Παρακολούθηση
Katharina Krombholz
Katharina Krombholz
Faculty, CISPA Helmholtz Center for Information Security
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα cispa.saarland
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and Applications 22, 113-122, 2014
8542014
Fake identities in social media: A case study on the sustainability of the Facebook business model
K Krombholz, D Merkl, E Weippl
Journal of Service Science Research 4, 175-212, 2012
1982012
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy
K Krombholz, A Judmayer, M Gusenbauer, E Weippl
Financial Cryptography and Data Security 2016, 2016
1802016
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
1372014
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS
K Krombholz, W Mayer, M Schmiedecker, E Weippl
26th USENIX Security Symposium (USENIX Security 2017), 2017
1282017
Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms
A Judmayer, N Stifter, K Krombholz, E Weippl
Springer Nature, 2022
1192022
"If HTTPS Were Secure, I Wouldn’t Need 2FA" - End User and Administrator Mental Models of HTTPS
K Krombholz, K Busse, K Pfeffer, M Smith, E von Zezschwitz
IEEE Symposium on Security & Privacy 2020, 2019
1162019
VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity
S Abdelnabi, K Krombholz, M Fritz
ACM CCS'20, 2020
1112020
Investigating Operators’ Perspective on Security Misconfigurations
C Dietrich, K Krombholz, K Borgolte, T Fiebig
The 25th ACM Conference on Computer and Communications Security (CCS'18), 2018
110*2018
Social engineering attacks on the knowledge worker
K Krombholz, H Hobel, M Huber, E Weippl
Proceedings of the 6th International Conference on Security of Information …, 2013
802013
Use the force: evaluating {Force-Sensitive} authentication for mobile devices
K Krombholz, T Hupperich, T Holz
Twelfth symposium on usable privacy and security (SOUPS 2016), 207-219, 2016
572016
QR inception: Barcode-in-barcode attacks
A Dabrowski, K Krombholz, J Ullrich, ER Weippl
Proceedings of the 4th ACM workshop on security and privacy in smartphones …, 2014
542014
User Mental Models of Cryptocurrency Systems-A Grounded Theory Approach
A Mai, K Pfeffer, M Gusenbauer, E Weippl, K Krombholz
Usenix SOUPS 2020, 2020
532020
IPv6 Security: Attacks and Countermeasures in a Nutshell
J Ullrich, K Krombholz, H Hobel, A Dabrowski, E Weippl
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
502014
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators
C Tiefenau, M Häring, K Krombholz, E von Zezschwitz
Usenix SOUPS 2020, 2020
452020
On reconnaissance with IPv6: a pattern-based scanning approach
J Ullrich, P Kieseberg, K Krombholz, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
432015
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right
C Tiefenau, E von Zezschwitz, M Häring, K Krombholz, M Smith
CCS'19, 2019
422019
QR Code Security - How Secure and Usable Apps Can Protect Users against Malicious QR Codes
K Krombholz, P Fruhwirt, T Rieder, I Kapsalis, J Ullrich, E Weippl
Availability, Reliability and Security (ARES), 2015 10th International …, 2015
412015
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations
P Frühwirt, P Kieseberg, K Krombholz, E Weippl
Digital Investigation, 2014
382014
A systematic literature review of empirical methods and risk representation in usable privacy and security research
V Distler, M Fassl, H Habib, K Krombholz, G Lenzini, C Lallemand, ...
ACM Transactions on Computer-Human Interaction (TOCHI) 28 (6), 1-50, 2021
272021
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20