default search action
Claudia Eckert 0001
Person information
- affiliation: TU Munich, Faculty of Computer Science, Germany
- affiliation: Fraunhofer Research Institution for Applied and Integrated Security (AISEC), Garching, Germany
- affiliation: Technical University of Darmstadt, Department of Computer Science, Germany
- affiliation: University of Bremen, Faculty of Mathematics and Computer Science, Germany
Other persons with the same name
- Claudia M. Eckert (aka: Claudia Eckert 0002) — Open University, Milton Keynes, Department of Engineering and Innovation, UK (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i8]Huang Xiao, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, Fabio Roli:
Support Vector Machines under Adversarial Label Contamination. CoRR abs/2206.00352 (2022) - 2021
- [j24]Paul Muntean, Martin Monperrus, Hao Sun, Jens Grossklags, Claudia Eckert:
IntRepair: Informed Repairing of Integer Overflows. IEEE Trans. Software Eng. 47(10): 2225-2241 (2021) - [c116]Peng Xu, Claudia Eckert, Apostolis Zarras:
Falcon: Malware Detection and Categorization with Network Traffic Images. ICANN (1) 2021: 117-128 - [c115]Peng Xu, Youyi Zhang, Claudia Eckert, Apostolis Zarras:
HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs. ICANN (3) 2021: 127-138 - [c114]Mohammad Reza Norouzian, Peng Xu, Claudia Eckert, Apostolis Zarras:
Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic. ISC 2021: 259-278 - [c113]Paul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
iTOP: Automating Counterfeit Object-Oriented Programming Attacks. RAID 2021: 162-176 - [c112]Peng Xu, Claudia Eckert, Apostolis Zarras:
Detecting and categorizing Android malware with graph neural networks. SAC 2021: 409-412 - [i7]Gregory Falco, Paul Cornish, Sadie Creese, Madeline Carr, Myriam Dunn Cavelty, Claudia Eckert, Herbert Lin, Gen Goto, Jamie Saunders, Andrew Grotto, Howard E. Shrobe, Sean Kanuck, Lawrence Susskind, Arvind Parthasarathi:
Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance. CoRR abs/2107.14065 (2021) - [i6]Peng Xu, Claudia Eckert, Apostolis Zarras:
hybrid-Flacon: Hybrid Pattern Malware Detection and Categorization with Network Traffic andProgram Code. CoRR abs/2112.10035 (2021) - 2020
- [c111]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings. ACSAC 2020: 466-479 - [c110]Alexander Giehl, Norbert Wiedermann, Makan Tayebi Gholamzadeh, Claudia Eckert:
Integrating security evaluations into virtual commissioning. CASE 2020: 1193-1200 - [c109]Peng Xu, Bojan Kolosnjaji, Claudia Eckert, Apostolis Zarras:
MANIS: evading malware detection system on graph structure. SAC 2020: 1688-1695
2010 – 2019
- 2019
- [c108]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing control flow integrity with LLVM-CFI. ACSAC 2019: 584-597 - [i5]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing Control Flow Integrity with LLVM-CFI. CoRR abs/1910.01485 (2019) - 2018
- [c107]Martin Salfer, Claudia Eckert:
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks. ARES 2018: 21:1-21:10 - [c106]Sergej Proskurin, Tamas K. Lengyel, Marius Momeu, Claudia Eckert, Apostolis Zarras:
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection. ACSAC 2018: 407-417 - [c105]Paul Muntean, Sebastian Wuerl, Jens Grossklags, Claudia Eckert:
CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM. ESORICS (1) 2018: 3-25 - [c104]Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli:
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. EUSIPCO 2018: 533-537 - [c103]Bojan Kolosnjaji, Antonia Hufner, Claudia Eckert, Apostolis Zarras:
