default search action
Stephan Neuhaus
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Daniel Dorigatti, Martin Strohmeier, Stephan Neuhaus:
Air-Bus Hijacking: Silently Taking over Avionics Systems. CPSS@AsiaCCS 2024: 53-63 - 2023
- [c22]Hans Dermot Doran, Sven Schneider, Prosper Leibundgut, Stephan Neuhaus, Stefan Eberli:
Towards Securing Hard Real-Time Networked Embedded Devices and Systems: a cBPF Implementation for an FPGA. ETFA 2023: 1-4
2010 – 2019
- 2019
- [c21]Catlin Pidel, Stephan Neuhaus:
BREAKING: Password Entry Is Fine. HCI (29) 2019: 67-80 - [c20]Remo Schweizer, Stephan Neuhaus:
Downright: A Framework and Toolchain for Privilege Handling. SecDev 2019: 76-88 - 2018
- [i1]Thomas Fossati, Roman Muentener, Stephan Neuhaus, Brian Trammell:
Security and Privacy Implications of Middlebox Cooperation Protocols. CoRR abs/1812.05437 (2018) - 2017
- [c19]Don Kodiyan, Florin Hardegger, Stephan Neuhaus, Mark Cieliebak:
Author Profiling with Bidirectional RNNs using Attention with GRUs. CLEF (Working Notes) 2017 - [c18]Mirja Kühlewind, Tobias Bühler, Brian Trammell, Stephan Neuhaus, Roman Muntener, Gorry Fairhurst:
A path layer for the Internet: Enabling network operations on encrypted protocols. CNSM 2017: 1-9 - 2016
- [c17]Stephan Neuhaus, Roman Muntener, Korian Edeline, Benoit Donnet, Elio Gubser:
Towards an Observatory for Network Transparency Research. ANRW 2016: 71-73 - 2015
- [c16]Bernhard Distl, Stephan Neuhaus:
Social power for privacy protected opportunistic networks. COMSNETS 2015: 1-8 - 2014
- [j2]Ariane Keller, Daniel Borkmann, Stephan Neuhaus, Markus Happe:
Self-Awareness in Computer Networks. Int. J. Reconfigurable Comput. 2014: 692076:1-692076:16 (2014) - 2013
- [c15]Stephan Neuhaus, Gabriela Gheorghe:
Critique of the CISSP common body of knowledge of cryptography. CCS 2013: 1355-1358 - [c14]Gabriela Gheorghe, Stephan Neuhaus:
Preserving privacy and accountability for personal devices. CCS 2013: 1359-1362 - [p1]Stephan Neuhaus, Bernhard Plattner:
Software Security Economics: Theory, in Practice. The Economics of Information Security and Privacy 2013: 75-92 - 2012
- [c13]Ariane Keller, Daniel Borkmann, Stephan Neuhaus:
Hardware support for dynamic protocol stacks. ANCS 2012: 75-76 - [c12]Stephan Neuhaus, Bernhard Plattner:
Software Security Economics: Theory, in Practice. WEIS 2012 - 2011
- [c11]Fabio Massacci, Stephan Neuhaus, Viet Hung Nguyen:
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes. ESSoS 2011: 195-208 - 2010
- [c10]Stephan Neuhaus, Fabio Massacci:
Towards Security Climate Forecasts. Future Internet Assembly 2010: 41-50 - [c9]Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo:
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement. IFIPTM 2010: 63-78 - [c8]Stephan Neuhaus, Thomas Zimmermann:
Security Trend Analysis with CVE Topic Models. ISSRE 2010: 111-120
2000 – 2009
- 2009
- [c7]Daniela Marino, Fabio Massacci, Andrea Micheletti, Nataliya Rassadko, Stephan Neuhaus:
Satisfaction of Control Objectives by Control Processes. ICSOC/ServiceWave 2009: 531-545 - [c6]Stephan Neuhaus, Thomas Zimmermann:
The Beauty and the Beast: Vulnerabilities in Red Hat's Packages. USENIX ATC 2009 - 2008
- [b1]Stephan Neuhaus:
Repeating the past experimental and empirical methods in system and software security. Saarland University, 2008 - 2007
- [c5]Stephan Neuhaus, Thomas Zimmermann, Christian Holler, Andreas Zeller:
Predicting vulnerable software components. CCS 2007: 529-540 - [c4]Stephan Neuhaus, Andreas Zeller:
Isolating cause-effect chains in computer systems. Software Engineering 2007: 169-180 - 2006
- [j1]Stephan Neuhaus:
Experimentelle Methoden zum Aufspüren von Einbrüchen. Softwaretechnik-Trends 26(2) (2006) - [c3]Stephan Neuhaus:
Isolating Intrusions by Automatic Experiments. Trustworthy Software 2006 - [c2]Stephan Neuhaus, Andreas Zeller:
Isolating Intrusions by Automatic Experiments. NDSS 2006
1990 – 1999
- 1990
- [c1]Peter Sturm, Stephan Neuhaus:
Ein System zur benutzerdefinierten Visualisierung von parallelen Programmen. Transputer-Anwender-Treffen 1990: 13-20
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint