Eckehard Hermann

According to our database1, Eckehard Hermann authored at least 22 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Object Geolocalization Using Consumer-Grade Devices: Algorithms and Applications.
Proceedings of the 4th International Workshop on Camera Traps, AI, and Ecology, Hagenberg, Austria, September 5, 2024

2022
Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher.
Proceedings of the 5th International Conference on Historical Cryptology, 2022

2021
A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering.
Proceedings of the 4th International Conference on Historical Cryptology, 2021

Detection of Classical Cipher Types with Feature-Learning Approaches.
Proceedings of the Data Mining, 2021

2020
pyBNBowTie: Python library for Bow-Tie Analysis based on Bayesian Networks.
Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2020), 2020

2019
Authentizität und Integrität des Aufnahmekontextes von Bildern.
Datenschutz und Datensicherheit, 2019

2013
Entwicklung eines Sicherheitsmodells für offene verteilte Web-Services-Anwendungen.
PhD thesis, 2013

The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A Formal Equivalence Classes Based Method for Security Policy Conformance Checking.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Anomalieerkennung in Computernetzen.
Datenschutz und Datensicherheit, 2011

IT Frühwarnung.
Datenschutz und Datensicherheit, 2011

Blick in die Glaskugel.
Datenschutz und Datensicherheit, 2011

An On-Line Learning Statistical Model to Detect Malicious Web Requests.
Proceedings of the Security and Privacy in Communication Networks, 2011

Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Rihamark: perceptual image hash benchmarking.
Proceedings of the Media Forensics and Security III, 2011

On Detecting Abrupt Changes in Network Entropy Time Series.
Proceedings of the Communications and Multimedia Security, 2011

A Security Policy Model for Agent Based Service-Oriented Architectures.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2009
Schutz kritischer Infrastrukturen mittels IT-Frühwarnung.
Datenschutz und Datensicherheit, 2009

2007
Virtualisierende Rootkits, die fast perfekte Tarnung - Aufbau, Funktionsweise & Erkennung.
Datenschutz und Datensicherheit, 2007

2006
Auffinden von verschleierter Malware - Einsatz der heuristischen Analyse.
Datenschutz und Datensicherheit, 2006

2005
XML Signatures in an Enterprise Service Bus Environment.
Proceedings of the Communications and Multimedia Security, 2005

2003
XML-Signaturen in Datenbanken. Archivierung signierter Dokumente und die Unterstützung von Signaturen durch Datenbanken.
Datenschutz und Datensicherheit, 2003


  Loading...