Learning on a Budget for User Authentication on Mobile Devices. ICASSP 2018: 2042-2046 - [c102]George D. Webster, Ryan L. Harris, Zachary D. Hanif, Bruce A. Hembree, Jens Grossklags, Claudia Eckert:
Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics. iThings/GreenCom/CPSCom/SmartData 2018: 1402-1409 - [c101]Paul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, Claudia Eckert:
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. RAID 2018: 423-444 - [i4]Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli:
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. CoRR abs/1803.04173 (2018) - [i3]Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli:
Is feature selection secure against training data poisoning? CoRR abs/1804.07933 (2018) - [i2]Paul Muntean, Martin Monperrus, Hao Sun, Jens Grossklags, Claudia Eckert:
IntRepair: Informed Fixing of Integer Overflows. CoRR abs/1807.05092 (2018) - 2017
- [j23]Claudia Eckert:
Cybersicherheit beyond 2020! - Herausforderungen für die IT-Sicherheitsforschung. Inform. Spektrum 40(2): 141-146 (2017) - [j22]Markus Anding, Andreas Boes, Claudia Eckert, Dietmar Harhoff, Thomas Hess, Ursula Münch, Alexander Pretschner:
Herausforderungen an der Schnittstelle von Informatik und Gesellschaft - Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt. Inform. Spektrum 40(2): 172-175 (2017) - [c100]George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras, Claudia Eckert:
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage. DIMVA 2017: 119-138 - [c99]Bojan Kolosnjaji, Ghadir Eraisha, George D. Webster, Apostolis Zarras, Claudia Eckert:
Empowering convolutional networks for malware classification and analysis. IJCNN 2017: 3838-3845 - [c98]Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras, Claudia Eckert:
Combating Control Flow Linearization. SEC 2017: 385-398 - [p3]Claudia Eckert:
Cybersicherheit Beyond 2020! 50 Jahre Universitäts-Informatik in München 2017: 1-10 - [p2]Markus Anding, Andreas Boes, Claudia Eckert, Dietmar Harhoff, Thomas Hess, Ursula Münch, Alexander Pretschner:
Herausforderungen an der Schnittstelle von Informatik und Gesellschaft: Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt. 50 Jahre Universitäts-Informatik in München 2017: 141-147 - [p1]Niels Fallenbeck, Claudia Eckert:
IT-Sicherheit und Cloud Computing. Handbuch Industrie 4.0 (4) 2017: 137-171 - [i1]Paul Muntean, Jens Grossklags, Claudia Eckert:
Practical Integer Overflow Prevention. CoRR abs/1710.03720 (2017) - 2016
- [c97]Julian Horsch, Sascha Wessel, Claudia Eckert:
CoKey: fast token-based cooperative cryptography. ACSAC 2016: 314-323 - [c96]Bojan Kolosnjaji, Apostolis Zarras, George D. Webster, Claudia Eckert:
Deep Learning for Classification of Malware System Call Sequences. Australasian Conference on Artificial Intelligence 2016: 137-149 - [c95]Konstantin Böttinger, Claudia Eckert:
DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract). DIMVA 2016: 25-34 - [c94]Bojan Kolosnjaji, Apostolis Zarras, Tamas K. Lengyel, George D. Webster, Claudia Eckert:
Adaptive Semantics-Aware Malware Classification. DIMVA 2016: 419-439 - [c93]George D. Webster, Zachary D. Hanif, Andre L. P. Ludwig, Tamas K. Lengyel, Apostolis Zarras, Claudia Eckert:
SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing. ISC 2016: 231-249 - [c92]Steffen Wagner, Claudia Eckert:
Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems. ISC 2016: 305-322 - [c91]Maximilian Strobel, Norbert Wiedermann, Claudia Eckert:
