


Остановите войну!
for scientists:


default search action
Claudia Eckert 0001
Person information

- affiliation: TU Munich, Faculty of Computer Science, Germany
- affiliation: Fraunhofer Research Institution for Applied and Integrated Security (AISEC), Garching, Germany
- affiliation: Technical University of Darmstadt, Department of Computer Science, Germany
- affiliation: University of Bremen, Faculty of Mathematics and Computer Science, Germany
Other persons with the same name
- Claudia M. Eckert
(aka: Claudia Eckert 0002) — Open University, Milton Keynes, Department of Engineering and Innovation, UK (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [i8]Huang Xiao, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, Fabio Roli:
Support Vector Machines under Adversarial Label Contamination. CoRR abs/2206.00352 (2022) - 2021
- [j24]Paul Muntean
, Martin Monperrus
, Hao Sun
, Jens Grossklags
, Claudia Eckert:
IntRepair: Informed Repairing of Integer Overflows. IEEE Trans. Software Eng. 47(10): 2225-2241 (2021) - [c116]Peng Xu, Claudia Eckert, Apostolis Zarras
:
Falcon: Malware Detection and Categorization with Network Traffic Images. ICANN (1) 2021: 117-128 - [c115]Peng Xu, Youyi Zhang, Claudia Eckert, Apostolis Zarras
:
HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs. ICANN (3) 2021: 127-138 - [c114]Mohammad Reza Norouzian, Peng Xu, Claudia Eckert, Apostolis Zarras
:
Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic. ISC 2021: 259-278 - [c113]Paul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
iTOP: Automating Counterfeit Object-Oriented Programming Attacks. RAID 2021: 162-176 - [c112]Peng Xu, Claudia Eckert, Apostolis Zarras
:
Detecting and categorizing Android malware with graph neural networks. SAC 2021: 409-412 - [i7]Gregory Falco, Paul Cornish, Sadie Creese, Madeline Carr, Myriam Dunn Cavelty, Claudia Eckert, Herbert Lin, Gen Goto, Jamie Saunders, Andrew Grotto, Howard E. Shrobe, Sean Kanuck, Lawrence Susskind, Arvind Parthasarathi:
Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance. CoRR abs/2107.14065 (2021) - [i6]Peng Xu, Claudia Eckert, Apostolis Zarras:
hybrid-Flacon: Hybrid Pattern Malware Detection and Categorization with Network Traffic andProgram Code. CoRR abs/2112.10035 (2021) - 2020
- [c111]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan
, Jens Grossklags, Claudia Eckert:
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings. ACSAC 2020: 466-479 - [c110]Alexander Giehl, Norbert Wiedermann, Makan Tayebi Gholamzadeh, Claudia Eckert:
Integrating security evaluations into virtual commissioning. CASE 2020: 1193-1200 - [c109]Peng Xu, Bojan Kolosnjaji, Claudia Eckert, Apostolis Zarras:
MANIS: evading malware detection system on graph structure. SAC 2020: 1688-1695
2010 – 2019
- 2019
- [c108]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan
, Jens Grossklags, Claudia Eckert:
Analyzing control flow integrity with LLVM-CFI. ACSAC 2019: 584-597 - [i5]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing Control Flow Integrity with LLVM-CFI. CoRR abs/1910.01485 (2019) - 2018
- [c107]Martin Salfer
, Claudia Eckert:
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks. ARES 2018: 21:1-21:10 - [c106]Sergej Proskurin, Tamas K. Lengyel, Marius Momeu, Claudia Eckert, Apostolis Zarras
:
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection. ACSAC 2018: 407-417 - [c105]Paul Muntean, Sebastian Wuerl, Jens Grossklags, Claudia Eckert:
CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM. ESORICS (1) 2018: 3-25 - [c104]Bojan Kolosnjaji, Ambra Demontis
, Battista Biggio
, Davide Maiorca
, Giorgio Giacinto
, Claudia Eckert, Fabio Roli
:
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. EUSIPCO 2018: 533-537 - [c103]Bojan Kolosnjaji, Antonia Hufner, Claudia Eckert, Apostolis Zarras
