Journal: it - Information Technology

Volume 64, Issue 1-2

0 -- 0. Frontmatter
1 -- 3Steffen Wendzel, Luca Caviglione, Aleksandra Mileva, Jean-François Lalande, Wojciech Mazurczyk. Guest editorial: Information security methodology and replication studies
5 -- 13Carina Heßeling, Jörg Keller 0001. Replication study challenges and new number formats for chaotic pseudo random number generators
15 -- 27Rafael Copstein, Egil Karlsen, Jeff Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood. Exploring syntactical features for anomaly detection in application logs
29 -- 42Aaron Weathersby, Mark Washington. Extracting network based attack narratives through use of the cyber kill chain: A replication study
43 -- 48Guido Schmitz. Privacy-preserving Web single sign-on: Formal security analysis and design
49 -- 53Daniel Demmler. Towards practical privacy-preserving protocols
55 -- 65Christoph Gröger. Industrial analytics - An overview
67 -- 70Ziawasch Abedjan. Enabling data-centric AI through data quality management and data literacy
71 -- 75Katharina Weitz. Towards Human-Centered AI: Psychological concepts as foundation for empirical XAI research