Novel weaknesses in IEC 62351 protected Smart Grid control systems. SmartGridComm 2016: 266-270 - 2015
- [j21]Sascha Wessel, Manuel Huber, Frederic Stumpf, Claudia Eckert:
Improving mobile device security with operating system-level virtualization. Comput. Secur. 52: 207-220 (2015) - [j20]Claudia Eckert:
Industrie 4.0? Mit Sicherheit! Datenschutz und Datensicherheit 39(10): 641 (2015) - [j19]Claudia Eckert, Helmut Reimer:
Basis und Überbau. Datenschutz und Datensicherheit 39(10): 696 (2015) - [j18]Huang Xiao, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, Fabio Roli:
Support vector machines under adversarial label contamination. Neurocomputing 160: 53-62 (2015) - [j17]Claudia Eckert, Niels Fallenbeck:
Industrie 4.0 meets IT-Sicherheit: eine Herausforderung! Inform. Spektrum 38(3): 217-223 (2015) - [j16]Chih-Ta Lin, Nai-Jian Wang, Han Xiao, Claudia Eckert:
Feature Selection and Extraction for Malware Classification. J. Inf. Sci. Eng. 31(3): 965-992 (2015) - [c90]Fatih Kiliç, Claudia Eckert:
iDeFEND: Intrusion Detection Framework for Encrypted Network Data. CANS 2015: 111-118 - [c89]Konstantin Böttinger, Dieter Schuster, Claudia Eckert:
Detecting Fingerprinted Data in TLS Traffic. AsiaCCS 2015: 633-638 - [c88]Fatih Kiliç, Hannes Laner, Claudia Eckert:
Interactive Function Identification Decreasing the Effort of Reverse Engineering. Inscrypt 2015: 468-487 - [c87]Han Xiao, Shou-De Lin, Mi-Yen Yeh, Phillip B. Gibbons, Claudia Eckert:
Learning better while sending less: Communication-efficient online semi-supervised learning in client-server settings. DSAA 2015: 1-10 - [c86]Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli:
Is Feature Selection Secure against Training Data Poisoning? ICML 2015: 1689-1698 - [c85]Bojan Kolosnjaji, Claudia Eckert:
Neural Network-Based User-Independent Physical Activity Recognition for Mobile Devices. IDEAL 2015: 378-386 - [c84]Michael Velten, Peter Schneider, Sascha Wessel, Claudia Eckert:
User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts. ISPEC 2015: 268-282 - [c83]Paul Muntean, Mustafizur Rahman, Andreas Ibing, Claudia Eckert:
SMT-constrained symbolic execution engine for integer overflow detection in C code. ISSA 2015: 1-8 - [c82]Paul Muntean, Adnan Rabbi, Andreas Ibing, Claudia Eckert:
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code. QRS Companion 2015: 128-137 - [c81]Thomas Kittel, Sebastian Vogl, Julian Kirsch, Claudia Eckert:
Counteracting Data-Only Malware with Code Pointer Examination. RAID 2015: 177-197 - [c80]Paul Muntean, Vasantha Kommanapalli, Andreas Ibing, Claudia Eckert:
Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMT. SAFECOMP 2015: 441-456 - [c79]Martin Salfer, Claudia Eckert:
Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units. SECRYPT 2015: 317-326 - 2014
- [j15]Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Klaus A. Kuhn:
A flexible approach to distributed data anonymization. J. Biomed. Informatics 50: 62-76 (2014) - [c78]Julian Horsch, Sascha Wessel, Frederic Stumpf, Claudia Eckert:
SobrTrA: a software-based trust anchor for ARM cortex application processors. CODASPY 2014: 273-280 - [c77]Tamas K. Lengyel, Thomas Kittel, Jonas Pfoh, Claudia Eckert:
Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions. DEXA Workshops 2014: 308-312 - [c76]Martin Salfer, Hendrik Schweppe, Claudia Eckert:
Efficient Attack Forest Construction for Automotive On-board Networks. ISC 2014: 442-453 - [c75]Sebastian Vogl, Jonas Pfoh, Thomas Kittel, Claudia Eckert:
