Inductive intrusion detection in flow-based network data using one-class support vector machines P Winter, E Hermann, M Zeilinger 2011 4th IFIP international conference on new technologies, mobility and …, 2011 | 159 | 2011 |
Rihamark: perceptual image hash benchmarking C Zauner, M Steinebach, E Hermann Media watermarking, security, and forensics III 7880, 343-357, 2011 | 62 | 2011 |
On detecting abrupt changes in network entropy time series P Winter, H Lampesberger, M Zeilinger, E Hermann Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International …, 2011 | 33 | 2011 |
An on-line learning statistical model to detect malicious web requests H Lampesberger, P Winter, M Zeilinger, E Hermann Security and Privacy in Communication Networks: 7th International ICST …, 2012 | 18 | 2012 |
Authentication method and devices E Hermann, D Kessler US Patent App. 11/253,958, 2006 | 16 | 2006 |
Detection of classical cipher types with feature-learning approaches E Leierzopf, V Mikhalev, N Kopal, B Esslinger, H Lampesberger, ... Data Mining: 19th Australasian Conference on Data Mining, AusDM 2021 …, 2021 | 13 | 2021 |
pyBNBowTie: Python library for Bow-Tie analysis based on Bayesian Networks FT Zurheide, E Hermann, H Lampesberger Procedia Computer Science 180, 344-351, 2021 | 12 | 2021 |
Signature validation and generation KHP Winkler, MU Körner, HR Schöning, E Hermann, R Kollmorgen, ... US Patent 7,761,711, 2010 | 12 | 2010 |
A massive machine-learning approach for classical cipher type detection using feature engineering E Leierzopf, N Kopal, B Esslinger, H Lampesberger, E Hermann International conference on historical cryptology, 111-120, 2021 | 11 | 2021 |
Authentication over a network using one-way tokens E Hermann, DH Kessler US Patent 8,312,525, 2012 | 11 | 2012 |
Auffinden von verschleierter Malware: Einsatz der heuristischen Analyse M Lehner, E Hermann Datenschutz und Datensicherheit-DuD 30 (12), 768-772, 2006 | 7 | 2006 |
The limes security model for information flow control E Hermann 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 6 | 2011 |
XML signatures in an enterprise service bus environment E Hermann, D Kessler Communications and Multimedia Security: 9th IFIP TC-6 TC-11International …, 2005 | 6 | 2005 |
Künstliche Intelligenz: rechtliches und technisches Grundwissen P Burgstaller, E Hermann, H Lampesberger MANZ, 2019 | 4 | 2019 |
Source access using request and one-way authentication tokens E Hermann, DH Kessler US Patent 8,028,331, 2011 | 4 | 2011 |
Anomalieerkennung in Computernetzen P Winter, H Lampesberger, M Zeilinger, E Hermann Datenschutz und Datensicherheit-DuD 35 (4), 235-239, 2011 | 3 | 2011 |
Digital signatures in XML R Kollmorgen, D Kessler, E Hermann, F Jung | 3 | |
Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher N Fürthauer, V Mikhalev, N Kopal, B Esslinger, H Lampesberger, ... International Conference on Historical Cryptology, 82-90, 2022 | 2 | 2022 |
Authentizität und integrität des aufnahmekontextes von bildern E Hermann, H Lampesberger, L Heimberger, M Altenhuber Datenschutz und Datensicherheit-DuD 43 (5), 281-286, 2019 | 2 | 2019 |
Statistical modeling of web requests for anomaly detection in web applications H Lampesberger, M Zeilinger, E Hermann Advances in IT Early Warning, 91-101, 2013 | 2* | 2013 |