Search dblp for Publications

export results for "Stefan Raß"

 download as .bib file

@article{DBLP:journals/access/RassJHH24,
  author       = {Stefan Rass and
                  Max{-}Julian Jakobitsch and
                  Stefan Haan and
                  Moritz Hiebler},
  title        = {Computer-Aided Verification of {P/NP} Proofs: {A} Survey and Discussion},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {13513--13524},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3355540},
  doi          = {10.1109/ACCESS.2024.3355540},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/RassJHH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Rass24,
  author       = {Stefan Rass},
  title        = {Tell me who you are friends with and {I} will tell you who you are:
                  Unique neighborhoods in random graphs},
  journal      = {Theor. Comput. Sci.},
  volume       = {988},
  pages        = {114386},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.tcs.2024.114386},
  doi          = {10.1016/J.TCS.2024.114386},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/Rass24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-12852,
  author       = {Mario Kahlhofer and
                  Stefan Rass},
  title        = {Application Layer Cyber Deception without Developer Interaction},
  journal      = {CoRR},
  volume       = {abs/2405.12852},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.12852},
  doi          = {10.48550/ARXIV.2405.12852},
  eprinttype    = {arXiv},
  eprint       = {2405.12852},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-12852.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AhmadRS23,
  author       = {Shahzad Ahmad and
                  Stefan Rass and
                  Peter Schartner},
  title        = {False-Bottom Encryption: Deniable Encryption From Secret Sharing},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {62549--62564},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3288285},
  doi          = {10.1109/ACCESS.2023.3288285},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AhmadRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RassKWVP23,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Jasmin Wachter and
                  V{\'{\i}}ctor Mayoral Vilches and
                  Emmanouil Panaousis},
  title        = {Game-theoretic {APT} defense: An experimental study on robotics},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103328},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103328},
  doi          = {10.1016/J.COSE.2023.103328},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RassKWVP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stt/KahlhoferKHR23,
  author       = {Mario Kahlhofer and
                  Patrick Kern and
                  S{\"{o}}ren Henning and
                  Stefan Rass},
  title        = {Benchmarking Function Hook Latency in Cloud-Native Environments},
  journal      = {Softwaretechnik-Trends},
  volume       = {43},
  number       = {4},
  year         = {2023},
  url          = {https://fb-swt.gi.de/fileadmin/FB/SWT/Softwaretechnik-Trends/Verzeichnis/Band\_43\_Heft\_4/SSP23\_CR\_3.pdf},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/stt/KahlhoferKHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/KoppeLR23,
  author       = {Timo Koppe and
                  Lukas Leisching and
                  Stefanie Rasspe},
  editor       = {Tung X. Bui},
  title        = {Management of Digital Transformation: {A} Literature Review of Dynamic
                  and Operational Capabilities},
  booktitle    = {56th Hawaii International Conference on System Sciences, {HICSS} 2023,
                  Maui, Hawaii, USA, January 3-6, 2023},
  pages        = {4204--4213},
  publisher    = {ScholarSpace},
  year         = {2023},
  url          = {https://hdl.handle.net/10125/103146},
  timestamp    = {Thu, 16 Feb 2023 16:52:47 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/KoppeLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imw2/SubhechhaCBRSDV23,
  author       = {Subhali Subhechha and
                  Stefan Cosemans and
                  Attilio Belmonte and
                  Nouredine Rassoul and
                  Shamin Houshmand Sharifi and
                  Peter Debacker and
                  Diederik Verkest and
                  Romain Delhougne and
                  Gouri Sankar Kar},
  title        = {Demonstration of multilevel multiply accumulate operations for AiMC
                  using engineered a-IGZO transistors-based 2T1C gain cell arrays},
  booktitle    = {{IEEE} International Memory Workshop, {IMW} 2023, Monterey, CA, USA,
                  May 21-24, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IMW56887.2023.10145946},
  doi          = {10.1109/IMW56887.2023.10145946},
  timestamp    = {Fri, 16 Jun 2023 08:54:55 +0200},
  biburl       = {https://dblp.org/rec/conf/imw2/SubhechhaCBRSDV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/momm/SonntagMR23,
  author       = {Michael Sonntag and
                  Ren{\'{e}} Mayrhofer and
                  Stefan Rass},
  editor       = {Pari Delir Haghighi and
                  Ismail Khalil and
                  Gabriele Kotsis and
                  Ngurah Agus Sanjaya Er},
  title        = {Anonymously Publishing Liveness Signals with Plausible Deniability},
  booktitle    = {Advances in Mobile Computing and Multimedia Intelligence - 21st International
                  Conference, MoMM 2023, Denpasar, Bali, Indonesia, December 4-6, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14417},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48348-6\_1},
  doi          = {10.1007/978-3-031-48348-6\_1},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/momm/SonntagMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AhmadR23,
  author       = {Shahzad Ahmad and
                  Stefan Rass},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {How to Plausibly Deny Steganographic Secrets},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {731--737},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012120100003555},
  doi          = {10.5220/0012120100003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AhmadR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-02152,
  author       = {V{\'{\i}}ctor Mayoral Vilches and
                  Gelei Deng and
                  Yi Liu and
                  Martin Pinzger and
                  Stefan Rass},
  title        = {ExploitFlow, cyber security exploitation routes for Game Theory and
                  {AI} research in robotics},
  journal      = {CoRR},
  volume       = {abs/2308.02152},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.02152},
  doi          = {10.48550/ARXIV.2308.02152},
  eprinttype    = {arXiv},
  eprint       = {2308.02152},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-02152.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-06782,
  author       = {Gelei Deng and
                  Yi Liu and
                  Victor Mayoral Vilches and
                  Peng Liu and
                  Yuekang Li and
                  Yuan Xu and
                  Tianwei Zhang and
                  Yang Liu and
                  Martin Pinzger and
                  Stefan Rass},
  title        = {PentestGPT: An LLM-empowered Automatic Penetration Testing Tool},
  journal      = {CoRR},
  volume       = {abs/2308.06782},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.06782},
  doi          = {10.48550/ARXIV.2308.06782},
  eprinttype    = {arXiv},
  eprint       = {2308.06782},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-06782.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-05338,
  author       = {Stefan Rass and
                  Martin Pinzger},
  title        = {Incentive-Based Software Security: Fair Micro-Payments for Writing
                  Secure Code},
  journal      = {CoRR},
  volume       = {abs/2309.05338},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.05338},
  doi          = {10.48550/ARXIV.2309.05338},
  eprinttype    = {arXiv},
  eprint       = {2309.05338},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-05338.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-09212,
  author       = {V{\'{\i}}ctor Mayoral Vilches and
                  Jason Jabbour and
                  Yu{-}Shun Hsiao and
                  Zishen Wan and
                  Alejandra Mart{\'{\i}}nez{-}Fari{\~{n}}a and
                  Marti{\~{n}}o Crespo{-}{\'{A}}lvarez and
                  Matthew Stewart and
                  Juan Manuel Reina{-}Mu{\~{n}}oz and
                  Prateek Nagras and
                  Gaurav Vikhe and
                  Mohammad Bakhshalipour and
                  Martin Pinzger and
                  Stefan Rass and
                  Smruti Panigrahi and
                  Giulio Corradi and
                  Niladri Roy and
                  Phillip B. Gibbons and
                  Sabrina M. Neuman and
                  Brian Plancher and
                  Vijay Janapa Reddi},
  title        = {RobotPerf: An Open-Source, Vendor-Agnostic, Benchmarking Suite for
                  Evaluating Robotics Computing System Performance},
  journal      = {CoRR},
  volume       = {abs/2309.09212},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.09212},
  doi          = {10.48550/ARXIV.2309.09212},
  eprinttype    = {arXiv},
  eprint       = {2309.09212},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-09212.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-12702,
  author       = {Mario Kahlhofer and
                  Patrick Kern and
                  S{\"{o}}ren Henning and
                  Stefan Rass},
  title        = {Benchmarking Function Hook Latency in Cloud-Native Environments},
  journal      = {CoRR},
  volume       = {abs/2310.12702},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.12702},
  doi          = {10.48550/ARXIV.2310.12702},
  eprinttype    = {arXiv},
  eprint       = {2310.12702},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-12702.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/MehicRFV22,
  author       = {Miralem Mehic and
                  Stefan Rass and
                  Peppino Fazio and
                  Miroslav Vozn{\'{a}}k},
  title        = {Quantum Key Distribution Networks - {A} Quality of Service Perspective,
                  1},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06608-5},
  doi          = {10.1007/978-3-031-06608-5},
  isbn         = {978-3-031-06607-8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/MehicRFV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MehicRDV22,
  author       = {Miralem Mehic and
                  Stefan Rass and
                  Emir Dervisevic and
                  Miroslav Vozn{\'{a}}k},
  title        = {Tackling Denial of Service Attacks on Key Management in Software-Defined
                  Quantum Key Distribution Networks},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {110512--110520},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3214511},
  doi          = {10.1109/ACCESS.2022.3214511},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MehicRDV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PandaRMLLP22,
  author       = {Sakshyam Panda and
                  Stefan Rass and
                  Sotiris Moschoyiannis and
                  Kaitai Liang and
                  George Loukas and
                  Emmanouil Panaousis},
  title        = {HoneyCar: {A} Framework to Configure Honeypot Vulnerabilities on the
                  Internet of Vehicles},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {104671--104685},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3210117},
  doi          = {10.1109/ACCESS.2022.3210117},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/PandaRMLLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RassKWEH22,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Jasmin Wachter and
                  Manuel Egger and
                  Manuel Hobisch},
  title        = {Supervised Machine Learning with Plausible Deniability},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102506},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102506},
  doi          = {10.1016/J.COSE.2021.102506},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RassKWEH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/VilchesGCRPMG22,