Persistent Data-only Malware: Function Hooks without Code. NDSS 2014 - [c74]Fatih Kiliç, Thomas Kittel, Claudia Eckert:
Blind Format String Attacks. SecureComm (2) 2014: 301-314 - [c73]Paul Muntean, Claudia Eckert, Andreas Ibing:
Context-sensitive detection of information exposure bugs with symbolic execution. InnoSWDev@SIGSOFT FSE 2014: 84-93 - [c72]Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz:
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data. USENIX Security Symposium 2014: 813-828 - [e1]Claudia Eckert, Sokratis K. Katsikas, Günther Pernul:
Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings. Lecture Notes in Computer Science 8647, Springer 2014, ISBN 978-3-319-09769-5 [contents] - 2013
- [j14]Claudia Eckert, Thomas Kittel:
Security Issues of Multi-Core Architectures - The Automotive Case. it Inf. Technol. 55(1): 5-9 (2013) - [j13]Alexandre Bouard, Dennis Burgkhardt, Claudia Eckert:
Middleware-based Security for Hyperconnected Applications in Future In-Car Networks. EAI Endorsed Trans. Mob. Commun. Appl. 1(3): e7 (2013) - [c71]Han Xiao, Claudia Eckert:
Lazy Gaussian Process Committee for Real-Time Online Regression. AAAI 2013: 969-976 - [c70]Dominik Merli, Georg Sigl, Claudia Eckert:
Identities for Embedded Systems Enabled by Physical Unclonable Functions. Number Theory and Cryptography 2013: 125-138 - [c69]Alexandre Bouard, Benjamin Weyl, Claudia Eckert:
Practical information-flow aware middleware for in-car communication. CyCAR@CCS 2013: 3-8 - [c68]Huang Xiao, Han Xiao, Claudia Eckert:
OPARS: Objective Photo Aesthetics Ranking System. ECIR 2013: 861-864 - [c67]Han Xiao, Claudia Eckert:
Efficient Online Sequence Prediction with Side Information. ICDM 2013: 1235-1240 - [c66]Huang Xiao, Claudia Eckert:
Indicative Support Vector Clustering with Its Application on Anomaly Detection. ICMLA (1) 2013: 273-276 - [c65]Michael Velten, Sascha Wessel, Frederic Stumpf, Claudia Eckert:
Active File Integrity Monitoring Using Paravirtualized Filesystems. INTRUST 2013: 53-69 - [c64]Steffen Wagner, Christoph Krauß, Claudia Eckert:
Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel Tasks. ISC 2013: 20-36 - [c63]Sebastian Vogl, Fatih Kiliç, Christian A. Schneider, Claudia Eckert:
X-TIER: Kernel Module Injection. NSS 2013: 192-205 - [c62]Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
Leveraging String Kernels for Malware Detection. NSS 2013: 206-219 - [c61]Han Xiao, Huang Xiao, Claudia Eckert:
Learning from Multiple Observers with Unknown Expertise. PAKDD (1) 2013: 595-606 - [c60]Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert:
Improving Mobile Device Security with Operating System-Level Virtualization. SEC 2013: 148-161 - 2012
- [j12]Claudia Eckert:
Embedded systems security. Datenschutz und Datensicherheit 36(12): 861 (2012) - [c59]Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Alfons Kemper, Klaus A. Kuhn:
Highly efficient optimal k-anonymity for biomedical datasets. CBMS 2012: 1-6 - [c58]Han Xiao, Huang Xiao, Claudia Eckert:
Adversarial Label Flips Attack on Support Vector Machines. ECAI 2012: 870-875 - [c57]Alexandre Bouard, Johannes Schanda, Daniel Herrscher, Claudia Eckert:
Automotive Proxy-Based Security Architecture for CE Device Integration. MOBILWARE 2012: 62-76 - [c56]Han Xiao, Thomas Stibor, Claudia Eckert:
Evasion Attack of Multi-class Linear Classifiers. PAKDD (1) 2012: 207-218 - [c55]Felix Wieczorek, Christoph Krauß, Frank Schiller, Claudia Eckert:
Towards Secure Fieldbus Communication. SAFECOMP 2012: 149-160 - [c54]Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Alfons Kemper, Klaus A. Kuhn:
Flash: Efficient, Stable and Optimal K-Anonymity. SocialCom/PASSAT 2012: 708-717 - [c53]Hasan Ibne Akram, Colin de la Higuera, Claudia Eckert:
Actively Learning Probabilistic Subsequential Transducers. ICGI 2012: 19-33 - 2011
- [j11]Claudia Eckert, Christoph Krauß:
Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen. Datenschutz und Datensicherheit 35(8): 535-541 (2011) - [c52]Christian A. Schneider, Jonas Pfoh, Claudia Eckert:
A Universal Semantic Bridge for Virtual Machine Introspection. ICISS 2011: 370-373 - [c51]Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
Nitro: Hardware-Based System Call Tracing for Virtual Machines. IWSEC 2011: 96-112 - [c50]Steffen Wagner, Christoph Krauß, Claudia Eckert:
T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks. SecureComm 2011: 511-521 - 2010
- [c49]Dominik Merli, Frederic Stumpf, Claudia Eckert:
Improving the quality of ring oscillator PUFs on FPGAs. WESS 2010: 9 - [c48]Florian Kohlmayer, Ronald R. Lautenschläger, Sebastian H. R. Wurst, Thomas Klopstock, Holger Prokisch, Thomas Meitinger, Claudia Eckert, Klaus A. Kuhn:
Konzept für ein deutschlandweites Krankheitsnetz am Beispiel von mitoREGISTER. GI Jahrestagung (2) 2010: 746-751 - [c47]Hasan Ibne Akram, Colin de la Higuera, Huang Xiao, Claudia Eckert:
Grammatical Inference Algorithms in MATLAB. ICGI 2010: 262-266 - [c46]Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
Exploiting the x86 Architecture to Derive Virtual Machine State Information. SECURWARE 2010: 166-175
2000 – 2009
- 2009
- [b6]Claudia Eckert:
IT-Sicherheit - Konzepte, Verfahren, Protokolle (6. Aufl.). Oldenbourg 2009, ISBN 978-3-486-58999-3, pp. I-XIV, 1-981 - [c45]Christian A. Schneider, Frederic Stumpf, Claudia Eckert:
Enhancing Control of Service Compositions in Service-Oriented Architectures. ARES 2009: 953-959 - [c44]Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
A formal model for virtual machine introspection. VMSec@CCS 2009: 1-10 - 2008
- [b5]Claudia Eckert:
IT-Sicherheit - Konzepte, Verfahren, Protokolle (5. Aufl.). Oldenbourg 2008, ISBN 978-3-486-58270-3, pp. I-XIV, 1-925 - [j10]Omid Tafreschi, Dominique Mähler, Janina Fengel, Michael Rebstock, Claudia Eckert:
A reputation system for electronic negotiations. Comput. Stand. Interfaces 30(6): 351-360 (2008) - [j9]Christoph Krauß, Markus Schneider, Claudia Eckert:
On handling insider attacks in wireless sensor networks. Inf. Secur. Tech. Rep. 13(3): 165-172 (2008) - [c43]Frederic Stumpf, Claudia Eckert, Shane Balfe:
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. ARES 2008: 376-382 - [c42]Frederic Stumpf, Andreas Fuchs, Stefan Katzenbeisser, Claudia Eckert:
Improving the scalability of platform attestation. STC 2008: 1-10 - [c41]Sascha Müller, Stefan Katzenbeisser, Claudia Eckert:
Distributed Attribute-Based Encryption. ICISC 2008: 20-36 - [c40]Frederic Stumpf, Claudia Eckert:
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. SECURWARE 2008: 1-9 - [c39]Lars Fischer, Claudia Eckert:
506 Ways to Track Your Lover. VTC Fall 2008: 1-5 - [c38]Christoph Krauß, Markus Schneider, Claudia Eckert:
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs. WiMob 2008: 586-591 - [c37]Christoph Krauß, Markus Schneider, Claudia Eckert:
Defending against false-endorsement-based dos attacks in wireless sensor networks. WISEC 2008: 13-23 - [c36]Lars Fischer, Stefan Katzenbeisser, Claudia Eckert:
Measuring unlinkability revisited. WPES 2008: 105-110 - 2007
- [j8]Frederic Stumpf, Markus Sacher, Alexander Roßnagel, Claudia Eckert:
Erzeugung elektronischer Signaturen mittels Trusted Platform Module. Datenschutz und Datensicherheit 31(5): 357-361 (2007) - [j7]Claudia Eckert, Björn Steinemann, Tobias Wahl:
SOA und Sicherheit - Web Service Security Praxis und Offene Probleme. Datenschutz und Datensicherheit 31(9): 656-661 (2007) - [c35]Christoph Krauß, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert:
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. ARES 2007: 310-317 - [c34]Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert:
An Approach to a Trustworthy System Architecture Using Virtualization. ATC 2007: 191-202 - [c33]Patrick Röder, Omid Tafreschi, Claudia Eckert:
History-based access control for XML documents. AsiaCCS 2007: 386-388 - [c32]Taufiq Rochaeli, Claudia Eckert:
Using patterns paradigm to refine workflow policies. DEXA Workshops 2007: 760-764 - [c31]Taufiq Rochaeli, Claudia Eckert:
Model Checking of Restricted CTL* Formulas using ALCK. Description Logics 2007 - [c30]Christoph Krauß, Frederic Stumpf, Claudia Eckert:
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. ESAS 2007: 203-217 - [c29]Patrick Röder, Omid Tafreschi, Fredrik Mellgren, Claudia Eckert:
A System Architecture for History-Based Access Control for XML Documents. ICICS 2007: 362-374 - [c28]Patrick Röder, Omid Tafreschi, Claudia Eckert:
On Flexible Modeling of History-Based Access Control Policies for XML Documents. KES (3) 2007: 1090-1097 - [c27]Taufiq Rochaeli, Claudia Eckert:
Expertise Knowledge-Based Policy Refinement Process. POLICY 2007: 61-65 - [c26]Omid Tafreschi, Dominique Maehler, Janina Fengel, Michael Rebstock, Claudia Eckert:
A Reputation System for Electronic Negotiations. WOSIS 2007: 53-62 - [c25]Thomas Buntrock, Hans-Christian Esperer, Claudia Eckert:
Situation-Based Policy Enforcement. TrustBus 2007: 190-200 - [c24]Frederic Stumpf, Patrick Röder, Claudia Eckert:
An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks. WISA 2007: 142-156 - 2006
- [b4]Claudia Eckert:
IT-Sicherheit - Konzepte, Verfahren, Protokolle (4. Aufl.). Oldenbourg 2006, ISBN 978-3-486-57851-5, pp. I-XIV, 1-918 - [j6]Thomas Stibor, Claudia Eckert, Jonathan Timmis:
Artificial Immune Systems for IT-Security (Künstliche Immunsysteme für IT-Sicherheit). it Inf. Technol. 48(3): 168-173 (2006) - [c23]Thomas Stibor, Jonathan Timmis, Claudia Eckert:
The Link between r-contiguous Detectors and k-CNF Satisfiability. IEEE Congress on Evolutionary Computation 2006: 491-498 - [c22]Thomas Stibor, Jonathan Timmis, Claudia Eckert:
On Permutation Masks in Hamming Negative Selection. ICARIS 2006: 122-135 - [c21]Thomas Stibor, Jonathan Timmis, Claudia Eckert:
On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions. ICARIS 2006: 215-228 - [c20]Thomas Stibor, Jonathan Timmis, Claudia Eckert:
Generalization Regions in Hamming Negative Selection. Intelligent Information Systems 2006: 447-456 - 2005
- [j5]Claudia Eckert:
Ubiquitäre Sicherheit für dynamische, mobile Systeme. Eine Herausforderung für die IT-Sicherheit. Prax. Inf.verarb. Kommun. 28(1): 25-28 (2005) - [c19]Thomas Stibor, Jonathan Timmis, Claudia Eckert:
On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system. Congress on Evolutionary Computation 2005: 995-1002 - [c18]Taufiq Rochaeli, Claudia Eckert:
Attack Goal Generation Using Description Logic-based Knowledge Representation. Description Logics 2005 - [c17]Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, Claudia Eckert:
Is negative selection appropriate for anomaly detection? GECCO 2005: 321-328 - [c16]Thomas Stibor, Jonathan Timmis, Claudia Eckert:
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques. ICARIS 2005: 262-275 - [c15]Claudia Eckert:
Security Issues of Mobile Devices. SPC 2005: 163 - 2004
- [b3]Claudia Eckert:
IT-Sicherheit - Konzepte, Verfahren, Protokolle (3. Aufl.). Oldenbourg 2004, ISBN 978-3-486-20000-3, pp. I-XVI, 1-915 - [j4]Claudia Eckert, Kpatcha M. Bayarou, Sebastian Rohr:
NGN, All-IP, B3G: Enabler für das Future Net?!: Überblick über Entwicklungen im Bereich zukünftiger Netze. Inform. Spektrum 27(1): 12-34 (2004) - [c14]Kpatcha M. Bayarou, Sebastian Rohr, Claudia Eckert:
Interworking von UMTS und LAN: Eine sicherheitstechnische Betrachtung. DFN-Arbeitstagung über Kommunikationsnetze 2004: 413-431 - [c13]Claudia Eckert:
Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net. DFN-Arbeitstagung über Kommunikationsnetze 2004: 433-449 - [c12]Thomas Stibor, Kpatcha M. Bayarou, Claudia Eckert:
An Investigation of R-Chunk Detector Generation on Higher Alphabets. GECCO (1) 2004: 299-307 - [c11]Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert:
Protected transmission of biometric user authentication data for oncard-matching. SAC 2004: 425-430 - 2003
- [b2]Claudia Eckert:
IT-Sicherheit - Konzepte, Verfahren, Protokolle (2. Aufl.). Oldenbourg 2003, ISBN 978-3-486-27205-5, pp. I-XV, 1-737 - [j3]Günter Müller, Claudia Eckert:
Sicherheit an der Schnittstelle zum Nutzer. Prax. Inf.verarb. Kommun. 26(1): 2-4 (2003) - [c10]Heinz Sarbinowski, T. Shafi, Claudia Eckert:
Der elektronische Sicherheitsinspektor eSI: Ein Tool zur dynamischen Analyse der IT-Sicherheit eines Systems. DFN-Arbeitstagung über Kommunikationsnetze 2003: 143-152 - 2001
- [j2]Uwe Baumgarten, Claudia Eckert:
Mobil und trotzdem sicher? (Mobile, but Nevertheless Secure?). Informationstechnik Tech. Inform. 43(5): 254-263 (2001) - [c9]Claudia Eckert, A. Pircher:
Internet Anonymity: Problems and Solutions. SEC 2001: 35-50 - 2000
- [c8]Claudia Eckert, Florian Erhard, Johannes Geiger:
GSFS - A New Group-Aware Cryptographic File System. SEC 2000: 221-230 - [c7]Uwe Baumgarten, Claudia Eckert, Harald Görl:
Trust and confidence in open systems: does security harmonize with mobility? ACM SIGOPS European Workshop 2000: 133-138
1990 – 1999
- 1999
- [j1]Claudia Eckert, Markus Pizka:
Improving Resource Management in Distributed Systems using Language-Level Structuring Concepts. J. Supercomput. 13(1): 33-55 (1999) - 1997
- [c6]Markus Pizka, Claudia Eckert:
A Language-Based Approach to Construct Structured and Efficient. HICSS (1) 1997: 130-139 - [c5]Markus Pizka, Claudia Eckert, Sascha Groh:
Evolving Software Tools for New Distributed Computing Environments. PDPTA 1997: 87-96 - [c4]Claudia Eckert, D. Marek:
Developing secure applications: a systematic approach. SEC 1997: 267-279 - [c3]Claudia Eckert, Th. Stoesslein:
MVS-SAT: a security administration tool to support SMF protocol data evaluation. SEC 1997: 363-374 - 1996
- [c2]Claudia Eckert:
On security models. SEC 1996: 485-486 - 1993
- [b1]Claudia Eckert:
Konzepte und Verfahren zur Konstruktion sicherer, verteilter Systeme. Technical University Munich, Germany, 1993, pp. 1-321 - 1990
- [c1]Claudia Eckert:
Homogeneous Memory Management in the Context of the Veritos-Project. Security and Persistence 1990: 274-288
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-30 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint