Christian Schanes
According to our database1,
Christian Schanes
authored at least 16 papers
between 2009 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
0
1
2
3
4
5
1
4
4
1
2
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
2015
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Global VoIP security threats - large scale validation based on independent honeynets.
Proceedings of the 14th IFIP Networking Conference, 2015
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015
Mobile Payment Fraud: A Practical View on the Technical Architecture and Starting Points for Forensic Analysis of New Attack Scenarios.
Proceedings of the Ninth International Conference on IT Security Incident Management & IT Forensics, 2015
2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Generic Approach for Security Error Detection Based on Learned System Behavior Models for Automated Security Tests.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
2012
Tracing Your Maintenance Work - A Cross-Project Validation of an Automated Classification Dictionary for Commit Messages.
Proceedings of the Fundamental Approaches to Software Engineering, 2012
2011
Security Status of VoIP Based on the Observation of Real-World Attacks on a Honeynet.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
2010
Proceedings of the 7th International Working Conference on Mining Software Repositories, 2010
Black-box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service: work in progress.
Proceedings of the Principles, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
2009
Nationwide PKI Testing - Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009