TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 6.

Whitmore, Jim ; Türpe, Sven ; Triller, Stefan ; Poller, Andreas ; Carlson, Christina (2014):
Threat analysis in the software development lifecycle.
In: IBM journal of research and development 58 (2014), (1), pp. 6:1-6:13. DOI: 10.1147/JRD.2013.2288060,
[Article]

Heumann, Thomas ; Türpe, Sven ; Keller, Jörg
Freiling, Felix (ed.) (2010):
Quantifying the Attack Surface of a Web Application.
In: Lecture Notes in Informatics (LNI), P-170, In: Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit., pp. 305-316,
Bonner Köllen Verlag, Bonn, ISBN 978-3-88579-264-2,
[Conference or Workshop Item]

Türpe, Sven ; Poller, Andreas ; Steffan, Jan ; Stotz, Jan-Peter ; Trukenmüller, Jan (2009):
Attacking the BitLocker Boot Process.
5471, In: International Conference on the Technical and Socio-economic Aspects of Trusted Computing (Trust 2009), pp. 183-196,
Springer, [Conference or Workshop Item]

Türpe, Sven ; Eichler, Jörn (2009):
Testing Production Systems Safely: Common Precautions in Penetration Testing.
In: 4th Testing: Academic and Industrial Conference (TAIC PART 2009),
[Conference or Workshop Item]

Türpe, Sven (2009):
What Is the Shape of Your Security Policy? Security as a Classification Problem.
In: New Security Paradigms Workshop 2009,
ACM, [Conference or Workshop Item]

Türpe, Sven ; Poller, Andreas ; Trukenmüller, Jan ; Repp, Jürgen ; Bornmann, Christian (2008):
Supporting Security Testers in Discovering Injection Flaws.
In: Proc. TAIC-PART 2008, pp. 64-68,
ISBN 978-0-7695-3383-4,
DOI: 10.1109/TAIC-PART.2008.7,
[Conference or Workshop Item]

This list was generated on Sat Oct 1 08:06:04 2022 CEST.