  author       = {Victor Mayoral Vilches and
                  Alfonso Glera{-}Pic{\'{o}}n and
                  Unai Ayucar Carbajo and
                  Stefan Rass and
                  Martin Pinzger and
                  Federico Maggi and
                  Endika Gil{-}Uriarte},
  title        = {Hacking planned obsolescense in robotics, towards security-oriented
                  robot teardown},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {80},
  year         = {2022},
  url          = {https://doi.org/10.14279/tuj.eceasst.80.1189},
  doi          = {10.14279/TUJ.ECEASST.80.1189},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eceasst/VilchesGCRPMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/games/RassKS22,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Stefan Schauer},
  title        = {Games over Probability Distributions Revisited: New Equilibrium Models
                  and Refinements},
  journal      = {Games},
  volume       = {13},
  number       = {6},
  pages        = {80},
  year         = {2022},
  url          = {https://doi.org/10.3390/g13060080},
  doi          = {10.3390/G13060080},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/games/RassKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/JokicCRSPBFB22,
  author       = {Stefan Jokic and
                  David Cleres and
                  Frank Rassouli and
                  Claudia Steurer{-}Stey and
                  Milo A. Puhan and
                  Martin H. Brutsche and
                  Elgar Fleisch and
                  Filipe Barata},
  title        = {TripletCough: Cougher Identification and Verification From Contact-Free
                  Smartphone-Based Audio Recordings Using Metric Learning},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {26},
  number       = {6},
  pages        = {2746--2757},
  year         = {2022},
  url          = {https://doi.org/10.1109/JBHI.2022.3152944},
  doi          = {10.1109/JBHI.2022.3152944},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/JokicCRSPBFB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VierhauserWR22,
  author       = {Michael Vierhauser and
                  Rebekka Wohlrab and
                  Stefan Rass},
  title        = {Towards Cost-Benefit-Aware Adaptive Monitoring for Cyber-Physical
                  Systems},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10092919},
  doi          = {10.1109/CNS56114.2022.10092919},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VierhauserWR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassK22,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Synchronization in Security Games},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {129--148},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_7},
  doi          = {10.1007/978-3-031-26369-9\_7},
  timestamp    = {Wed, 07 Feb 2024 17:23:12 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-00956,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Stefan Schauer},
  title        = {Defending Against Advanced Persistent Threats using Game-Theory},
  journal      = {CoRR},
  volume       = {abs/2205.00956},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.00956},
  doi          = {10.48550/ARXIV.2205.00956},
  eprinttype    = {arXiv},
  eprint       = {2205.00956},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-00956.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-00957,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Stefan Schauer},
  title        = {Decisions with Uncertain Consequences - {A} Total Ordering on Loss-Distributions},
  journal      = {CoRR},
  volume       = {abs/2205.00957},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.00957},
  doi          = {10.48550/ARXIV.2205.00957},
  eprinttype    = {arXiv},
  eprint       = {2205.00957},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-00957.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-03674,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Shahzad Ahmad and
                  Maksim Goman},
  title        = {Metricizing the Euclidean Space towards Desired Distance Relations
                  in Point Clouds},
  journal      = {CoRR},
  volume       = {abs/2211.03674},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.03674},
  doi          = {10.48550/ARXIV.2211.03674},
  eprinttype    = {arXiv},
  eprint       = {2211.03674},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-03674.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/coap/LiuzziLPR21,
  author       = {Giampaolo Liuzzi and
                  Marco Locatelli and
                  Veronica Piccialli and
                  Stefan Rass},
  title        = {Computing mixed strategies equilibria in presence of switching costs
                  by the solution of nonconvex {QP} problems},
  journal      = {Comput. Optim. Appl.},
  volume       = {79},
  number       = {3},
  pages        = {561--599},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10589-021-00282-7},
  doi          = {10.1007/S10589-021-00282-7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/coap/LiuzziLPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/MehicNRMPAMSPPV20,
  author       = {Miralem Mehic and
                  Marcin Niemiec and
                  Stefan Rass and
                  Jiajun Ma and
                  Momtchil Peev and
                  Alejandro Aguado and
                  Vicente Mart{\'{\i}}n and
                  Stefan Schauer and
                  Andreas Poppe and
                  Christoph Pacher and
                  Miroslav Vozn{\'{a}}k},
  title        = {Quantum Key Distribution: {A} Networking Perspective},
  journal      = {{ACM} Comput. Surv.},
  volume       = {53},
  number       = {5},
  pages        = {96:1--96:41},
  year         = {2021},
  url          = {https://doi.org/10.1145/3402192},
  doi          = {10.1145/3402192},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/MehicNRMPAMSPPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftrob/ZhuRDV21,
  author       = {Quanyan Zhu and
                  Stefan Rass and
                  Bernhard Dieber and
                  V{\'{\i}}ctor Mayoral Vilches},
  title        = {Cybersecurity in Robotics: Challenges, Quantitative Modeling, and
                  Practice},
  journal      = {Found. Trends Robotics},
  volume       = {9},
  number       = {1},
  pages        = {1--129},
  year         = {2021},
  url          = {https://doi.org/10.1561/2300000061},
  doi          = {10.1561/2300000061},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftrob/ZhuRDV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/BreilingDPR21,
  author       = {Benjamin Breiling and
                  Bernhard Dieber and
                  Martin Pinzger and
                  Stefan Rass},
  title        = {A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot
                  Workflows},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {93--118},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1010006},
  doi          = {10.3390/JCP1010006},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/BreilingDPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/NisiotiLRP21,
  author       = {Antonia Nisioti and
                  George Loukas and
                  Stefan Rass and
                  Emmanouil Panaousis},
  title        = {Game-Theoretic Decision Support for Cyber Forensic Investigations},
  journal      = {Sensors},
  volume       = {21},
  number       = {16},
  pages        = {5300},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21165300},
  doi          = {10.3390/S21165300},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/NisiotiLRP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/KonigSR21,
  author       = {Sandra K{\"{o}}nig and
                  Stefan Schauer and
                  Stefan Rass},
  editor       = {Dimitri Percia David and
                  Alain Mermoud and
                  Thomas Maillart},
  title        = {Multi-categorical Risk Assessment for Urban Critical Infrastructures},
  booktitle    = {Critical Information Infrastructures Security - 16th International
                  Conference, {CRITIS} 2021, Lausanne, Switzerland, September 27-29,
                  2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13139},
  pages        = {152--167},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93200-8\_9},
  doi          = {10.1007/978-3-030-93200-8\_9},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/critis/KonigSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscram/SchauerRK21,
  author       = {Stefan Schauer and
                  Stefan Rass and
                  Sandra K{\"{o}}nig},
  editor       = {Anouck Adrot and
                  Rob Grace and
                  Kathleen A. Moore and
                  Christopher W. Zobel},
  title        = {Simulation-driven Risk Model for Interdependent Critical Infrastructures},
  booktitle    = {18th International Conference on Information Systems for Crisis Response
                  and Management, {ISCRAM} 2021, Blacksburg, VA, USA, May 2021},
  pages        = {404--415},
  publisher    = {{ISCRAM} Digital Library},
  year         = {2021},
  url          = {https://idl.iscram.org/show.php?record=2342},
  timestamp    = {Thu, 10 Nov 2022 16:58:41 +0100},
  biburl       = {https://dblp.org/rec/conf/iscram/SchauerRK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2021,
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1},
  doi          = {10.1007/978-3-030-90370-1},
  isbn         = {978-3-030-90369-5},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-05789,
  author       = {Quanyan Zhu and
                  Stefan Rass and
                  Bernhard Dieber and
                  Victor Mayoral Vilches},
  title        = {Cybersecurity in Robotics: Challenges, Quantitative Modeling, and
                  Practice},
  journal      = {CoRR},
  volume       = {abs/2103.05789},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.05789},
  eprinttype    = {arXiv},
  eprint       = {2103.05789},
  timestamp    = {Tue, 16 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-05789.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-04267,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Jasmin Wachter and
                  Manuel Egger and
                  Manuel Hobisch},
  title        = {Supervised Machine Learning with Plausible Deniability},
  journal      = {CoRR},
  volume       = {abs/2106.04267},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.04267},
  eprinttype    = {arXiv},
  eprint       = {2106.04267},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-04267.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-02364,
  author       = {Sakshyam Panda and
                  Stefan Rass and
                  Sotiris Moschoyiannis and
                  Kaitai Liang and
                  George Loukas and
                  Emmanouil Panaousis},
  title        = {HoneyCar: {A} Framework to Configure Honeypot Vulnerabilities on the
                  Internet of Vehicles},
  journal      = {CoRR},
  volume       = {abs/2111.02364},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.02364},
  eprinttype    = {arXiv},
  eprint       = {2111.02364},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-02364.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/RassSKZ20,
  author       = {Stefan Rass and
                  Stefan Schauer and
                  Sandra K{\"{o}}nig and
                  Quanyan Zhu},
  title        = {Cyber-Security in Critical Infrastructures - {A} Game-Theoretic Approach},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-46908-5},
  doi          = {10.1007/978-3-030-46908-5},
  isbn         = {978-3-030-46907-8},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/RassSKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BauerRS20,
  author       = {Sergei Bauer and
                  Stefan Rass and
                  Peter Schartner},
  title        = {Generic Parity-Based Concurrent Error Detection for Lightweight {ARX}
                  Ciphers},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {142016--142025},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3010555},
