Matthias Wübbeling

Affiliations:
  • University of Bonn, Germany (PhD 2019)


According to our database1, Matthias Wübbeling authored at least 11 papers between 2014 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Track Down Identity Leaks using Threat Intelligence.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessment.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Prefix-Hijacking im Internetrouting: Monitoring, Analyse und Mitigation.
PhD thesis, 2019

2018
Warning of Affected Users About an Identity Leak.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

Ein Werkzeug zur automatisierten Analyse von Identitätsdaten-Leaks.
Proceedings of the Sicherheit 2018, 2018

Gathering and analyzing identity leaks for a proactive warning of affected users.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Reclaim Your Prefix: Mitigation of Prefix Hijacking Using IPsec Tunnels.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

2016
Improved Calculation of aS Resilience against IP Prefix Hijacking.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

2014
Inter-AS routing anomalies: Improved detection and classification.
Proceedings of the 6th International Conference on Cyber Conflict, 2014


  Loading...