023 (2)
doi: 10.56553/popets-2023-0059
Article, Bibliographie
Straub, Dominik ; Rothkopf, Constantin A. (2022)
Putting perception into action with inverse optimal control for continuous psychophysics.
In: eLife, 11
doi: 10.7554/eLife.76635
Article, Bibliographie
Stöver, Alina ; Gerber, Nina ; Cornel, Christin ; Henz, Mona ; Marky, Karola ; Zimmermann, Verena ; Vogt, Joachim (2022)
Website operators are not the enemy either - Analyzing options for creating cookie consent notices without dark patterns.
Mensch und Computer 2022. Darmstadt, Germany (04.09.2022-07.09.2022)
doi: 10.18420/muc2022-mci-ws01-458
Conference or Workshop Item, Bibliographie
Steinbrink, Enno ; Reichert, Lilian ; Mende, Michelle ; Reuter, Christian (2021)
Digital Privacy Perceptions of Asylum Seekers in Germany - An Empirical Study about Smartphone Usage during the Flight.
In: Proceedings of the ACM on Human-Computer Interaction, 5 (CSCW2)
doi: 10.1145/3479526
Article, Bibliographie
T
Trick, S. ; Rothkopf, C. A. ; Jäkel, F. (2023)
Parameter estimation for a bivariate beta distribution with arbitrary beta marginals and positive correlation.
In: Metron, 81 (1)
doi: 10.1007/s40300-023-00247-2
Article, Bibliographie
V
Vogt, Joachim ; Keil, Udo ; Cornel, Christin ; Gerber, Nina ; Ferreira, Yvonne (2023)
Psychotechnik, human factors, engineering psychology, Technikpsychologie—100 years of interdisciplinary cooperation between engineering and human sciences.
In: Zeitschrift für Arbeitswissenschaft, 77 (1)
doi: 10.1007/s41449-023-00353-x
Article, Bibliographie
Z
Zimmermann, Verena ; Haunschild, Jasmin ; Stöver, Alina ; Gerber, Nina
eds.: Fröhlich, P. ; Cobus, V. (2023)
Safe AND Secure Infrastructures? - Studying Human Aspects of Safety and Security Incidents with Experts from both Domains.
Mensch und Computer 2023. Rapperswil, Switzerland (03.09.2023-06.09.2023)
doi: 10.18420/muc2023-mci-ws01-225
Conference or Workshop Item, Bibliographie
Zimmermann, Verena ; Haunschild, Jasmin ; Unden, Marita ; Gerber, Paul ; Gerber, Nina (2022)
Sicherheitsherausforderungen für Smart-City-Infrastrukturen.
In: Wirtschaftsinformatik & Management, 14 (2)
doi: 10.1365/s35764-022-00396-5
Article, Bibliographie
Zimmermann, Sina ; Gerber, Nina (2019)
Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment.
In: i-com, 18 (3)
doi: 10.1515/icom-2018-0041
Article, Bibliographie