Ulrike Meyer
Orcid: 0000-0002-2569-1042Affiliations:
- RWTH Aachen University, Germany
According to our database1,
Ulrike Meyer
authored at least 102 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
A Comprehensive Study on Multi-Task Learning for Domain Generation Algorithm (DGA) Detection.
Proceedings of the 21st Annual International Conference on Privacy, Security and Trust, 2024
Proceedings of the 21st Annual International Conference on Privacy, Security and Trust, 2024
Extended Abstract: A Transfer Learning-Based Training Approach for DGA Classification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Access Your Data... if You Can: An Analysis of Dark Patterns Against the Right of Access on Popular Websites.
Proceedings of the Privacy Technologies and Policy - 12th Annual Privacy Forum, 2024
2023
Behind the Screens: The Security & Privacy Advice Landscape of Children in Grades 5 & 6.
Proceedings of the 18th WiPSCE Conference on Primary and Secondary Computing Education Research, 2023
False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Int. J. Serious Games, 2022
Towards Secure Evaluation of Online Functionalities (Corrected and Extended Version).
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022
More Than Meets the Eye - An Anti-Phishing Learning Game with a Focus on Phishing Emails.
Proceedings of the Games and Learning Alliance: 11th International Conference, 2022
Better the Phish You Know: Evaluating Personalization in Anti-Phishing Learning Games.
Proceedings of the 14th International Conference on Computer Supported Education, 2022
Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
CoRR, 2021
A Modular Architecture for Personalized Learning Content in Anti-Phishing Learning Games.
Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the Games and Learning Alliance - 10th International Conference, 2021
Proceedings of the CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020
A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020
Proceedings of the 20th IEEE International Conference on Advanced Learning Technologies, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Making use of NXt to nothing: the effect of class imbalances on DGA detection classifiers.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
2017
Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques.
J. Comput. Secur., 2017
IACR Cryptol. ePrint Arch., 2017
Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Bildungsräume 2017: DeLFI 2017, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Multi-operator wireless mesh networks secured by an all-encompassing security architecture.
Int. J. Inf. Sec., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
2013
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version).
IACR Cryptol. ePrint Arch., 2013
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
IP agnostic real-time traffic filtering and host identification using TCP timestamps.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the 3rd International Workshop on Information Management for Mobile Applications, 2013
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013
Proceedings of the CCSW'13, 2013
Proceedings of the Number Theory and Cryptography, 2013
2012
FSASD: A framework for establishing security associations for sequentially deployed WMN.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Testing Software and Systems, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version).
IACR Cryptol. ePrint Arch., 2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
2010
Diameter Proxy Mobile IPv6: Mobile Access Gateway and Local Mobility Anchor Interaction with Diameter Server.
RFC, February, 2010
IACR Cryptol. ePrint Arch., 2010
Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging and billing.
Comput. Commun., 2010
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets.
Proceedings of the Information Security - 13th International Conference, 2010
2009
Generating oscillatory bursts from a network of regular spiking neurons without inhibition.
J. Comput. Neurosci., 2009
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
2008
2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of IEEE International Conference on Communications, 2007
2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
2005
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs.
Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2005
2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004
On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks.
Proceedings of the IEEE 15th International Symposium on Personal, 2004