  doi          = {10.1109/ACCESS.2020.3010555},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BauerRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RassZ20,
  author       = {Stefan Rass and
                  Quanyan Zhu},
  title        = {Computer {\&} security special issue editorial},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101678},
  doi          = {10.1016/J.COSE.2019.101678},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RassZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SkopikLWVMFPKWT20,
  author       = {Florian Skopik and
                  Max Landauer and
                  Markus Wurzenberger and
                  Gernot Vormayr and
                  Jelena Milosevic and
                  Joachim Fabini and
                  Wolfgang Pr{\"{u}}ggler and
                  Oskar Kruschitz and
                  Benjamin Widmann and
                  Kevin Truckenthanner and
                  Stefan Rass and
                  Michael Simmer and
                  Christoph Zauner},
  title        = {synERGY: Cross-correlation of operational and contextual data to timely
                  detect and mitigate attacks to cyber-physical systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102544},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102544},
  doi          = {10.1016/J.JISA.2020.102544},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SkopikLWVMFPKWT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/MehicFRMPPRNV20,
  author       = {Miralem Mehic and
                  Peppino Fazio and
                  Stefan Rass and
                  Oliver Maurhart and
                  Momtchil Peev and
                  Andreas Poppe and
                  Jan Rozhon and
                  Marcin Niemiec and
                  Miroslav Vozn{\'{a}}k},
  title        = {A Novel Approach to Quality-of-Service Provisioning in Trusted Relay
                  Quantum Key Distribution Networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {28},
  number       = {1},
  pages        = {168--181},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNET.2019.2956079},
  doi          = {10.1109/TNET.2019.2956079},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/MehicFRMPPRNV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ekaw/CichyR20,
  author       = {Corinna Cichy and
                  Stefan Rass},
  editor       = {Daniel Garijo and
                  Agnieszka Lawrynowicz},
  title        = {Fuzzy Expert Systems for Automated Data Quality Assessment and Improvement
                  Processes},
  booktitle    = {Proceedings of the {EKAW} 2020 Posters and Demonstrations Session
                  co-located with 22nd International Conference on Knowledge Engineering
                  and Knowledge Management {(EKAW} 2020), Globally online {\&} Bozen-Bolzano,
                  Italy, September 17, 2020},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2751},
  pages        = {7--11},
  publisher    = {CEUR-WS.org},
  year         = {2020},
  url          = {https://ceur-ws.org/Vol-2751/short2.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:37 +0100},
  biburl       = {https://dblp.org/rec/conf/ekaw/CichyR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassWK20,
  author       = {Stefan Rass and
                  Angelika Wiegele and
                  Sandra K{\"{o}}nig},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Security Games over Lexicographic Orders},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {422--441},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_23},
  doi          = {10.1007/978-3-030-64793-3\_23},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassWK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoft/KubiakR0020,
  author       = {Patrick Kubiak and
                  Stefan Rass and
                  Martin Pinzger and
                  Stephan Schneider},
  editor       = {Marten van Sinderen and
                  Leszek A. Maciaszek and
                  Hans{-}Georg Fill},
  title        = {A Method for the Joint Analysis of Numerical and Textual IT-System
                  Data to Predict Critical System States},
  booktitle    = {Software Technologies - 15th International Conference, {ICSOFT} 2020,
                  Online Event, July 7-9, 2020, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1447},
  pages        = {242--261},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-83007-6\_12},
  doi          = {10.1007/978-3-030-83007-6\_12},
  timestamp    = {Thu, 14 Oct 2021 10:27:24 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoft/KubiakR0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoft/KubiakR020,
  author       = {Patrick Kubiak and
                  Stefan Rass and
                  Martin Pinzger},
  editor       = {Marten van Sinderen and
                  Hans{-}Georg Fill and
                  Leszek A. Maciaszek},
  title        = {IT-Application Behaviour Analysis: Predicting Critical System States
                  on OpenStack using Monitoring Performance Data and Log Files},
  booktitle    = {Proceedings of the 15th International Conference on Software Technologies,
                  {ICSOFT} 2020, Lieusaint, Paris, France, July 7-9, 2020},
  pages        = {589--596},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009779505890596},
  doi          = {10.5220/0009779505890596},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoft/KubiakR020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/SchauerR20,
  author       = {Stefan Schauer and
                  Stefan Rass},
  editor       = {Jason Staggs and
                  Sujeet Shenoi},
  title        = {Creating a Cross-Domain Simulation Framework for Risk Analyses of
                  Cities},
  booktitle    = {Critical Infrastructure Protection {XIV} - 14th {IFIP} {WG} 11.10
                  International Conference, {ICCIP} 2020, Arlington, VA, USA, March
                  16-17, 2020, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {596},
  pages        = {307--323},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62840-6\_15},
  doi          = {10.1007/978-3-030-62840-6\_15},
  timestamp    = {Tue, 15 Dec 2020 14:42:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/SchauerR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscram/SchauerRKSSQ20,
  author       = {Stefan Schauer and
                  Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Klaus Steinnocher and
                  Thomas Schaberreiter and
                  Gerald Quirchmayr},
  editor       = {Amanda Lee Hughes and
                  Fiona McNeill and
                  Christopher W. Zobel},
  title        = {Cross-Domain Risk Analysis to Strengthen City Resilience: the {ODYSSEUS}
                  Approach},
  booktitle    = {17th International Conference on Information Systems for Crisis Response
                  and Management, {ISCRAM} 2020, May 2020},
  pages        = {652--662},
  publisher    = {{ISCRAM} Digital Library},
  year         = {2020},
  url          = {https://idl.iscram.org/show.php?record=2261},
  timestamp    = {Thu, 10 Nov 2022 16:58:41 +0100},
  biburl       = {https://dblp.org/rec/conf/iscram/SchauerRKSSQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/KonigGRA0H20,
  author       = {Sandra K{\"{o}}nig and
                  Antonios Gouglidis and
                  Stefan Rass and
                  Neil Adams and
                  Paul Smith and
                  David Hutchison},
  editor       = {Jacek Rak and
                  David Hutchison},
  title        = {Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures:
                  {A} Practical Approach},
  booktitle    = {Guide to Disaster-Resilient Communication Networks},
  series       = {Computer Communications and Networks},
  pages        = {769--789},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44685-7\_31},
  doi          = {10.1007/978-3-030-44685-7\_31},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ccn/KonigGRA0H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-08211,
  author       = {V{\'{\i}}ctor Mayoral Vilches and
                  Martin Pinzger and
                  Stefan Rass and
                  Bernhard Dieber and
                  Endika Gil{-}Uriarte},
  title        = {Can {ROS} be used securely in industry? Red teaming ROS-Industrial},
  journal      = {CoRR},
  volume       = {abs/2009.08211},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.08211},
  eprinttype    = {arXiv},
  eprint       = {2009.08211},
  timestamp    = {Wed, 23 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-08211.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-07759,
  author       = {V{\'{\i}}ctor Mayoral Vilches and
                  Irati Abad{-}Fern{\'{a}}ndez and
                  Martin Pinzger and
                  Stefan Rass and
                  Bernhard Dieber and
                  Alcino Cunha and
                  Francisco J. Rodr{\'{\i}}guez{-}Lera and
                  Giovanni Lacava and
                  Angelica Marotta and
                  Fabio Martinelli and
                  Endika Gil{-}Uriarte},
  title        = {alurity, a toolbox for robot cybersecurity},
  journal      = {CoRR},
  volume       = {abs/2010.07759},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.07759},
  eprinttype    = {arXiv},
  eprint       = {2010.07759},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-07759.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CichyR19,
  author       = {Corinna Cichy and
                  Stefan Rass},
  title        = {An Overview of Data Quality Frameworks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {24634--24648},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2899751},
  doi          = {10.1109/ACCESS.2019.2899751},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/CichyR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/SchauerGKWR19,
  author       = {Stefan Schauer and
                  Thomas Grafenauer and
                  Sandra K{\"{o}}nig and
                  Manuel Warum and
                  Stefan Rass},
  editor       = {Simin Nadjm{-}Tehrani},
  title        = {Estimating Cascading Effects in Cyber-Physical Critical Infrastructures},
  booktitle    = {Critical Information Infrastructures Security - 14th International
                  Conference, {CRITIS} 2019, Link{\"{o}}ping, Sweden, September
                  23-25, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11777},
  pages        = {43--56},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37670-3\_4},
  doi          = {10.1007/978-3-030-37670-3\_4},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/critis/SchauerGKWR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BoumkheldPRP19,
  author       = {Nadia Boumkheld and
                  Sakshyam Panda and
                  Stefan Rass and
                  Emmanouil Panaousis},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Honeypot Type Selection Games for Smart Grid Networks},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_6},
  doi          = {10.1007/978-3-030-32430-8\_6},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BoumkheldPRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassKP19,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Emmanouil Panaousis},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Cut-The-Rope: {A} Game of Stealthy Intrusion},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {404--416},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_24},
  doi          = {10.1007/978-3-030-32430-8\_24},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KubiakR18,
  author       = {Patrick Kubiak and
                  Stefan Rass},
  title        = {An Overview of Data-Driven Techniques for IT-Service-Management},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {63664--63688},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2875975},
  doi          = {10.1109/ACCESS.2018.2875975},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KubiakR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhuR18,
  author       = {Quanyan Zhu and
                  Stefan Rass},
  title        = {On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced
                  Persistent Threats},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {13958--13971},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2814481},
  doi          = {10.1109/ACCESS.2018.2814481},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhuR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/RassK18,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig},
  title        = {Password Security as a Game of Entropies},
  journal      = {Entropy},
  volume       = {20},
  number       = {5},
  pages        = {312},
  year         = {2018},
  url          = {https://doi.org/10.3390/e20050312},
  doi          = {10.3390/E20050312},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/RassK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/games/FielderKPSR18,
  author       = {Andrew Fielder and
                  Sandra K{\"{o}}nig and
                  Emmanouil Panaousis and
                  Stefan Schauer and
                  Stefan Rass},
  title        = {Risk Assessment Uncertainties in Cybersecurity Investments},
  journal      = {Games},
  volume       = {9},
  number       = {2},
  pages        = {34},
  year         = {2018},
  url          = {https://doi.org/10.3390/g9020034},
  doi          = {10.3390/G9020034},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/games/FielderKPSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/games/WachterRK18,
  author       = {Jasmin Wachter and
                  Stefan Rass and
                  Sandra K{\"{o}}nig},
  title        = {Security from the Adversary's Inertia-Controlling Convergence Speed
                  When Playing Mixed Strategy Equilibria},
  journal      = {Games},
  volume       = {9},
  number       = {3},
  pages        = {59},
  year         = {2018},
  url          = {https://doi.org/10.3390/g9030059},
  doi          = {10.3390/G9030059},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/games/WachterRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GrafenauerKRS18,
  author       = {Thomas Grafenauer and
                  Sandra K{\"{o}}nig and
                  Stefan Rass and
                  Stefan Schauer},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {A Simulation Tool for Cascading Effects in Interdependent Critical
                  Infrastructures},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {30:1--30:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3240507},
  doi          = {10.1145/3230833.3240507},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GrafenauerKRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuR18,
  author       = {Quanyan Zhu and
                  Stefan Rass},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Game Theory Meets Network Security: {A} Tutorial},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2163--2165},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3264421},
  doi          = {10.1145/3243734.3264421},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/KonigSRS18,
  author       = {Sandra K{\"{o}}nig and
                  Thomas Schaberreiter and
                  Stefan Rass and
                  Stefan Schauer},
  editor       = {Eric A. M. Luiijf and
                  Inga Zutautaite and
                  Bernhard M. H{\"{a}}mmerli},
  title        = {A Measure for Resilience of Critical Infrastructures},
  booktitle    = {Critical Information Infrastructures Security - 13th International
                  Conference, {CRITIS} 2018, Kaunas, Lithuania, September 24-26, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11260},
  pages        = {57--71},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05849-4\_5},
  doi          = {10.1007/978-3-030-05849-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/KonigSRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WachterRKS18,
  author       = {Jasmin Wachter and
                  Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Stefan Schauer},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Disappointment-Aversion in Security Games},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {314--325},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_18},
  doi          = {10.1007/978-3-030-01554-1\_18},
  timestamp    = {Tue, 07 May 2024 20:08:32 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/WachterRKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscram/SchauerRKGL18,
  author       = {Stefan Schauer and
                  Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Thomas Grafenauer and
                  Martin Latzenhofer},
  editor       = {Kees Boersma and
                  Brian M. Tomaszewski},
  title        = {Analyzing Cascading Effects among Critical Infrastructures},
  booktitle    = {Proceedings of the 15th International Conference on Information Systems
                  for Crisis Response and Management, Rochester, NY, USA, May 20-23,
                  2018},
  publisher    = {{ISCRAM} Association},
  year         = {2018},
  url          = {http://idl.iscram.org/files/stefanschauer/2018/1568\_StefanSchauer\_etal2018.pdf},
  timestamp    = {Thu, 10 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscram/SchauerRKGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/RassSS18,
  author       = {Stefan Rass and
                  Andreas Schorn and
                  Florian Skopik},
  editor       = {Eleni Kosta and
                  Jo Pierson and
                  Daniel Slamanig and
                  Simone Fischer{-}H{\"{u}}bner and
                  Stephan Krenn},
  title        = {Trust and Distrust: On Sense and Nonsense in Big Data},
  booktitle    = {Privacy and Identity Management. Fairness, Accountability, and Transparency
                  in the Age of Big Data - 13th {IFIP} {WG} 9.2, 9.6/11.7, 11.6/SIG
                  9.2.2 International Summer School, Vienna, Austria, August 20-24,
                  2018, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {547},
  pages        = {81--94},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-16744-8\_6},
  doi          = {10.1007/978-3-030-16744-8\_6},
  timestamp    = {Sun, 25 Oct 2020 23:04:38 +0100},
  biburl       = {https://dblp.org/rec/conf/primelife/RassSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-08066,
  author       = {Quanyan Zhu and
                  Stefan Rass},
  title        = {Game Theory Meets Network Security: {A} Tutorial at {ACM} {CCS}},
  journal      = {CoRR},
  volume       = {abs/1808.08066},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.08066},
  eprinttype    = {arXiv},
  eprint       = {1808.08066},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-08066.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-00281,
  author       = {Quanyan Zhu and
                  Stefan Rass and
                  Peter Schartner},
  title        = {Community-Based Security for the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1810.00281},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.00281},
  eprinttype    = {arXiv},
  eprint       = {1810.00281},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-00281.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-03857,
  author       = {Miralem Mehic and
                  Peppino Fazio and
                  Stefan Rass and
                  Oliver Maurhart and
                  Momtchil Peev and
                  Andreas Poppe and
                  Jan Rozhon and
                  Marcin Niemiec and
                  Miroslav Vozn{\'{a}}k},
  title        = {A Novel Approach to Quality of Service Provisioning in Trusted Relay
                  Quantum Key Distribution Networks},
  journal      = {CoRR},
  volume       = {abs/1810.03857},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.03857},
  eprinttype    = {arXiv},
  eprint       = {1810.03857},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-03857.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-05602,
  author       = {Stefan Rass},
  title        = {Perfectly Secure Communication, based on Graph-Topological Addressing
                  in Unique-Neighborhood Networks},
  journal      = {CoRR},
  volume       = {abs/1810.05602},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.05602},
  eprinttype    = {arXiv},
  eprint       = {1810.05602},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-05602.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RassAASZM17,
  author       = {Stefan Rass and
                  Ali Alshawish and
                  Mohamed Amine Abid and
                  Stefan Schauer and
                  Quanyan Zhu and
                  Hermann de Meer},
  title        = {Physical Intrusion Games - Optimizing Surveillance by Simulation and
                  Game Theory},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {8394--8407},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2693425},
  doi          = {10.1109/ACCESS.2017.2693425},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/RassAASZM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/MehicMRV17,
  author       = {Miralem Mehic and
                  Oliver Maurhart and
                  Stefan Rass and
                  Miroslav Vozn{\'{a}}k},
  title        = {Implementation of quantum key distribution network simulation module
                  in the network simulator {NS-3}},
  journal      = {Quantum Inf. Process.},
  volume       = {16},
  number       = {10},
  pages        = {253},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11128-017-1702-z},
  doi          = {10.1007/S11128-017-1702-Z},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/MehicMRV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ras/DieberBTKRS17,
  author       = {Bernhard Dieber and
                  Benjamin Breiling and
                  Sebastian Taurer and
                  Severin Kacianka and
                  Stefan Rass and
                  Peter Schartner},
  title        = {Security for the Robot Operating System},
  journal      = {Robotics Auton. Syst.},
  volume       = {98},
  pages        = {192--203},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.robot.2017.09.017},
  doi          = {10.1016/J.ROBOT.2017.09.017},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ras/DieberBTKRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dais/AlshawishARM17,
  author       = {Ali Alshawish and
                  Mohamed Amine Abid and
                  Stefan Rass and
                  Hermann de Meer},
  title        = {Playing a Multi-objective Spot-checking Game in Public Transportation
                  Systems},
  booktitle    = {Proceedings of the 4th Workshop on Security in Highly Connected {IT}
                  Systems, SHCIS@DAIS 2017, Neuch{\^{a}}tel, Switzerland, June 21 -
                  22, 2017},
  pages        = {31--36},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3099012.3099019},
  doi          = {10.1145/3099012.3099019},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dais/AlshawishARM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassKS17,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Stefan Schauer},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {On the Cost of Game Playing: How to Control the Expenses in Mixed
                  Strategies},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {494--505},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_26},
  doi          = {10.1007/978-3-319-68711-7\_26},
  timestamp    = {Wed, 07 Feb 2024 17:23:12 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tale/RassW17,
  author       = {Stefan Rass and
                  Johannes Winkler},
  title        = {Learning pairing-based cryptography by hands-on exercises},
  booktitle    = {{IEEE} 6th International Conference on Teaching, Assessment, and Learning
                  for Engineering, {TALE} 2017, Hong Kong, December 12-14, 2017},
  pages        = {186--191},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/TALE.2017.8252329},
  doi          = {10.1109/TALE.2017.8252329},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/tale/RassW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2017,
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7},
  doi          = {10.1007/978-3-319-68711-7},
  isbn         = {978-3-319-68710-0},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Rass17,
  author       = {Stefan Rass},
  title        = {Towards a Physical Oracle for the Partition Problem using Analogue
                  Computing},
  journal      = {CoRR},
  volume       = {abs/1705.01826},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.01826},
  eprinttype    = {arXiv},
  eprint       = {1705.01826},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Rass17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-05893,
  author       = {Andrew Fielder and
                  Sandra K{\"{o}}nig and
                  Emmanouil Panaousis and
                  Stefan Schauer and
                  Stefan Rass},
  title        = {Uncertainty in Cyber Security Investments},
  journal      = {CoRR},
  volume       = {abs/1712.05893},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.05893},
  eprinttype    = {arXiv},
  eprint       = {1712.05893},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-05893.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RassS16,
  author       = {Stefan Rass and
                  Peter Schartner},
  title        = {On the Security of a Universal Cryptocomputer: the Chosen Instruction
                  Attack},
  journal      = {{IEEE} Access},
  volume       = {4},
  pages        = {7874--7882},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACCESS.2016.2622724},
  doi          = {10.1109/ACCESS.2016.2622724},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RassS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jides/BeckR16,
  author       = {Alexander Beck and
                  Stefan Rass},
  title        = {Using neural networks to aid {CVSS} risk aggregation - An empirically
                  validated approach},
  journal      = {J. Innov. Digit. Ecosyst.},
  volume       = {3},
  number       = {2},
  pages        = {148--154},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jides.2016.10.002},
  doi          = {10.1016/J.JIDES.2016.10.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jides/BeckR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/SeuschekR16,
  author       = {Hermann Seuschek and
                  Stefan Rass},
  title        = {Side-channel leakage models for {RISC} instruction set architectures
                  from empirical data},
  journal      = {Microprocess. Microsystems},
  volume       = {47},
  pages        = {74--81},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.micpro.2016.01.004},
  doi          = {10.1016/J.MICPRO.2016.01.004},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mam/SeuschekR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/flairs/BeckR16,
  author       = {Alexander Beck and
                  Stefan Rass},
  editor       = {Zdravko Markov and
                  Ingrid Russell},
  title        = {Security Risk Aggregation Based on Neural Networks - An Empirically
                  Validated Approach},
  booktitle    = {Proceedings of the Twenty-Ninth International Florida Artificial Intelligence
                  Research Society Conference, {FLAIRS} 2016, Key Largo, Florida, USA,
                  May 16-18, 2016},
  pages        = {259--263},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {http://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS16/paper/view/12833},
  timestamp    = {Wed, 26 Oct 2022 08:35:12 +0200},
  biburl       = {https://dblp.org/rec/conf/flairs/BeckR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassZ16,
  author       = {Stefan Rass and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {{GADAPT:} {A} Sequential Game-Theoretic Framework for Designing Defense-in-Depth
                  Strategies Against Advanced Persistent Threats},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {314--326},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_18},
  doi          = {10.1007/978-3-319-47413-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/DieberKRS16,
  author       = {Bernhard Dieber and
                  Severin Kacianka and
                  Stefan Rass and
                  Peter Schartner},
  title        = {Application-level security for ROS-based applications},
  booktitle    = {2016 {IEEE/RSJ} International Conference on Intelligent Robots and
                  Systems, {IROS} 2016, Daejeon, South Korea, October 9-14, 2016},
  pages        = {4477--4482},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IROS.2016.7759659},
  doi          = {10.1109/IROS.2016.7759659},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iros/DieberKRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/RassW16,
  author       = {Stefan Rass and
                  Raphael Wigoutschnigg},
  editor       = {Sema Oktug and
                  Mehmet Ulema and
                  Cicek Cavdar and
                  Lisandro Zambenedetti Granville and
                  Carlos Raniery Paula dos Santos},
  title        = {Arguable anonymity from key-privacy: The deterministic crowds protocol},
  booktitle    = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2016, Istanbul, Turkey, April 25-29, 2016},
  pages        = {571--576},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NOMS.2016.7502860},
  doi          = {10.1109/NOMS.2016.7502860},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/RassW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KonigSR16,
  author       = {Sandra K{\"{o}}nig and
                  Stefan Schauer and
                  Stefan Rass},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous
                  Networks},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {67--81},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_5},
  doi          = {10.1007/978-3-319-47560-8\_5},
  timestamp    = {Sun, 25 Oct 2020 22:36:50 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/KonigSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/BusbyGRK16,
  author       = {Jerry S. Busby and
                  Antonios Gouglidis and
                  Stefan Rass and
                  Sandra K{\"{o}}nig},
  title        = {Modelling security risk in critical utilities: The system at risk
                  as a three player game and agent society},
  booktitle    = {2016 {IEEE} International Conference on Systems, Man, and Cybernetics,
                  {SMC} 2016, Budapest, Hungary, October 9-12, 2016},
  pages        = {1758--1763},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/SMC.2016.7844492},
  doi          = {10.1109/SMC.2016.7844492},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smc/BusbyGRK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Rass16,
  author       = {Stefan Rass},
  title        = {On the Existence of Weak One-Way Functions},
  journal      = {CoRR},
  volume       = {abs/1609.01575},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.01575},
  eprinttype    = {arXiv},
  eprint       = {1609.01575},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Rass16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RassSB15,
  author       = {Stefan Rass and
                  Peter Schartner and
                  Monika Brodbeck},
  title        = {Private function evaluation by local two-party computation},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2015},
  pages        = {7},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13635-015-0025-9},
  doi          = {10.1186/S13635-015-0025-9},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/RassSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/RassRVGPS15,
  author       = {Stefan Rass and
                  Benjamin Rainer and
                  Matthias Vavti and
                  Johannes G{\"{o}}llner and
                  Andreas Peer and
                  Stefan Schauer},
  title        = {Secure Communication over Software-Defined Networks},
  journal      = {Mob. Networks Appl.},
  volume       = {20},
  number       = {1},
  pages        = {105--110},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11036-015-0582-7},
  doi          = {10.1007/S11036-015-0582-7},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/RassRVGPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RassS15,
  author       = {Stefan Rass and
                  Peter Schartner},
  title        = {Licensed processing of encrypted information},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {703--704},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346894},
  doi          = {10.1109/CNS.2015.7346894},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/RassS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/SeuschekR15,
  author       = {Hermann Seuschek and
                  Stefan Rass},
  title        = {Side-Channel Leakage Models for {RISC} Instruction Set Architectures
                  from Empirical Data},
  booktitle    = {2015 Euromicro Conference on Digital System Design, {DSD} 2015, Madeira,
                  Portugal, August 26-28, 2015},
  pages        = {423--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSD.2015.117},
  doi          = {10.1109/DSD.2015.117},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/SeuschekR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassKS15,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Stefan Schauer},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Uncertainty in Games: Using Probability-Distributions as Payoffs},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {346--357},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_20},
  doi          = {10.1007/978-3-319-25594-1\_20},
  timestamp    = {Thu, 17 Sep 2020 10:44:10 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/SingerR15,
  author       = {Robert Singer and
                  Stefan Ra{\ss}},
  editor       = {Albert Fleischmann and
                  Werner Schmidt and
                  Christian Stary},
  title        = {Embodying Business Rules in {S-BPM}},
  booktitle    = {{S-BPM} in the Wild, Practical Value Creation},
  pages        = {187--199},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17542-3\_11},
  doi          = {10.1007/978-3-319-17542-3\_11},
  timestamp    = {Thu, 23 Jun 2022 19:54:12 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/SingerR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/SingerR15a,
  author       = {Robert Singer and
                  Stefan Ra{\ss}},
  editor       = {Albert Fleischmann and
                  Werner Schmidt and
                  Christian Stary},
  title        = {Structured Communication - Approaching {S-BPM} with Microsoft Technologies},
  booktitle    = {{S-BPM} in the Wild, Practical Value Creation},
  pages        = {235--255},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17542-3\_14},
  doi          = {10.1007/978-3-319-17542-3\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/SingerR15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Rass15,
  author       = {Stefan Rass},
  title        = {On Game-Theoretic Risk Management (Part Two) - Algorithms to Compute
                  Nash-Equilibria in Games with Distributions as Payoffs},
  journal      = {CoRR},
  volume       = {abs/1511.08591},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.08591},
  eprinttype    = {arXiv},
  eprint       = {1511.08591},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Rass15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RassSW15a,
  author       = {Stefan Rass and
                  Peter Schartner and
                  Markus S. Wamser},
  title        = {Oblivious Lookup Tables},
  journal      = {CoRR},
  volume       = {abs/1505.00605},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.00605},
  eprinttype    = {arXiv},
  eprint       = {1505.00605},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RassSW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RassS14,
  author       = {Stefan Rass and
                  Peter Schartner},
  title        = {Hardware-Sicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {38},
  number       = {11},
  pages        = {733},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11623-014-0293-4},
  doi          = {10.1007/S11623-014-0293-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RassS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassR14,
  author       = {Stefan Rass and
                  Benjamin Rainer},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Numerical Computation of Multi-goal Security Strategies},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {118--133},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_7},
  doi          = {10.1007/978-3-319-12601-2\_7},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iot360/RassRVGPS14,
  author       = {Stefan Rass and
                  Benjamin Rainer and
                  Matthias Vavti and
                  Johannes G{\"{o}}llner and
                  Andreas Peer and
                  Stefan Schauer},
  editor       = {Raffaele Giaffreda and
                  Dagmar Cag{\'{a}}nov{\'{a}} and
                  Yong Li and
                  Roberto Riggio and
                  Agn{\`{e}}s Voisard},
  title        = {Secure Communication over Software-Defined Networks},
  booktitle    = {Internet of Things. IoT Infrastructures - First International Summit,
                  IoT360 2014, Rome, Italy, October 27-28, 2014, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {151},
  pages        = {211--221},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19743-2\_31},
  doi          = {10.1007/978-3-319-19743-2\_31},
  timestamp    = {Fri, 27 Mar 2020 08:54:59 +0100},
  biburl       = {https://dblp.org/rec/conf/iot360/RassRVGPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/SantisR14,
  author       = {Fabrizio De Santis and
                  Stefan Rass},
  editor       = {Diego F. Aranha and
                  Alfred Menezes},
  title        = {On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert
                  Leakages},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference
                  on Cryptology and Information Security in Latin America, Florian{\'{o}}polis,
                  Brazil, September 17-19, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8895},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16295-9\_7},
  doi          = {10.1007/978-3-319-16295-9\_7},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/SantisR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/RassS14,
  author       = {Stefan Rass and
                  Peter Schartner},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Chameleon-Hashing f{\"{u}}r Interaktive Beweise der Verf{\"{u}}gbarkeit
                  dynamischer Daten in der Cloud},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {187--199},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20042},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/RassS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/SingerKR14,
  author       = {Robert Singer and
                  Johannes Kotremba and
                  Stefan Rass},
  title        = {Modeling and Execution of Multienterprise Business Processes},
  booktitle    = {{IEEE} 16th Conference on Business Informatics, {CBI} 2014, Geneva,
                  Switzerland, July 14-17, 2014 - Volume 2},
  pages        = {68--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CBI.2014.13},
  doi          = {10.1109/CBI.2014.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/SingerKR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SingerKR14,
  author       = {Robert Singer and
                  Johannes Kotremba and
                  Stefan Ra{\ss}},
  title        = {Modeling and Execution of Multienterprise Business Processes},
  journal      = {CoRR},
  volume       = {abs/1404.7618},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.7618},
  eprinttype    = {arXiv},
  eprint       = {1404.7618},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SingerKR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0031437,
  author       = {Albert Fleischmann and
                  Stefan Rass and
                  Robert Singer},
  title        = {{S-BPM} Illustrated - {A} Storybook about Business Process Modeling
                  and Execution},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36904-9},
  doi          = {10.1007/978-3-642-36904-9},
  isbn         = {978-3-642-36903-2},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0031437.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/Rass13,
  author       = {Stefan Rass},
  title        = {On Game-Theoretic Network Security Provisioning},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {47--64},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10922-012-9229-1},
  doi          = {10.1007/S10922-012-9229-1},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/Rass13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/WigoutschniggSR13,
  author       = {Raphael Wigoutschnigg and
                  Peter Schartner and
                  Stefan Rass},
  title        = {Shared Crowds: {A} Token-Ring Approach to Hide the Receiver},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {383--389},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.51},
  doi          = {10.1109/ARES.2013.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/WigoutschniggSR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/RassRVS13,
  author       = {Stefan Rass and
                  Benjamin Rainer and
                  Matthias Vavti and
                  Stefan Schauer},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Hui{-}Huang Hsu},
  title        = {A Network Modeling and Analysis Tool for Perfectly Secure Communication},
  booktitle    = {27th {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2013, Barcelona, Spain, March 25-28, 2013},
  pages        = {267--275},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/AINA.2013.34},
  doi          = {10.1109/AINA.2013.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/RassRVS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/RassKS13,
  author       = {Stefan Rass and
                  Johannes Kotremba and
                  Robert Singer},
  title        = {The {S-BPM} Architecture: {A} Framework for Multi-agent Systems},
  booktitle    = {2013 {IEEE/WIC/ACM} International Conferences on Web Intelligence
                  and Intelligent Agent Technology, Atlanta, Georgia, USA, 17-20 November
                  2013, Workshop Proceedings},
  pages        = {78--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WI-IAT.2013.154},
  doi          = {10.1109/WI-IAT.2013.154},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/RassKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/RassK13,
  author       = {Stefan Rass and
                  Sebastian Kurowski},
  editor       = {Holger Morgenstern and
                  Ralf Ehlert and
                  Felix C. Freiling and
                  Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Stefan Kiltz and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {On Bayesian Trust and Risk Forecasting for Compound Systems},
  booktitle    = {Seventh International Conference on {IT} Security Incident Management
                  and {IT} Forensics, {IMF} 2013, Nuremberg, Germany, March 12-14, 2013},
  pages        = {69--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IMF.2013.13},
  doi          = {10.1109/IMF.2013.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imf/RassK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Rass13,
  author       = {Stefan Rass},
  editor       = {Pierangela Samarati},
  title        = {Dynamic Proofs of Retrievability from Chameleon-Hashes},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {296--304},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223178/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Rass13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KotrembaRS13,
  author       = {Johannes Kotremba and
                  Stefan Ra{\ss} and
                  Robert Singer},
  title        = {Distributed Business Processes - {A} Framework for Modeling and Execution},
  journal      = {CoRR},
  volume       = {abs/1309.3126},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.3126},
  eprinttype    = {arXiv},
  eprint       = {1309.3126},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KotrembaRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Rass13,
  author       = {Stefan Rass},
  title        = {Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic
                  Encryption},
  journal      = {CoRR},
  volume       = {abs/1312.3146},
  year         = {2013},
  url          = {http://arxiv.org/abs/1312.3146},
  eprinttype    = {arXiv},
  eprint       = {1312.3146},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Rass13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rass12,
  author       = {Stefan Rass},
  title        = {Neue L{\"{o}}sungsans{\"{a}}tze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {473},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0161-z},
  doi          = {10.1007/S11623-012-0161-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rass12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RassSWK12,
  author       = {Stefan Rass and
                  Peter Schartner and
                  Raphael Wigoutschnigg and
                  Christian Kollmitzer},
  title        = {Anonymous Communication by Branch-and-Bound},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {94--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.64},
  doi          = {10.1109/ARES.2012.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RassSWK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RassK12,
  author       = {Stefan Rass and
                  Michal Koza},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {On Secure Communication over Wireless Sensor Networks},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {364--367},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/RassK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SlamanigR11,
  author       = {Daniel Slamanig and
                  Stefan Rass},
  title        = {Redigierbare Digitale Signaturen - Theorie und Praxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {757--762},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0181-0},
  doi          = {10.1007/S11623-011-0181-0},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SlamanigR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnit/Rass11,
  author       = {Stefan Rass},
  title        = {Information-Theoretic Security as an Optimization Problem},
  journal      = {J. Next Gener. Inf. Technol.},
  volume       = {2},
  number       = {3},
  pages        = {72--83},
  year         = {2011},
  url          = {https://doi.org/10.4156/jnit.vol2.issue3.6},
  doi          = {10.4156/JNIT.VOL2.ISSUE3.6},
  timestamp    = {Wed, 18 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnit/Rass11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RassWS11,
  author       = {Stefan Rass and
                  Raphael Wigoutschnigg and
                  Peter Schartner},
  title        = {Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and
                  Receiver-Anonymity},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {4},
  pages        = {27--41},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.12.31.027},
  doi          = {10.22667/JOWUA.2011.12.31.027},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RassWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/RassS11,
  author       = {Stefan Rass and
                  Peter Schartner},
  title        = {A Unified Framework for the Analysis of Availability, Reliability
                  and Security, With Applications to Quantum Networks},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {41},
  number       = {1},
  pages        = {107--119},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSMCC.2010.2050686},
  doi          = {10.1109/TSMCC.2010.2050686},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/RassS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RassWS11,
  author       = {Stefan Rass and
                  Raphael Wigoutschnigg and
                  Peter Schartner},
  title        = {Crowds Based on Secret-Sharing},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {359--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.60},
  doi          = {10.1109/ARES.2011.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RassWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/SlamanigR11,
  author       = {Daniel Slamanig and
                  Stefan Rass},
  editor       = {Frank Leymann and
                  Ivan I. Ivanov and
                  Marten van Sinderen and
                  Boris Shishkov},
  title        = {On Security and Privacy in Cloud Computing},
  booktitle    = {{CLOSER} 2011 - Proceedings of the 1st International Conference on
                  Cloud Computing and Services Science, Noordwijkerhout, Netherlands,
                  7-9 May, 2011},
  pages        = {604--609},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 03 Mar 2016 19:04:34 +0100},
  biburl       = {https://dblp.org/rec/conf/closer/SlamanigR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/Rass11,
  author       = {Stefan Rass},
  editor       = {Holger Morgenstern and
                  Ralf Ehlert and
                  Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Stefan Kiltz and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {Towards a Rapid-Alert System for Security Incidents},
  booktitle    = {Sixth International Conference on {IT} Security Incident Management
                  and {IT} Forensics, {IMF} 2011, Stuttgart, Germany, May 10-12, 2011},
  pages        = {122--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IMF.2011.10},
  doi          = {10.1109/IMF.2011.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imf/Rass11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RassS11,
  author       = {Stefan Rass and
                  Peter Schartner},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Information-leakage in Hybrid Randomized Protocols},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {134--143},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RassS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RassS10,
  author       = {Stefan Rass and
                  Peter Schartner},
  title        = {Quantenkryptographie - {\"{U}}berblick und aktuelle Entwicklungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {753--757},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0205-1},
  doi          = {10.1007/S11623-010-0205-1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RassS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/RassWS10,
  author       = {Stefan Rass and
                  Angelika Wiegele and
                  Peter Schartner},
  title        = {Building a Quantum Network: How to Optimize Security and Expenses},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {18},
  number       = {3},
  pages        = {283--299},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10922-010-9162-0},
  doi          = {10.1007/S10922-010-9162-0},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/RassWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/RassS10,
  author       = {Stefan Rass and
                  Peter Schartner},
  title        = {Non-interactive Information Reconciliation for Quantum Key Distribution},
  booktitle    = {24th {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2010, Perth, Australia, 20-13 April 2010},
  pages        = {1054--1060},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/AINA.2010.27},
  doi          = {10.1109/AINA.2010.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/RassS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/RassSK10,
  author       = {Stefan Rass and
                  David Schuller and
                  Christian Kollmitzer},
  editor       = {Bart De Decker and
                  Ingrid Schaum{\"{u}}ller{-}Bichl},
  title        = {Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis
                  of Face-Recognition Based Authentication},
  booktitle    = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International
                  Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6109},
  pages        = {166--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13241-4\_16},
  doi          = {10.1007/978-3-642-13241-4\_16},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cms/RassSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/SlamanigR10,
  author       = {Daniel Slamanig and
                  Stefan Rass},
  editor       = {Bart De Decker and
                  Ingrid Schaum{\"{u}}ller{-}Bichl},
  title        = {Generalizations and Extensions of Redactable Signatures with Applications
                  to Electronic Healthcare},
  booktitle    = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International
                  Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6109},
  pages        = {201--213},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13241-4\_19},
  doi          = {10.1007/978-3-642-13241-4\_19},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cms/SlamanigR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/RassS10,
  author       = {Stefan Rass and
                  Peter Schartner},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi and
                  Michael R. Grimaila and
                  George Markowsky and
                  Selim Aissi and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Donara Gabrielyan and
                  Gevorg Margarov and
                  Ashu M. G. Solo and
                  Craig Valli and
                  Patricia A. H. Williams},
  title        = {Multipath Authentication without shared Secrets and with Applications
                  in Quantum Networks},
  booktitle    = {Proceedings of the 2010 International Conference on Security {\&}
                  Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {111--115},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Fri, 10 Dec 2010 11:46:08 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/RassS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/SlamanigR10,
  author       = {Daniel Slamanig and
                  Stefan Rass},
  editor       = {Mohammad S. Obaidat and
                  George A. Tsihrintzis and
                  Joaquim Filipe},
  title        = {Selectively Traceable Anonymous and Unlinkable Token-Based Transactions},
  booktitle    = {e-Business and Telecommunications - 7th International Joint Conference,
                  {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {222},
  pages        = {289--303},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25206-8\_19},
  doi          = {10.1007/978-3-642-25206-8\_19},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/SlamanigR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SlamanigR10,
  author       = {Daniel Slamanig and
                  Stefan Rass},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Anonymous but Authorized Transactions Supporting Selective Traceability},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {132--141},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SlamanigR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-1802,
  author       = {Martin Schaffer and
                  Stefan Rass},
  title        = {Fusion Discrete Logarithm Problems},
  journal      = {CoRR},
  volume       = {abs/1001.1802},
  year         = {2010},
  url          = {http://arxiv.org/abs/1001.1802},
  eprinttype    = {arXiv},
  eprint       = {1001.1802},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-1802.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:books/daglib/0024644,
  author       = {Stefan Rass},
  title        = {On Information-Theoretic Security - Contemporary Problems and Solutions},
  school       = {epubli GmbH},
  year         = {2009},
  timestamp    = {Tue, 15 Mar 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0024644.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RassS09,
  author       = {Stefan Rass and
                  Peter Schartner},
  title        = {Security in Quantum Networks as an Optimization Problem},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {493--498},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.84},
  doi          = {10.1109/ARES.2009.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RassS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/SchartnerR09,
  author       = {Peter Schartner and
                  Stefan Rass},
  title        = {How to overcome the 'Trusted Node Model' in Quantum Cryptography},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on Computational
                  Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
                  29-31, 2009},
  pages        = {259--262},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSE.2009.171},
  doi          = {10.1109/CSE.2009.171},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/SchartnerR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/RassSG09,
  author       = {Stefan Rass and
                  Peter Schartner and
                  Michaela Greiler},
  title        = {Quantum Coin-Flipping-Based Authentication},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5199383},
  doi          = {10.1109/ICC.2009.5199383},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/RassSG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/gi/Rass09,
  author       = {Stefan Rass},
  editor       = {Abraham Bernstein and
                  Steffen H{\"{o}}lldobler and
                  G{\"{u}}nter Hotz and
                  Klaus{-}Peter L{\"{o}}hr and
                  Paul Molitor and
                  Gustaf Neumann and
                  R{\"{u}}diger Reischuk and
                  Dietmar Saupe and
                  Myra Spiliopoulou and
                  Harald St{\"{o}}rrle and
                  Dorothea Wagner},
  title        = {{\"{U}}ber Informationstheoretische Sicherheit: Aktuelle Probleme
                  und L{\"{o}}sungen},
  booktitle    = {Ausgezeichnete Informatikdissertationen 2009},
  series       = {{LNI}},
  volume       = {{D-10}},
  pages        = {201--210},
  publisher    = {{GI}},
  year         = {2009},
  url          = {https://dl.gi.de/handle/20.500.12116/33670},
  timestamp    = {Tue, 04 Jul 2023 17:43:57 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/Rass09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/FuchsRK08,
  author       = {Simone Fuchs and
                  Stefan Rass and
                  Kyandoghere Kyamakya},
  title        = {Integration of Ontological Scene Representation and Logic-Based Reasoning
                  for Context-Aware Driver Assistance Systems},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {11},
  year         = {2008},
  url          = {https://doi.org/10.14279/tuj.eceasst.11.127},
  doi          = {10.14279/TUJ.ECEASST.11.127},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/FuchsRK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/DrechslerBR08,
  author       = {J{\"{o}}rg Drechsler and
                  Stefan Bender and
                  Susanne R{\"{a}}ssler},
  title        = {Comparing Fully and Partially Synthetic Datasets for Statistical Disclosure
                  Control in the German {IAB} Establishment Panel},
  journal      = {Trans. Data Priv.},
  volume       = {1},
  number       = {3},
  pages        = {105--130},
  year         = {2008},
  url          = {http://www.tdp.cat/issues/abs.a006a08.php},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdp/DrechslerBR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ambisys/FuchsRLK08,
  author       = {Simone Fuchs and
                  Stefan Rass and
                  Bernhard Lamprecht and
                  Kyandoghere Kyamakya},
  editor       = {Ben Liang and
                  Roger M. Whitaker},
  title        = {A model for ontology-based scene description for context-aware driver
                  assistance systems},
  booktitle    = {1st International {ICST} Conference on Ambient Media and Systems,
                  {AMBI-SYS} 2008, Quebec, Canada, February 11-13, 2008},
  pages        = {5},
  publisher    = {{ICST}},
  year         = {2008},
  url          = {https://doi.org/10.4108/ICST.AMBISYS2008.2869},
  doi          = {10.4108/ICST.AMBISYS2008.2869},
  timestamp    = {Wed, 14 Dec 2022 11:41:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ambisys/FuchsRLK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/KollmitzerMSR08,
  author       = {Christian Kollmitzer and
                  Oliver Maurhart and
                  Stefan Schauer and
                  Stefan Rass},
  editor       = {Mohamed Jmaiel and
                  Mohamed Mosbah},
  title        = {Application framework for high security requirements in R{\&}D
                  environments based on quantum cryptography},
  booktitle    = {CRiSIS '08, Third International Conference on Risks and Security of
