关注
Andreas Poller
Andreas Poller
German Federal Ministry of the Interior and Community
在 sit.fraunhofer.de 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Can security become a routine? A study of organizational change in an agile software development group
A Poller, L Kocksch, S Türpe, FA Epp, K Kinder-Kurlanda
Proceedings of the 2017 ACM conference on computer supported cooperative …, 2017
1052017
Electronic Identity Cards for User Authentication—Promise and Practice
A Poller, U Waldmann, S Vowé, S Türpe
IEEE Security & Privacy Magazine 10 (1), 46-54, 2012
812012
Caring for IT security: Accountabilities, moralities, and oscillations in IT security practices
L Kocksch, M Korn, A Poller, S Wagenknecht
Proceedings of the ACM on Human-Computer Interaction 2 (CSCW), 1-20, 2018
532018
Attacking the BitLocker boot process
S Türpe, A Poller, J Steffan, JP Stotz, J Trukenmüller
Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009
482009
Managing Security Work in Scrum: Tensions and Challenges.
S Türpe, A Poller
SecSE@ ESORICS 2017, 34-49, 2017
322017
Penetration Tests a Turning Point in Security Practices? Organizational Challenges and Implications in a Software Development {Team}
S Türpe, L Kocksch, A Poller
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
252016
Robust image obfuscation for privacy protection in web 2.0 applications
A Poller, M Steinebach, H Liu
Media Watermarking, Security, and Forensics 2012 8303, 9-23, 2012
182012
An asset to security modeling? Analyzing stakeholder collaborations instead of threats to assets
A Poller, S Türpe, K Kinder-Kurlanda
Proceedings of the 2014 New Security Paradigms Workshop, 69-82, 2014
142014
First-time security audits as a turning point? challenges for security practices in an industry software development team
A Poller, L Kocksch, K Kinder-Kurlanda, FA Epp
Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors …, 2016
122016
Threat analysis in the software development lifecycle
J Whitmore, S Türpe, S Triller, A Poller, C Carlson
IBM Journal of Research and Development 58 (1), 6: 1-6: 13, 2014
122014
Tracing contacts with mobile phones to curb the pandemic: topics and stances in people’s online comments about the official German contact-tracing app
S Arzt, A Poller, G Vallejo
Extended abstracts of the 2021 CHI conference on human factors in computing …, 2021
112021
Privatsphärenschutz in soziale-netzwerke-plattformen
A Poller
Fraunhofer SIT, 2008
112008
Investigating OSN users' privacy strategies with in-situ observation
A Poller, P Ilyes, A Kramm, L Kocksch
Proceedings of the companion publication of the 17th ACM conference on …, 2014
72014
Denkverbote für Star-Trek-Computer? Big Data, statistische Modelle und lernende Maschinen
S Türpe, A Selzer, A Poller, M Bedner
Datenschutz und Datensicherheit-DuD 38 (1), 31-35, 2014
42014
Soziale Netzwerke bewusst nutzen
A Poller, U Waldmann
Ein Dossier zu Datenschutz, Privatsphärenschutz und Unternehmenssicherheit …, 2013
42013
Approaches for automated software security evaluations
A Poller
42006
Designing privacy-aware online social networks-A reflective socio-technical approach
A Poller, P Ilyes, A Kramm
Proceedings of the Conference on Computer-Supported Cooperative Work and …, 2013
32013
Emission statt Transaktion: Weshalb das klassische Datenschutzparadigma nicht mehr funktioniert
S Türpe, J Geuter, A Poller
Informationelle Selbstbestimmung im digitalen Wandel, 227-248, 2017
22017
Merkmalsextraktion für die Klassifikation von Bestandteilen in Dokument-Bildern
A Poller
22005
Security Analysis of TrueCrypt
M Baluda, A Fuchs, P Holzinger, L Nguyen, L Othmane, A Poller, J Repp, ...
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies …, 2015
12015
系统目前无法执行此操作,请稍后再试。
文章 1–20