Jens Heider

Orcid: 0000-0001-8343-6608

According to our database1, Jens Heider authored at least 21 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Tracing Cryptographic Agility in Android and iOS Apps.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Towards detecting device fingerprinting on iOS with API function hooking.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

2022
Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws.
Proceedings of the Risks and Security of Internet and Systems, 2022

2021
Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Automated, Dynamic Android App Vulnerability and Privacy Leak Analysis: Design Considerations, Required Components and Available Tools.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

2020
Raising Security Awareness on Mobile Systems through Gamification.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

2018
Trust4App: Automating Trustworthiness Assessment of Mobile Applications.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Highly Scalable Microservice-based Enterprise Architecture for Smart Ecosystems in Hybrid Cloud Environments.
Proceedings of the ICEIS 2017, 2017

2016
Convergent Infrastructures for Municipalities as Connecting Platform for Climate Applications.
Proceedings of the 30th International Conference on Environmental Informatics, 2016

2014
Die Gretchenfrage: Wie halten Sie's mit der App-Sicherheit?
Datenschutz und Datensicherheit, 2014

Das Ende der Paranoia?
Datenschutz und Datensicherheit, 2014

Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Regional Carbon Footprinting for Municipalities and Cities.
Proceedings of the 28th International Conference on Informatics for Environmental Protection: ICT for Energy Effieciency, 2014

2013
A greenhouse gas accounting tool for regional and municipal climate change management.
Proceedings of the Sustainable Internet and ICT for Sustainability, 2013

2012
Ubiquitous Personal Information Management (Ubiquitäre Persönliche Informationsverwaltung)
PhD thesis, 2012

Geht Ihr Smartphone fremd? - Übersicht der Angriffsvektoren für Geräte im Unternehmenseinsatz.
Datenschutz und Datensicherheit, 2012

Verantwortung: Smartphone.
Datenschutz und Datensicherheit, 2012

2007
On Path-Centric Navigation and Search Techniques for Personal Knowledge Stored in Topic Maps.
Proceedings of the Scaling Topic Maps, 2007

Security made easy: Achieving user-friendly communication protection in ad-hoc situations.
Proceedings of the First International Conference on Emerging Security Information, 2007

2003
Modernes Identitäts- und Profildatenmanagement.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003


  Loading...