Harald Lampesberger

Orcid: 0000-0002-9311-962X

According to our database1, Harald Lampesberger authored at least 13 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher.
Proceedings of the 5th International Conference on Historical Cryptology, 2022

2021
A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering.
Proceedings of the 4th International Conference on Historical Cryptology, 2021

Detection of Classical Cipher Types with Feature-Learning Approaches.
Proceedings of the Data Mining, 2021

2020
pyBNBowTie: Python library for Bow-Tie Analysis based on Bayesian Networks.
Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2020), 2020

2019
Authentizität und Integrität des Aufnahmekontextes von Bildern.
Datenschutz und Datensicherheit, 2019

2016
Technologies for Web and cloud service interaction: a survey.
Serv. Oriented Comput. Appl., 2016

An Incremental Learner for Language-Based Anomaly Detection in XML.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

2015
Monitoring of Client-Cloud Interaction.
Proceedings of the Correct Software in Web Applications and Web Services, 2015

2013
A Grammatical Inference Approach to Language-Based Anomaly Detection in XML.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2011
Challenges in Cloud Computing.
Scalable Comput. Pract. Exp., 2011

Anomalieerkennung in Computernetzen.
Datenschutz und Datensicherheit, 2011

An On-Line Learning Statistical Model to Detect Malicious Web Requests.
Proceedings of the Security and Privacy in Communication Networks, 2011

On Detecting Abrupt Changes in Network Entropy Time Series.
Proceedings of the Communications and Multimedia Security, 2011


  Loading...