default search action
Joachim Posegga
Person information
- affiliation: University of Passau, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c60]Talaya Farasat, Joachim Posegga:
Machine Learning Techniques for Python Source Code Vulnerability Detection. CODASPY 2024: 151-153 - [c59]Henrich C. Pöhls, Sven Gebauer, Fabian Scharnböck, Korbinian Spielvogel, Joachim Posegga:
MQfilTTr: Strengthening Smart Home Privacy Through MQTT Traffic Manipulation. WISTP 2024: 17-32 - [c58]Emiliia Gelóczi, Henrich C. Pöhls, Felix Klement, Joachim Posegga, Stefan Katzenbeisser:
Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments. WPES@CCS 2024: 109-123 - [i6]Talaya Farasat, Joachim Posegga:
Machine Learning Techniques for Python Source Code Vulnerability Detection. CoRR abs/2404.09537 (2024) - [i5]Talaya Farasat, Jongwon Kim, Joachim Posegga:
Advancing Network Security: A Comprehensive Testbed and Dataset for Machine Learning-Based Intrusion Detection. CoRR abs/2410.18332 (2024) - [i4]Talaya Farasat, Jongwon Kim, Joachim Posegga:
SmartX Intelligent Sec: A Security Framework Based on Machine Learning and eBPF/XDP. CoRR abs/2410.20244 (2024) - [i3]Talaya Farasat, Atiqullah Ahmadzai, Aleena Elsa George, Sayed Alisina Qaderi, Dusan Dordevic, Joachim Posegga:
SafePyScript: A Web-Based Solution for Machine Learning-Driven Vulnerability Detection in Python. CoRR abs/2411.00636 (2024) - 2023
- [c57]Talaya Farasat, Muhammad Ahmad Rathore, Zeeshan Asim, Akmal Khan, Jongwon Kim, Joachim Posegga:
Poster: SmartX BGP BVT: A First Real-Time BGP Blackholing Visibility Tool. IMC 2023: 710-711 - [c56]Talaya Farasat, Muhammad Ahmad Rathore, Akmal Khan, Jongwon Kim, Joachim Posegga:
Machine Learning-based BGP Traffic Prediction. TrustCom 2023: 1925-1934 - [e7]Ruben Rios, Joachim Posegga:
Security and Trust Management - 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings. Lecture Notes in Computer Science 14336, Springer 2023, ISBN 978-3-031-47197-1 [contents] - 2021
- [c55]Korbinian Spielvogel, Henrich C. Pöhls, Joachim Posegga:
TLS Beyond the Broker: Enforcing Fine-Grained Security and Trust in Publish/Subscribe Environments for IoT. STM 2021: 145-162 - [i2]Korbinian Spielvogel, Henrich C. Pöhls, Joachim Posegga:
TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT. CoRR abs/2109.01169 (2021)
2010 – 2019
- 2018
- [c54]Juan D. Parra Rodriguez, Joachim Posegga:
RAPID: Resource and API-Based Detection Against In-Browser Miners. ACSAC 2018: 313-326 - [c53]Juan D. Parra Rodriguez, Joachim Posegga:
CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long? CODASPY 2018: 170-172 - [c52]Juan D. Parra Rodriguez, Eduard Brehm, Joachim Posegga:
When Your Browser Becomes the Paper Boy - An Anonymous Browser Network. SEC 2018: 94-107 - [c51]Juan D. Parra Rodriguez, Joachim Posegga:
Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution. SecureComm (2) 2018: 352-371 - 2016
- [c50]Eric Rothstein Morris, Joachim Posegga:
Idea: Enforcing Security Properties by Solving Behavioural Equations. ESSoS 2016: 260-268 - [c49]Juan D. Parra Rodriguez, Daniel Schreckling, Joachim Posegga:
Addressing Data-Centric Security Requirements for IoT-Based Systems. SIoT 2016: 1-10 - 2015
- [c48]Daniel Schreckling, Juan David Parra, Charalampos Doukas, Joachim Posegga:
Data-Centric Security for the IoT. IoT 360 (2) 2015: 77-86 - [c47]Bastian Braun, Korbinian Pauli, Joachim Posegga, Martin Johns:
LogSec: adaptive protection for the wild wild web. SAC 2015: 2149-2156 - [c46]Juan D. Parra Rodriguez, Joachim Posegga:
Why Web Servers Should Fear Their Clients - Abusing Websockets in Browsers for DoS. SecureComm 2015: 401-417 - [e6]Joaquín García-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri:
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8872, Springer 2015, ISBN 978-3-319-17015-2 [contents] - 2014
- [c45]Bastian Braun, Martin Johns, Johannes Köstler, Joachim Posegga:
PhishSafe: leveraging modern JavaScript API's for transparent and robust protection. CODASPY 2014: 61-72 - [c44]Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin:
On the Relation between Redactable and Sanitizable Signature Schemes. ESSoS 2014: 113-130 - [c43]Juan D. Parra Rodriguez, Daniel Schreckling, Joachim Posegga:
Identity Management in Platforms Offering IoT as a Service. IoT360 (1) 2014: 281-288 - [c42]Bastian Braun, Johannes Köstler, Joachim Posegga, Martin Johns:
A Trusted UI for the Mobile Web. SEC 2014: 127-141 - [c41]Bastian Braun, Caspar Gries, Benedikt Petschkuhn, Joachim Posegga:
Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications. SEC 2014: 264-277 - 2013
- [j13]Ioannis G. Askoxylakis, Mark Manulis, Joachim Posegga:
Security and privacy for digital ecosystems. Inf. Secur. Tech. Rep. 17(3): 45 (2013) - [c40]Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin:
Scope of Security Properties of Sanitizable Signatures Revisited. ARES 2013: 188-197 - [c39]Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga:
Control-Flow Integrity in Web Applications. ESSoS 2013: 1-16 - [c38]Bastian Braun, Christian v. Pollak, Joachim Posegga:
A Survey on Control-Flow Integrity Means in Web Application Frameworks. NordSec 2013: 231-246 - [c37]Henrich Christopher Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann de Meer:
Malleable Signatures for Resource Constrained Platforms. WISTP 2013: 18-33 - [c36]Daniel Schreckling, Stephan Huber, Focke Höhne, Joachim Posegga:
URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security. WISTP 2013: 50-65 - 2012
- [j12]Paolo Dini, Chrystopher L. Nehaniv, Attila Egri-Nagy, Maria J. Schilstra, Daniel Schreckling, Joachim Posegga, Gábor Horváth, Alastair J. Munro:
BIOMICS Project: Biological and Mathematical Basis of Interaction Computing. Int. J. Unconv. Comput. 8(4): 283-287 (2012) - [c35]Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer:
On Structural Signatures for Tree Data Structures. ACNS 2012: 171-187 - [c34]Hermann de Meer, Henrich C. Pöhls, Joachim Posegga, Kai Samelin:
Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions. ICETE (Selected Papers) 2012: 155-171 - [c33]Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer:
Redactable Signatures for Independent Removal of Structure and Content. ISPEC 2012: 17-33 - [c32]Daniel Schreckling, Joachim Posegga, Daniel Hausknecht:
Constroid: data-centric access control for android. SAC 2012: 1478-1485 - [c31]Henrich Christopher Pöhls, Kai Samelin, Hermann de Meer, Joachim Posegga:
Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction. SECRYPT 2012: 113-125 - [c30]Bastian Braun, Stefan Kucher, Martin Johns, Joachim Posegga:
A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities. TrustBus 2012: 17-29 - [c29]Martin Johns, Joachim Posegga:
WebSand: Server-Driven Outbound Web-Application Sandboxing. TrustBus 2012: 216-217 - [c28]Daniel Schreckling, Joachim Posegga, Johannes Köstler, Matthias Schaff:
Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android. WISTP 2012: 208-223 - [e5]Ioannis G. Askoxylakis, Henrich Christopher Pöhls, Joachim Posegga:
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings. Lecture Notes in Computer Science 7322, Springer 2012, ISBN 978-3-642-30954-0 [contents] - 2011
- [j11]Daniel Schreckling, Joachim Posegga:
Adaptive Security Architectures for Global Sensing Applications. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 37 (2011) - [c27]Henrich Christopher Pöhls, Kai Samelin, Joachim Posegga:
Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency. ACNS 2011: 166-182 - [c26]Henrich Christopher Pöhls, Arne Bilzhause, Kai Samelin, Joachim Posegga:
Sanitizable signed privacy preferences for social networks. GI-Jahrestagung 2011: 409 - [c25]Martin Johns, Bastian Braun, Michael Schrank, Joachim Posegga:
Reliable protection against session fixation attacks. SAC 2011: 1531-1537 - [i1]Felix C. Freiling, Dirk Heckmann, Radim Polcák, Joachim Posegga:
Forensic Computing (Dagstuhl Seminar 11401). Dagstuhl Reports 1(10): 1-13 (2011) - 2010
- [c24]Martin Johns, Christian Beyerlein, Rosemaria Giesecke, Joachim Posegga:
Secure Code Generation for Web Applications. ESSoS 2010: 96-113 - [c23]Michael Schrank, Bastian Braun, Martin Johns, Joachim Posegga:
Session Fixation - The Forgotten Vulnerability? Sicherheit 2010: 341-352 - [e4]Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron:
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings. Lecture Notes in Computer Science 6033, Springer 2010, ISBN 978-3-642-12367-2 [contents]
2000 – 2009
- 2009
- [c22]Christopher Alm, Ruben Wolf, Joachim Posegga:
The OPL Access Control Policy Language. TrustBus 2009: 138-148 - 2008
- [c21]Martin Johns, Björn Engelmann, Joachim Posegga:
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks. ACSAC 2008: 335-344 - 2007
- [j10]Josep Domingo-Ferrer, Joachim Posegga, Francesc Sebé, Vicenç Torra:
Advances in smart cards. Comput. Networks 51(9): 2219-2222 (2007) - 2006
- [c20]Henrich Christopher Pöhls, Joachim Posegga:
Smartcard Firewalls Revisited. CARDIS 2006: 179-191 - [e3]Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling:
Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings. Lecture Notes in Computer Science 3928, Springer 2006, ISBN 3-540-33311-8 [contents] - 2004
- [j9]Thomas Walter, Laurent Bussard, Yves Roudier, Jochen Haller, Roger Kilian-Kehr, Joachim Posegga, Philip Robinson:
Secure mobile business applications - framework, architecture and implementation. Inf. Secur. Tech. Rep. 9(4): 6-21 (2004) - 2002
- [c19]Roger Kilian-Kehr, Joachim Posegga:
Smart Cards in Interaction: Towards Trustworthy Digital Signatures. CARDIS 2002: 11-18 - [c18]David A. Basin, Stefan Friedrich, Marek Gawkowski, Joachim Posegga:
Bytecode Model Checking: An Experimental Analysis. SPIN 2002: 42-59 - 2001
- [j8]Joachim Posegga, Simon Vetter:
Wireless Internet Security - Aktuelles Schlagwort. Inform. Spektrum 24(6): 383-386 (2001) - 2000
- [j7]Günter Karjoth, Joachim Posegga:
Mobile agents and telcos' nightmares. Ann. des Télécommunications 55(7-8): 388-400 (2000) - [c17]Scott B. Guthery, Roger Kehr, Joachim Posegga:
How to Turn a GSM SIM into a Web Server. CARDIS 2000: 209-224
1990 – 1999
- 1999
- [j6]Joachim Posegga:
Jini: Infrastruktur für dynamische Dienste in verteilten Systemen - Aktuelles Schlagwort. Inform. Spektrum 22(1): 43-44 (1999) - [c16]David A. Basin, Stefan Friedrich, Joachim Posegga, Harald Vogt:
Java Bytecode Verification by Model Checking. CAV 1999: 491-494 - [c15]Roger Kehr, Joachim Posegga, Harald Vogt:
PCA: Jini-based Personal Card Assistant. CQRE 1999: 64-75 - 1998
- [j5]Joachim Posegga:
Die Sicherheitsaspekte von Java. Inform. Spektrum 21(1): 16-22 (1998) - [j4]Matthias Kaiserswerth, Joachim Posegga:
Java auf Chipkarten - Das aktuelle Schlagwort. Inform. Spektrum 21(1): 27-28 (1998) - [c14]Andrew Slater, Rajeev Goré, Joachim Posegga, Harald Vogt:
cardTAP: Automated Deduction on a Smart Card. Australian Joint Conference on Artificial Intelligence 1998: 239-247 - [c13]Rajeev Goré, Joachim Posegga, Andrew Slater, Harald Vogt:
System Description: card TAP: The First Theorem Prover on a Smart Card. CADE 1998: 47-50 - [c12]Joachim Posegga, Harald Vogt:
Byte Code Verification for Java Smart Card Based on Model Checking. ESORICS 1998: 175-190 - [e2]Tiziana Margaria, Bernhard Steffen, Roland Rückert, Joachim Posegga:
Services and Visualization: Towards User-Friendly Design, ACoS'98, VISUAL'98, AIN'97, Selected Papers. Lecture Notes in Computer Science 1385, Springer 1998, ISBN 3-540-64367-2 [contents] - 1996
- [j3]Bernhard Beckert, Joachim Posegga:
Logic Programming as a Basis for Lean Automated Deduction. J. Log. Program. 28(3): 231-236 (1996) - 1995
- [j2]Bernhard Beckert, Joachim Posegga:
leanTAP: Lean Tableau-based Deduction. J. Autom. Reason. 15(3): 339-358 (1995) - [j1]Joachim Posegga, Peter H. Schmitt:
Automated Deduction with Shannon Graphs. J. Log. Comput. 5(6): 697-729 (1995) - [c11]Bernhard Beckert, Joachim Posegga:
leanEA: A Lean Evolving Algebra Compiler. CSL 1995: 64-85 - [c10]Bernhard Beckert, Joachim Posegga:
LeanEA: A Lean Evolving Algebra Compiler. WLP 1995: 73-82 - [e1]Peter Baumgartner, Reiner Hähnle, Joachim Posegga:
Theorem Proving with Analytic Tableaux and Related Methods, 4th International Workshop, TABLEAUX '95, Schloß Rheinfels, St. Goar, Germany, May 7-10, 1995, Proceedings. Lecture Notes in Computer Science 918, Springer 1995, ISBN 3-540-59338-1 [contents] - 1994
- [c9]Bernhard Beckert, Joachim Posegga:
leanTAP: Lean Tableau-Based Theorem Proving (Extended Abstract). CADE 1994: 793-797 - [c8]Jean Goubault, Joachim Posegga:
BDDs and Automated Deduction. ISMIS 1994: 541-550 - [c7]Bernhard Beckert, Joachim Posegga:
Logic Programming as a Bases for Lean Deduction: Achieving Maximal Efficiency from Minimal Means. WLP 1994: 108-111 - 1993
- [b1]Joachim Posegga:
Deduktion mit Shannongraphen für Prädikatenlogik erster Stufe. Karlsruhe Institute of Technology, Germany, DISKI 51, Infix Verlag, St. Augustin, Germany 1993, ISBN 3-929037-51-3, pp. 1-124 - [c6]Joachim Posegga:
Compiling Proof Search in Semantic Tableaux. ISMIS 1993: 39-48 - 1992
- [c5]Guido Moerkotte, Holger Müller, Joachim Posegga:
Aspects of Consistency Driven Planning. DAISD 1992: 301-325 - [c4]Joachim Posegga, Bertram Ludäscher:
Towards First-order Deduction Based on Shannon Graphs. GWAI 1992: 67-75 - [c3]Joachim Posegga:
First-Order Shannon Graphs (Extended Abstract). TABLEAUX 1992: 67-69 - 1991
- [c2]Martin Decker, Guido Moerkotte, Holger Müller, Joachim Posegga:
Consistency Driven Planning. EPIA 1991: 195-209 - 1990
- [c1]Jürgen Dix, Joachim Posegga, Peter H. Schmitt:
Modal logics for AI planning. Expert Planning Systems 1990: 157-162
Coauthor Index
aka: Henrich C. Pöhls
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint