Dominik Herrmann

Orcid: 0000-0002-7374-3054

Affiliations:
  • University of Bamberg, Germany
  • University of Hamburg, Germany (former)


According to our database1, Dominik Herrmann authored at least 60 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users.
IEEE Access, 2024

Reliable and secure on-premise e-assessment with psi-exam.
Proceedings of the Sicherheit, 2024

Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme.
Proceedings of the Sicherheit, 2024

"Data Protection Can Sometimes Be a Nuisance" A Notification Study on Data Sharing Practices in City Apps.
Proceedings of the Mensch und Computer 2024, 2024

Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges.
Proc. Priv. Enhancing Technol., April, 2023

Towards Anonymizing Intermodal Mobility Data for Smart Cities.
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Geo-Privacy and Data Utility for Smart Societies, 2023

Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on Websites.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Browser Fingerprinting: How to Protect Machine Learning Models and Data with Differential Privacy?
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Standing out among the daily spam: How to catch website owners' attention by means of vulnerability notifications.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Souveräne digitalrechtliche Entscheidungsfindung hinsichtlich der Datenpreisgabe bei der Nutzung von Wearables.
Proceedings of the Selbstbestimmung, 2022

2021
Best Practices for Notification Studies for Security and Privacy Issues on the Internet.
CoRR, 2021

Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support.
Proceedings of the 30th USENIX Security Symposium, 2021

The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To?
Proceedings of the ICT Systems Security and Privacy Protection, 2021

ExPD: Semi-automated Web Extraction of Personal Data.
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021

How Private is Android's Private DNS Setting? Identifying Apps by Encrypted DNS Traffic.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Best Practices for Notification Studiesfor Security and Privacy Issues on the Internet.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Supplementary Material for "Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support".
Dataset, November, 2020

How do app vendors respond to subject access requests?: a longitudinal privacy study on iOS and Android Apps.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market.
Proceedings of the Human Practice. Digital Ecologies. Our Future. 14. Internationale Tagung Wirtschaftsinformatik (WI 2019), 2019

Dangers and Prevalence of Unprotected Web Fonts.
Proceedings of the 2019 International Conference on Software, 2019

2018
AppPETs: a framework for privacy-preserving apps.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

2017
Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.
CoRR, 2017

PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme - Konzept und rechtliche Zulässigkeit.
CoRR, 2017

PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites.
CoRR, 2017

Das Internet-Adressbuch bedroht unsere Privatsphäre.
CoRR, 2017

Editorial: 30th IFIP International Information Security Conference (IFIP SEC 2015).
Comput. Secur., 2017

PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme.
Proceedings of the 47. Jahrestagung der Gesellschaft für Informatik, 2017

PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
Beobachtungsmöglichkeiten im Domain Name System: Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz.
Springer Vieweg, ISBN: 978-3-658-13262-0, 2016

Unerfreulich auskunftsfreudig: Inferenzangriffe auf DNS-Anfragen bedrohen unsere Privatsphäre.
Datenbank-Spektrum, 2016

Obtaining personal data and asking for erasure: do app vendors and website owners honour your privacy rights?
Proceedings of the Sicherheit 2016: Sicherheit, 2016

Behavior-based tracking of Internet users with semi-supervised learning.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2015
Privacy issues in the Domain Name System and techniques for self-defense.
it Inf. Technol., 2015

Online privacy: Attacks and defenses.
it Inf. Technol., 2015

Laribus: privacy-preserving detection of fake SSL certificates with a social P2P notary network.
EURASIP J. Inf. Secur., 2015

Workload modelling for mix-based anonymity services.
Comput. Secur., 2015

Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

Anonymity Online for Everyone: What Is Missing for Zero-Effort Privacy on the Internet?
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

2014
Beobachtungsmöglichkeiten im Domain-Name-System: Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz.
PhD thesis, 2014

PADAVAN: Privacy-Aware Data Accumulation for Vehicular Ad-hoc Networks.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Fingerprinting Techniques for Target-oriented Investigations in Network Forensics.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

VANETsim: An open source simulator for security and privacy concepts in VANETs.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

Beobachtungsmöglichkeiten im Domain Name System: Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz.
Proceedings of the Ausgezeichnete Informatikdissertationen 2014, 2014

EncDNS: A Lightweight Privacy-Preserving Name Resolution Service.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic.
Comput. Secur., 2013

Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2012
IPv6 Prefix Alteration: An Opportunity to Improve Online Privacy
CoRR, 2012

gMix: Eine generische Architektur für Mix-Implementierungen und ihre Umsetzung als Open-Source-Framework.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility.
Proceedings of the Information Security and Privacy Research, 2012

Introducing the gMix Open Source Framework for Mix Implementations.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Verhaltensbasierte Verkettung von Internetsitzungen.
Datenschutz und Datensicherheit, 2011

Grenzen des "digitalen Radiergummis".
Datenschutz und Datensicherheit, 2011

Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions.
Proceedings of the Information Security Technology for Applications, 2010

2009
A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking.
Proceedings of the Trust, 2009

Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2007
Performance Comparison of Low-Latency Anonymisation Services from a User Perspective.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007


  Loading...