:
Learning on a Budget for User Authentication on Mobile Devices. ICASSP 2018: 2042-2046 - [c102]George D. Webster, Ryan L. Harris, Zachary D. Hanif, Bruce A. Hembree, Jens Grossklags, Claudia Eckert:
Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics. iThings/GreenCom/CPSCom/SmartData 2018: 1402-1409 - [c101]Paul Muntean
, Matthias Fischer, Gang Tan
, Zhiqiang Lin
, Jens Grossklags
, Claudia Eckert:
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. RAID 2018: 423-444 - [i4]Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli:
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. CoRR abs/1803.04173 (2018) - [i3]Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli:
Is feature selection secure against training data poisoning? CoRR abs/1804.07933 (2018) - [i2]Paul Muntean, Martin Monperrus, Hao Sun, Jens Grossklags, Claudia Eckert:
IntRepair: Informed Fixing of Integer Overflows. CoRR abs/1807.05092 (2018) - 2017
- [j23]Claudia Eckert:
Cybersicherheit beyond 2020! - Herausforderungen für die IT-Sicherheitsforschung. Inform. Spektrum 40(2): 141-146 (2017) - [j22]Markus Anding, Andreas Boes, Claudia Eckert, Dietmar Harhoff, Thomas Hess
, Ursula Münch, Alexander Pretschner:
Herausforderungen an der Schnittstelle von Informatik und Gesellschaft - Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt. Inform. Spektrum 40(2): 172-175 (2017) - [c100]George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras
, Claudia Eckert:
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage. DIMVA 2017: 119-138 - [c99]Bojan Kolosnjaji, Ghadir Eraisha, George D. Webster, Apostolis Zarras
, Claudia Eckert:
Empowering convolutional networks for malware classification and analysis. IJCNN 2017: 3838-3845 - [c98]Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras
, Claudia Eckert:
Combating Control Flow Linearization. SEC 2017: 385-398 - [p3]Claudia Eckert:
Cybersicherheit Beyond 2020! 50 Jahre Universitäts-Informatik in München 2017: 1-10 - [p2]Markus Anding, Andreas Boes, Claudia Eckert, Dietmar Harhoff, Thomas Hess, Ursula Münch, Alexander Pretschner:
Herausforderungen an der Schnittstelle von Informatik und Gesellschaft: Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt. 50 Jahre Universitäts-Informatik in München 2017: 141-147 - [p1]Niels Fallenbeck, Claudia Eckert:
IT-Sicherheit und Cloud Computing. Handbuch Industrie 4.0 (4) 2017: 137-171 - [i1]Paul Muntean, Jens Grossklags, Claudia Eckert:
Practical Integer Overflow Prevention. CoRR abs/1710.03720 (2017) - 2016
- [c97]Julian Horsch, Sascha Wessel, Claudia Eckert:
CoKey: fast token-based cooperative cryptography. ACSAC 2016: 314-323 - [c96]Bojan Kolosnjaji, Apostolis Zarras
, George D. Webster, Claudia Eckert:
Deep Learning for Classification of Malware System Call Sequences. Australasian Conference on Artificial Intelligence 2016: 137-149 - [c95]Konstantin Böttinger, Claudia Eckert:
DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract). DIMVA 2016: 25-34 - [c94]Bojan Kolosnjaji, Apostolis Zarras
, Tamas K. Lengyel, George D. Webster, Claudia Eckert:
Adaptive Semantics-Aware Malware Classification. DIMVA 2016: 419-439 - [c93]George D. Webster, Zachary D. Hanif, Andre L. P. Ludwig, Tamas K. Lengyel, Apostolis Zarras
, Claudia Eckert:
SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing. ISC 2016: 231-249 - [c92]Steffen Wagner, Claudia Eckert:
Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems. ISC 2016: 305-322 - [c91]Maximilian Strobel, Norbert Wiedermann, Claudia Eckert:
Novel weaknesses in IEC 62351 protected Smart Grid control systems. SmartGridComm 2016: 266-270 - 2015
- [j21]Sascha Wessel, Manuel Huber
, Frederic Stumpf, Claudia Eckert:
Improving mobile device security with operating system-level virtualization. Comput. Secur. 52: 207-220 (2015) - [j20]Claudia Eckert:
Industrie 4.0? Mit Sicherheit! Datenschutz und Datensicherheit 39(10): 641 (2015) - [j19]Claudia Eckert, Helmut Reimer:
Basis und Überbau. Datenschutz und Datensicherheit 39(10): 696 (2015) - [j18]Huang Xiao, Battista Biggio
, Blaine Nelson, Han Xiao, Claudia Eckert, Fabio Roli
:
Support vector machines under adversarial label contamination. Neurocomputing 160: 53-62 (2015) - [j17]Claudia Eckert, Niels Fallenbeck:
Industrie 4.0 meets IT-Sicherheit: eine Herausforderung! Inform. Spektrum 38(3): 217-223 (2015) - [j16]Chih-Ta Lin, Nai-Jian Wang, Han Xiao, Claudia Eckert:
Feature Selection and Extraction for Malware Classification. J. Inf. Sci. Eng. 31(3): 965-992 (2015) - [c90]Fatih Kiliç, Claudia Eckert:
iDeFEND: Intrusion Detection Framework for Encrypted Network Data. CANS 2015: 111-118 - [c89]Konstantin Böttinger, Dieter Schuster, Claudia Eckert:
Detecting Fingerprinted Data in TLS Traffic. AsiaCCS 2015: 633-638 - [c88]Fatih Kiliç, Hannes Laner, Claudia Eckert:
Interactive Function Identification Decreasing the Effort of Reverse Engineering. Inscrypt 2015: 468-487 - [c87]Han Xiao, Shou-De Lin
, Mi-Yen Yeh
, Phillip B. Gibbons, Claudia Eckert:
Learning better while sending less: Communication-efficient online semi-supervised learning in client-server settings. DSAA 2015: 1-10 - [c86]Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli:
Is Feature Selection Secure against Training Data Poisoning? ICML 2015: 1689-1698 - [c85]Bojan Kolosnjaji, Claudia Eckert:
Neural Network-Based User-Independent Physical Activity Recognition for Mobile Devices. IDEAL 2015: 378-386 - [c84]Michael Velten, Peter Schneider
, Sascha Wessel, Claudia Eckert:
User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts. ISPEC 2015: 268-282 - [c83]Paul Muntean
, Mustafizur Rahman, Andreas Ibing, Claudia Eckert:
SMT-constrained symbolic execution engine for integer overflow detection in C code. ISSA 2015: 1-8 - [c82]Paul Muntean
, Adnan Rabbi, Andreas Ibing, Claudia Eckert:
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code. QRS Companion 2015: 128-137 - [c81]Thomas Kittel, Sebastian Vogl, Julian Kirsch, Claudia Eckert:
Counteracting Data-Only Malware with Code Pointer Examination. RAID 2015: 177-197 - [c80]Paul Muntean
, Vasantha Kommanapalli, Andreas Ibing, Claudia Eckert:
Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMT. SAFECOMP 2015: 441-456 - [c79]Martin Salfer, Claudia Eckert:
Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units. SECRYPT 2015: 317-326 - 2014
- [j15]Florian Kohlmayer
, Fabian Prasser, Claudia Eckert, Klaus A. Kuhn:
A flexible approach to distributed data anonymization. J. Biomed. Informatics 50: 62-76 (2014) - [c78]Julian Horsch
, Sascha Wessel, Frederic Stumpf, Claudia Eckert:
SobrTrA: a software-based trust anchor for ARM cortex application processors. CODASPY 2014: 273-280 - [c77]Tamas K. Lengyel, Thomas Kittel, Jonas Pfoh, Claudia Eckert:
Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions. DEXA Workshops 2014: 308-312 - [c76]Martin Salfer, Hendrik Schweppe, Claudia Eckert:
Efficient Attack Forest Construction for Automotive On-board Networks. ISC 2014: 442-453 - [c75]Sebastian Vogl, Jonas Pfoh, Thomas Kittel, Claudia Eckert:
Persistent Data-only Malware: Function Hooks without Code. NDSS 2014 - [c74]Fatih Kiliç, Thomas Kittel, Claudia Eckert:
Blind Format String Attacks. SecureComm (2) 2014: 301-314 - [c73]Paul Muntean
, Claudia Eckert, Andreas Ibing:
Context-sensitive detection of information exposure bugs with symbolic execution. InnoSWDev@SIGSOFT FSE 2014: 84-93 - [c72]Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz:
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data. USENIX Security Symposium 2014: 813-828 - [e1]Claudia Eckert, Sokratis K. Katsikas, Günther Pernul:
Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings. Lecture Notes in Computer Science 8647, Springer 2014, ISBN 978-3-319-09769-5 [contents] - 2013
- [j14]Claudia Eckert, Thomas Kittel:
Security Issues of Multi-Core Architectures - The Automotive Case. it Inf. Technol. 55(1): 5-9 (2013) - [j13]Alexandre Bouard, Dennis Burgkhardt, Claudia Eckert:
Middleware-based Security for Hyperconnected Applications in Future In-Car Networks. EAI Endorsed Trans. Mob. Commun. Appl. 1(3): e7 (2013) - [c71]Han Xiao, Claudia Eckert:
Lazy Gaussian Process Committee for Real-Time Online Regression. AAAI 2013 - [c70]Dominik Merli, Georg Sigl, Claudia Eckert:
Identities for Embedded Systems Enabled by Physical Unclonable Functions. Number Theory and Cryptography 2013: 125-138 - [c69]Alexandre Bouard, Benjamin Weyl, Claudia Eckert:
Practical information-flow aware middleware for in-car communication. CyCAR@CCS 2013: 3-8 - [c68]Huang Xiao, Han Xiao, Claudia Eckert:
OPARS: Objective Photo Aesthetics Ranking System. ECIR 2013: 861-864 - [c67]Han Xiao, Claudia Eckert:
Efficient Online Sequence Prediction with Side Information. ICDM 2013: 1235-1240 - [c66]Huang Xiao, Claudia Eckert:
Indicative Support Vector Clustering with Its Application on Anomaly Detection. ICMLA (1) 2013: 273-276 - [c65]Michael Velten, Sascha Wessel, Frederic Stumpf, Claudia Eckert:
Active File Integrity Monitoring Using Paravirtualized Filesystems. INTRUST 2013: 53-69 - [c64]Steffen Wagner, Christoph Krauß
, Claudia Eckert:
Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel Tasks. ISC 2013: 20-36 - [c63]Sebastian Vogl, Fatih Kiliç, Christian A. Schneider, Claudia Eckert:
X-TIER: Kernel Module Injection. NSS 2013: 192-205 - [c62]Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
Leveraging String Kernels for Malware Detection. NSS 2013: 206-219 - [c61]Han Xiao, Huang Xiao, Claudia Eckert:
Learning from Multiple Observers with Unknown Expertise. PAKDD (1) 2013: 595-606 - [c60]Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert:
Improving Mobile Device Security with Operating System-Level Virtualization. SEC 2013: 148-161 - 2012
- [j12]Claudia Eckert:
Embedded systems security. Datenschutz und Datensicherheit 36(12): 861 (2012) - [c59]Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Alfons Kemper, Klaus A. Kuhn:
Highly efficient optimal k-anonymity for biomedical datasets. CBMS 2012: 1-6 - [c58]Han Xiao, Huang Xiao, Claudia Eckert:
Adversarial Label Flips Attack on Support Vector Machines. ECAI 2012: 870-875 - [c57]Alexandre Bouard, Johannes Schanda, Daniel Herrscher, Claudia Eckert:
Automotive Proxy-Based Security Architecture for CE Device Integration. MOBILWARE 2012: 62-76 - [c56]Han Xiao, Thomas Stibor, Claudia Eckert:
Evasion Attack of Multi-class Linear Classifiers. PAKDD (1) 2012: 207-218 - [c55]Felix Wieczorek, Christoph Krauß
, Frank Schiller, Claudia Eckert:
Towards Secure Fieldbus Communication. SAFECOMP 2012: 149-160 - [c54]Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Alfons Kemper, Klaus A. Kuhn:
Flash: Efficient, Stable and Optimal K-Anonymity. SocialCom/PASSAT 2012: 708-717 - [c53]Hasan Ibne Akram, Colin de la Higuera, Claudia Eckert:
Actively Learning Probabilistic Subsequential Transducers. ICGI 2012: 19-33 - 2011
- [j11]Claudia Eckert, Christoph Krauß:
Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen. Datenschutz und Datensicherheit 35(8): 535-541 (2011) - [c52]Christian A. Schneider, Jonas Pfoh, Claudia Eckert:
A Universal Semantic Bridge for Virtual Machine Introspection. ICISS 2011: 370-373 - [c51]Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
Nitro: Hardware-Based System Call Tracing for Virtual Machines. IWSEC 2011: 96-112 - [c50]Steffen Wagner, Christoph Krauß
, Claudia Eckert:
T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks. SecureComm 2011: 511-521 - 2010
- [c49]Dominik Merli, Frederic Stumpf, Claudia Eckert:
Improving the quality of ring oscillator PUFs on FPGAs. WESS 2010: 9 - [c48]Florian Kohlmayer, Ronald R. Lautenschläger, Sebastian H. R. Wurst, Thomas Klopstock, Holger Prokisch, Thomas Meitinger, Claudia Eckert, Klaus A. Kuhn:
Konzept für ein deutschlandweites Krankheitsnetz am Beispiel von mitoREGISTER. GI Jahrestagung (2) 2010: 746-751 - [c47]Hasan Ibne Akram, Colin de la Higuera, Huang Xiao, Claudia Eckert:
Grammatical Inference Algorithms in MATLAB. ICGI 2010: 262-266 - [c46]Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
Exploiting the x86 Architecture to Derive Virtual Machine State Information. SECURWARE 2010: 166-175
2000 – 2009
- 2009
- [b6]Claudia Eckert:
IT-Sicherheit - Konzepte, Verfahren, Protokolle (6. Aufl.). Oldenbourg 2009, ISBN 978-3-486-58999-3, pp. I-XIV, 1-981 - [c45]Christian A. Schneider, Frederic Stumpf, Claudia Eckert:
Enhancing Control of Service Compositions in Service-Oriented Architectures. ARES 2009: 953-959 - [c44]Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
A formal model for virtual machine introspection. VMSec@CCS 2009: 1-10 - 2008
- [b5]Claudia Eckert:
IT-Sicherheit - Konzepte, Verfahren, Protokolle (5. Aufl.). Oldenbourg 2008, ISBN 978-3-486-58270-3, pp. I-XIV, 1-925 - [j10]Omid Tafreschi, Dominique Mähler, Janina Fengel, Michael Rebstock, Claudia Eckert:
A reputation system for electronic negotiations. Comput. Stand. Interfaces 30(6): 351-360 (2008) - [j9]Christoph Krauß
, Markus Schneider, Claudia Eckert:
On handling insider attacks in wireless sensor networks. Inf. Secur. Tech. Rep. 13(3): 165-172 (2008) - [c43]Frederic Stumpf, Claudia Eckert, Shane Balfe:
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. ARES 2008: 376-382 - [c42]Frederic Stumpf, Andreas Fuchs, Stefan Katzenbeisser, Claudia Eckert:
Improving the scalability of platform attestation. STC 2008: 1-10 - [c41]Sascha Müller, Stefan Katzenbeisser, Claudia Eckert:
Distributed Attribute-Based Encryption. ICISC 2008: 20-36 - [c40]Frederic Stumpf, Claudia Eckert:
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. SECURWARE 2008: 1-9 - [c39]Lars Fischer, Claudia Eckert:
506 Ways to Track Your Lover. VTC Fall 2008: 1-5 - [c38]Christoph Krauß
, Markus Schneider, Claudia Eckert:
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs. WiMob 2008: 586-591 - [c37]Christoph Krauß
, Markus Schneider, Claudia Eckert:
Defending against false-endorsement-based dos attacks in wireless sensor networks. WISEC 2008: 13-23 - [c36]Lars Fischer, Stefan Katzenbeisser, Claudia Eckert:
Measuring unlinkability revisited. WPES 2008: 105-110 - 2007
- [j8]Frederic Stumpf, Markus Sacher, Alexander Roßnagel, Claudia Eckert:
Erzeugung elektronischer Signaturen mittels Trusted Platform Module. Datenschutz und Datensicherheit 31(5): 357-361 (2007) - [j7]Claudia Eckert, Björn Steinemann, Tobias Wahl:
SOA und Sicherheit - Web Service Security Praxis und Offene Probleme. Datenschutz und Datensicherheit 31(9): 656-661 (2007) - [c35]Christoph Krauß
, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert:
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. ARES 2007: 310-317 - [c34]Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert:
An Approach to a Trustworthy System Architecture Using Virtualization. ATC 2007: 191-202 - [c33]Patrick Röder, Omid Tafreschi, Claudia Eckert:
History-based access control for XML documents. AsiaCCS 2007: 386-388 - [c32]Taufiq Rochaeli, Claudia Eckert:
Using patterns paradigm to refine workflow policies. DEXA Workshops 2007: 760-764 - [c31]