Stephan Neuhaus

According to our database1, Stephan Neuhaus authored at least 27 papers between 1990 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards Securing Hard Real-Time Networked Embedded Devices and Systems: a cBPF Implementation for an FPGA.
Proceedings of the 28th IEEE International Conference on Emerging Technologies and Factory Automation, 2023

2019
Downright: A Framework and Toolchain for Privilege Handling.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

BREAKING: Password Entry Is Fine.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

2018
Security and Privacy Implications of Middlebox Cooperation Protocols.
CoRR, 2018

2017
A path layer for the Internet: Enabling network operations on encrypted protocols.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Author Profiling with Bidirectional RNNs using Attention with GRUs.
Proceedings of the Working Notes of CLEF 2017, 2017

2016
Towards an Observatory for Network Transparency Research.
Proceedings of the 2016 Applied Networking Research Workshop, 2016

2015
Social power for privacy protected opportunistic networks.
Proceedings of the 7th International Conference on Communication Systems and Networks, 2015

2014
Self-Awareness in Computer Networks.
Int. J. Reconfigurable Comput., 2014

2013
Critique of the CISSP common body of knowledge of cryptography.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Preserving privacy and accountability for personal devices.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Software Security Economics: Theory, in Practice.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Software Security Economics: Theory, in Practice.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Hardware support for dynamic protocol stacks.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2012

2011
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

2010
Security Trend Analysis with CVE Topic Models.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Towards Security Climate Forecasts.
Proceedings of the Towards the Future Internet - Emerging Trends from European Research, 2010

2009
The Beauty and the Beast: Vulnerabilities in Red Hat's Packages.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

Satisfaction of Control Objectives by Control Processes.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009

2008
Repeating the past experimental and empirical methods in system and software security.
PhD thesis, 2008

2007
Isolating cause-effect chains in computer systems.
Proceedings of the Software Engineering 2007, 2007

Predicting vulnerable software components.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Experimentelle Methoden zum Aufspüren von Einbrüchen.
Softwaretechnik-Trends, 2006

Isolating Intrusions by Automatic Experiments.
Proceedings of the Network and Distributed System Security Symposium, 2006

Isolating Intrusions by Automatic Experiments.
Proceedings of the Workshop "Trustworthy Software" 2006, 2006

1990
Ein System zur benutzerdefinierten Visualisierung von parallelen Programmen.
Proceedings of the Parallele Datenverarbeitung mit dem Transputer, 1990


  Loading...