Heinl, Michael P.;Giehl, Alexander;Graif, LukasAntiPatterns regarding the application of cryptographic primitives by the example of ransomwareProceedings of the 15th International Conference on Availability, Reliability and SecurityACM2020
Schanzenbach, MartinTowards Self-sovereign, decentralized personal data sharing and identity management2020Dissertation183 p.
Webster, George Davis III.Resizing Threats: Developing Methodologies and Techniques for Large-scale Security Analytics2020Dissertation179 p.