Abstract is missing.
- Towards Understanding First-Party Cookie Tracking in the FieldNurullah Demir, Daniel Theis, Tobias Urban, Norbert Pohlmann. 19-34 [doi]
- Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction SimulatorJan Gruber, Felix C. Freiling. 49-64 [doi]
- SMT-Based Verification of Concurrent Critical SystemMatthias Güdemann. 67-82 [doi]
- Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware ModulesDominik Doerner, Jeremias Mechler, Jörn Müller-Quade. 83-99 [doi]
- PrivacyDates: A Framework for More Privacy-Preserving Timestamp Data TypesChristian Burkert, Jonathan Balack, Hannes Federrath. 101-112 [doi]
- On CRDTs in Byzantine EnvironmentsFlorian Jacob, Saskia Bayreuther, Hannes Hartenstein. 113-126 [doi]
- Recovering information from pixelized credentialsViktor Garske, Andreas Noack. 129-141 [doi]
- Sicherheit medizintechnischer Protokolle im KrankenhausChristoph Saatjohann, Fabian Ising, Matthias Gierlings, Dominik Noss, Sascha Schimmler, Alexander Klemm, Leif Grundmann, Tilman Frosch, Sebastian Schinzel. 143-158 [doi]
- Analyzing the Software Patch Discipline Across Different Industries and CountriesRobin Müller, Julius Ruppert, Katharina Will, Lukas Wüsteney, Tobias Heer. 159-170 [doi]
- Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-PublikationenNico Mayer, Steffen Wendzel, Jörg Keller 0001. 173-182 [doi]
- Short Paper: Debating Ethics with Cybersecurity StudentsJan Breig, Dirk Westhoff. 183-192 [doi]
- Short Paper: Business Chat ist verwirrt. Es hat sich vor Verwirrung selbst verletzt!Moritz Gruber, Christian Höfig, Matteo Große-Kampmann, Tobias Urban, Norbert Pohlmann. 193-202 [doi]
- Cyber-Defense "Gemessen, Bewertet und Ausgerichtet" - Ein PraxisberichtFabian Lochmann, Sebastian Schmerl. 205-208 [doi]
- Studie über das Gefahrenpotential und Gegenmaßnahmen zu Angriffen auf das DNS Protokoll durch IP-FragmentierungCarsten Strotmann, Patrick Ben Koetter, Roland van Rijswijk-Deij, Markus de Brün, Anders Kölligan. 209-212 [doi]
- Recent Developments in the Context of Online Elections and Digital Polls in GermanyBernhard Beckert, Jurlind Budurushi, Armin Grunwald, Robert Krimmer, Oksana Kulyk, Ralf Küsters, Andreas Mayer, Jörn Müller-Quade, Stephan Neumann, Melanie Volkamer. 213-217 [doi]
- Ongoing Automated Data Set Generation for Vulnerability Prediction from Github DataTorge Hinrichs. 219-222 [doi]
- Your website has been hijacked: Raising awareness for an invisible problemAnne Hennig. 225-230 [doi]
- Automated Monitoring of Operational Technology Security and Compliance for Power GridsBastian Fraune. 231-236 [doi]
- Reinforcement Learning-Controlled Mitigation of Volumetric DDoS AttacksHauke Heseding. 237-242 [doi]
- Differential Testing: How to find differences between programs that mostly behave identically?Jonas Möller. 243-248 [doi]