0 | -- | 0 | . Frontmatter |
1 | -- | 3 | Steffen Wendzel, Luca Caviglione, Aleksandra Mileva, Jean-François Lalande, Wojciech Mazurczyk. Guest editorial: Information security methodology and replication studies |
5 | -- | 13 | Carina Heßeling, Jörg Keller 0001. Replication study challenges and new number formats for chaotic pseudo random number generators |
15 | -- | 27 | Rafael Copstein, Egil Karlsen, Jeff Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood. Exploring syntactical features for anomaly detection in application logs |
29 | -- | 42 | Aaron Weathersby, Mark Washington. Extracting network based attack narratives through use of the cyber kill chain: A replication study |
43 | -- | 48 | Guido Schmitz. Privacy-preserving Web single sign-on: Formal security analysis and design |
49 | -- | 53 | Daniel Demmler. Towards practical privacy-preserving protocols |
55 | -- | 65 | Christoph Gröger. Industrial analytics - An overview |
67 | -- | 70 | Ziawasch Abedjan. Enabling data-centric AI through data quality management and data literacy |
71 | -- | 75 | Katharina Weitz. Towards Human-Centered AI: Psychological concepts as foundation for empirical XAI research |