                  Internet and Systems, Tozeur, Tunisia, October 28-30, 2008},
  pages        = {193--197},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/CRISIS.2008.4757478},
  doi          = {10.1109/CRISIS.2008.4757478},
  timestamp    = {Tue, 11 Oct 2022 14:59:07 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/KollmitzerMSR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurossc/RassFK08,
  author       = {Stefan Rass and
                  Simone Fuchs and
                  Kyandoghere Kyamakya},
  editor       = {Daniel Roggen and
                  Clemens Lombriser and
                  Gerhard Tr{\"{o}}ster and
                  Gerd Kortuem and
                  Paul J. M. Havinga},
  title        = {A Game-Theoretic Approach to Co-operative Context-Aware Driving with
                  Partially Random Behavior},
  booktitle    = {Smart Sensing and Context, Third European Conference, EuroSSC 2008,
                  Zurich, Switzerland, October 29-31, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5279},
  pages        = {154--167},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88793-5\_12},
  doi          = {10.1007/978-3-540-88793-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/eurossc/RassFK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icqnm/RassSGK08,
  author       = {Stefan Rass and
                  Mohamed Ali Sfaxi and
                  Solange Ghernaouti{-}Helie and
                  Kyandoghere Kyamakya},
  title        = {Secure Message Relay over Networks with QKD-Links},
  booktitle    = {Second International Conference on Quantum, Nano, and Micro Technologies,
                  {ICQNM} 2008, February 10-15, 2008, Sainte Luce, Martinique, French
                  Caribbean},
  pages        = {10--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICQNM.2008.14},
  doi          = {10.1109/ICQNM.2008.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icqnm/RassSGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icves/RassFK08,
  author       = {Stefan Rass and
                  Simone Fuchs and
                  Kyandoghere Kyamakya},
  title        = {Towards a game-theoretic model of co-operative context-aware driving
                  under random influences},
  booktitle    = {{IEEE} International Conference on Vehicular Electronics and Safety,
                  {ICVES} 2008, Columbus, OH, USA, 22-24 September, 2008},
  pages        = {22--26},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICVES.2008.4640883},
  doi          = {10.1109/ICVES.2008.4640883},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icves/RassFK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/RassFSK08,
  author       = {Stefan Rass and
                  Simone Fuchs and
                  Martin Schaffer and
                  Kyandoghere Kyamakya},
  editor       = {Varsha K. Sadekar and
                  Paolo Santi and
                  Yih{-}Chun Hu and
                  Martin Mauve},
  title        = {How to protect privacy in floating car data systems},
  booktitle    = {Proceedings of the Fifth International Workshop on Vehicular Ad Hoc
                  Networks, {VANET} 2008, San Francisco, California, USA, September
                  15, 2008},
  pages        = {17--22},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410043.1410047},
  doi          = {10.1145/1410043.1410047},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/RassFSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpnc/LamprechtRFK08,
  author       = {Bernhard Lamprecht and
                  Stefan Rass and
                  Simone Fuchs and
                  Kyandoghere Kyamakya},
  title        = {Fusion of an uncalibrated camera with velocity information for distance
                  measurement from a moving camera on highways},
  booktitle    = {5th Workshop on Positioning, Navigation and Communication, {WPNC}
                  2008, Leibniz Universit{\"{a}}t Hannover, Hannover, Germany,
                  March 27, 2008},
  pages        = {165--171},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/WPNC.2008.4510371},
  doi          = {10.1109/WPNC.2008.4510371},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpnc/LamprechtRFK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/SchafferSR07,
  author       = {Martin Schaffer and
                  Peter Schartner and
                  Stefan Rass},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {Universally Unique Identifiers: How To Ensure Uniqueness While Protecting
                  The Issuer's Privacy},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {198--204},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/SchafferSR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itsc/LamprechtRFK07,
  author       = {Bernhard Lamprecht and
                  Stefan Rass and
                  Simone Fuchs and
                  Kyandoghere Kyamakya},
  title        = {Extrinsic Camera Calibration for an On-board Two-Camera System without
                  overlapping Field of View},
  booktitle    = {{IEEE} Intelligent Transportation Systems Conference, {ITSC} 2007,
                  Seattle, WA, USA, 30 September-3 October 2007},
  pages        = {265--270},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ITSC.2007.4357679},
  doi          = {10.1109/ITSC.2007.4357679},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/itsc/LamprechtRFK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/KimRLLE06,
  author       = {Chul Kim and
                  A. M. Rassau and
                  Stefan Lachowicz and
                  Mike Myung{-}Ok Lee and
                  Kamran Eshraghian},
  title        = {3D-SoftChip: {A} Novel Architecture for Next-Generation Adaptive Computing
                  Systems},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2006},
  year         = {2006},
  url          = {https://doi.org/10.1155/ASP/2006/75032},
  doi          = {10.1155/ASP/2006/75032},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/KimRLLE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mie/RodriguesRZBIRRSPNCHM06,
  author       = {Jean Marie Rodrigues and
                  Alan L. Rector and
                  Pieter E. Zanstra and
                  Robert H. Baud and
                  Kerry Innes and
                  Jeremy Rogers and
                  Anne{-}Marie Rassinoux and
                  Stefan Schulz and
                  B{\'{e}}atrice Trombert Paviot and
                  Huib ten Napel and
                  Lucienne Clavel and
                  Egbert J. van der Haring and
                  Ceu Mateus},
  editor       = {Arie Hasman and
                  Reinhold Haux and
                  Johan van der Lei and
                  Etienne De Clercq and
                  Francis H. Roger France},
  title        = {An Ontology driven collaborative development for biomedical terminologies:
                  from the French {CCAM} to the Australian {ICHI} coding system},
  booktitle    = {Ubiquity: Technologies for Better Health in Aging Societies - Proceedings
                  of MIE2006, The XXst International Congress of the European Federation
                  for Medical Informatics, Maastricht, The Netherlands, August 27-30,
                  2006},
  series       = {Studies in Health Technology and Informatics},
  volume       = {124},
  pages        = {863--868},
  publisher    = {{IOS} Press},
  year         = {2006},
  url          = {https://doi.org/10.3233/978-1-58603-647-8-863},
  doi          = {10.3233/978-1-58603-647-8-863},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mie/RodriguesRZBIRRSPNCHM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RassSG06,
  author       = {Stefan Rass and
                  Mohamed Ali Sfaxi and
                  Solange Ghernaouti{-}Helie},
  editor       = {Manu Malek and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Javier Hernando},
  title        = {Achieving Unconditional Security in Existing Networks Using Quantum
                  Cryptography},
  booktitle    = {{SECRYPT} 2006, Proceedings of the International Conference on Security
                  and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
                  {SECRYPT} is part of {ICETE} - The International Joint Conference
                  on e-Business and Telecommunications},
  pages        = {207--210},
  publisher    = {{INSTICC} Press},
  year         = {2006},
  timestamp    = {Thu, 28 Sep 2006 10:10:32 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RassSG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/neuroimage/RasserJLWSTBTT05,
  author       = {Paul E. Rasser and
                  Patrick J. Johnston and
                  Jim Lagopoulos and
                  Philip B. Ward and
                  Ulrich Schall and
                  Renate Thienel and
                  Stefan Bender and
                  Arthur W. Toga and
                  Paul M. Thompson},
  title        = {Functional {MRI} {BOLD} response to Tower of London performance of
                  first-episode schizophrenia patients using cortical pattern matching},
  journal      = {NeuroImage},
  volume       = {26},
  number       = {3},
  pages        = {941--951},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.neuroimage.2004.11.054},
  doi          = {10.1016/J.NEUROIMAGE.2004.11.054},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/neuroimage/RasserJLWSTBTT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsi/KimRLNE05,
  author       = {Chul Kim and
                  A. M. Rassau and
                  Stefan Lachowicz and
                  Saeid Nooshabadi and
                  Kamran Eshraghian},
  editor       = {Ricardo Augusto da Luz Reis and
                  Adam Osseiran and
                  Hans{-}J{\"{o}}rg Pfleiderer},
  title        = {3D-SoftChip: {A} Novel 3D Vertically Integrated Adaptive Computing
                  System},
  booktitle    = {VLSI-SoC: From Systems To Silicon, Proceedings of {IFIP} {TC} 10,
                  {WG} 10.5, Thirteenth International Conference on Very Large Scale
                  Integration of System on Chip (VLSI-SoC 2005), October 17-19, 2005,
                  Perth, Australia},
  series       = {{IFIP}},
  volume       = {240},
  pages        = {71--86},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-0-387-73661-7\_6},
  doi          = {10.1007/978-0-387-73661-7\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vlsi/KimRLNE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/delta/LeeLLRELA04,
  author       = {Seung{-}Min Lee and
                  Stefan Lachowicz and
                  David Lucas and
                  A. M. Rassau and
                  Kamran Eshraghian and
                  Mike Myung{-}Ok Lee and
                  Kamal E. Alameh},
  title        = {A Novel Design of Beam Steering n-phase {OPTO-ULSI} Processor for
                  {IIPS}},
  booktitle    = {2nd {IEEE} International Workshop on Electronic Design, Test and Applications
                  {(DELTA} 2004), 28-30 January 2004, Perth, Australia},
  pages        = {395--402},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/DELTA.2004.10032},
  doi          = {10.1109/DELTA.2004.10032},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/delta/LeeLLRELA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/RassauYCLECW98,
  author       = {A. M. Rassau and
                  T. C. B. Yu and
                  H. Cheung and
                  Stefan Lachowicz and
                  Kamran Eshraghian and
                  William A. Crossland and
                  Tim D. Wilkinson},
  editor       = {Patrick M. Dewilde and
                  Franz J. Rammig and
                  Gerry Musgrave},
  title        = {Smart Pixel Implementation of a 2-D Parallel Nucleic Wavelet Transform
                  for Mobile Multimedia Communications},
  booktitle    = {1998 Design, Automation and Test in Europe {(DATE} '98), February
                  23-26, 1998, Le Palais des Congr{\`{e}}s de Paris, Paris, France},
  pages        = {191--195},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/DATE.1998.655856},
  doi          = {10.1109/DATE.1998.655856},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/RassauYCLECW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics