Neue Publikationen

iStockphoto

Alle Publikationen

Anzahl der Treffer: 197
Erstellt: Wed, 24 Apr 2024 23:14:30 +0200 in 0.0712 sec


Markscheffel, Bernd; Kretschmer, Hildrun; Pichappan, Pit
Report of 14th International Conference on Webometrics, Informetrics and Scientometrics (WIS) & 19th COLLNET Meeting 05 to 08 December 2018, University of Macau, Macau. - In: Collnet journal of scientometrics and information management, ISSN 2168-930X, Bd. 13 (2019), 1, S. 3-6

https://doi.org/10.1080/09737766.2019.1617229
Markscheffel, Bernd; Haberzettl, Markus
Sentiment analysis of German emails: a comparison of two approaches. - In: DATA 2019, (2019), S. 385-391

Markscheffel, Bernd; Hertlein, Ariane; Zhao, Shihao
Bibliometric analysis of the publication output of TU Ilmenau in the period 2012-2016. - In: Collaboration - impact on productivity and innovation, (2019), S. 21-29

https://doi.org/10.22032/dbt.39328
Markscheffel, Bernd;
Library data science - challenges and opportunities. - In: Libraries and librarianship in digital plus era, (2019), S. 207-214

Amthor, Peter; Fischer, Daniel; Kühnhauser, Winfried; Stelzer, Dirk
Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems. - In: ARES 2019, (2019), article no. 86, 10 Seiten

Cyber security management requires fast and cost efficient responses to threat alerts. Automation of cyber threat sensing and responding is one way to achieve immediate reactions to imminent threats. There are already tools for an extensive automation of threat sensing, e.g. threat intelligence sharing platforms. Methods, techniques and tools for reacting to menacing states and events, e.g. security-policy-controlled systems, have also been explored and published for some time. What is still missing, however, is the integration of these two approaches. This paper describes first steps towards an integration of threat intelligence sharing platforms and security-policy-controlled systems. We present a conceptual design for threat reaction strategies, security architectures and mechanisms and information representation requirements. We use two exemplary threat scenarios to demonstrate our proposals.



https://doi.org/10.1145/3339252.3340509
Siebenkäs, Anette; Stelzer, Dirk
Assessing theories for research on personal data transparency. - In: Privacy and identity management, (2019), S. 239-254

A growing number of business models are based on the collection, processing and dissemination of personal data. For a free decision about the disclosure of personal data, the individual concerned needs transparency as insight into which personal data is collected, processed, passed on to third parties, for what purposes and for what time (Personal Data Transparency, or PDT for short). The intention of this paper is to assess theories for research on PDT. We performed a literature review and explored theories used in research on PDT. We assessed the selected theories that may be appropriate for exploring PDT. Such research may build on several theories that open up different perspectives and enable various fields of study.



Fischer, Daniel; Markscheffel, Bernd; Scherr, Kilian
Assessment of six e-mail encryption solutions using an utility value analysis. - In: International journal of internet technology and secured transactions, ISSN 2046-3723, Bd. 6 (2018), 1, S. 526-533

https://doi.org/10.20533/jitst.2046.3723.2018.0065
Schäffer, Thomas; Stelzer, Dirk
Barriers to adopting data pools for product information sharing - a literature review. - In: Multikonferenz Wirtschaftsinformatik 2018, (2018), S. 295-306