Behavior-based tracking: Exploiting characteristic patterns in DNS traffic D Herrmann, C Banse, H Federrath Computers & Security 39, 17-33, 2013 | 107 | 2013 |
A secure northbound interface for SDN applications C Banse, S Rangarajan 2015 IEEE Trustcom/BigDataSE/ISPA 1, 834-839, 2015 | 63 | 2015 |
Tracking users on the internet with behavioral patterns: Evaluation of its practical feasibility C Banse, D Herrmann, H Federrath IFIP International Information Security Conference, 235-248, 2012 | 55 | 2012 |
Analyzing characteristic host access patterns for re-identification of web user sessions D Herrmann, C Gerber, C Banse, H Federrath Information Security Technology for Applications: 15th Nordic Conference on …, 2012 | 46 | 2012 |
Evaluating the performance of continuous test-based cloud service certification P Stephanow, C Banse 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017 | 27 | 2017 |
Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events S Gebert, D Hock, T Zinner, P Tran-Gia, M Hoffmann, M Jarschel, ... ACM SIGCOMM Computer Communication Review 44 (4), 359-360, 2014 | 27 | 2014 |
Zklaims: Privacy-preserving attribute-based credentials using non-interactive zero-knowledge techniques M Schanzenbach, T Kilian, J Schütte, C Banse arXiv preprint arXiv:1907.09579, 2019 | 22 | 2019 |
Cloud property graph: Connecting cloud security assessments with static code analysis C Banse, I Kunz, A Schneider, K Weiss 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), 13-19, 2021 | 16 | 2021 |
Generating threat profiles for cloud service certification systems P Stephanow, C Banse, J Schütte 2016 IEEE 17th International Symposium on High Assurance Systems Engineering …, 2016 | 15 | 2016 |
Towards tracking data flows in cloud architectures I Kunz, V Casola, A Schneider, C Banse, J Schütte 2020 IEEE 13th International Conference on Cloud Computing (CLOUD), 445-452, 2020 | 14 | 2020 |
Android OS security: Risks and limitations R Fedler, C Banse, C Krauss, V Fusenig | 12 | 2012 |
Android OS security: risks and limitations a practical evaluation R Fedler, C Banse, C Krauss, V Fusenig Fraunhofer Research Institution for Applied and Integrated Security, 2012 | 11 | 2012 |
Managing and presenting user attributes over a decentralized secure name system M Schanzenbach, C Banse International Workshop on Data Privacy Management, 213-220, 2016 | 9 | 2016 |
Reducing implementation efforts in continuous auditing certification via an audit API D Knoblauch, C Banse 2019 IEEE 28th International Conference on Enabling Technologies …, 2019 | 8 | 2019 |
Privacy property graph: Towards automated privacy threat modeling via static graph-based analysis I Kunz, K Weiss, A Schneider, C Banse Proceedings on Privacy Enhancing Technologies, 2023 | 7 | 2023 |
Privacy smells: Detecting privacy problems in cloud architectures I Kunz, A Schneider, C Banse 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 7 | 2020 |
Practical decentralized attribute-based delegation using secure name systems M Schanzenbach, C Banse, J Schütte 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 7 | 2018 |
A taxonomy-based approach for security in software-defined networking C Banse, J Schuette 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 7 | 2017 |
MEDINA: Improving Cloud Services trustworthiness through continuous audit-based certification L Orue-Echevarria, JL Garcia, C Banse, J Alonso | 6 | 2021 |
Enhancing NFV orchestration with security policies F Wendland, C Banse Proceedings of the 13th international conference on availability …, 2018 | 6 | 2018 |