• 2016

    Forschungsartikel in Sammelband (Konferenz)

    Carnein, M., Schöttle, P., & Böhme, R. (2016). Telltale Watermarks for Counting JPEG Compressions. In Proceedings of the IS&T Electronic Imaging: Media Watermarking, Security, and Forensics (EI '16), San Francisco, CA, 1–10.
    Mehr Details BibTeX DOI

  • 2015

    Forschungsartikel in Sammelband (Konferenz)

    Carnein, M., Schöttle, P., & Böhme, R. (2015). Forensics of High-Quality JPEG Images with Color Subsampling. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '15), Rome, Italy, 1–6.
    Mehr Details BibTeX DOI

  • 2014

    Forschungsartikel in Sammelband (Konferenz)

    Carnein, M., Schöttle, P., & Böhme, R. (2014). Predictable Rain? Steganalysis of Public-key Steganography Using Wet Paper Codes. In Unterweger, A., Uhl, A., Katzenbeisser, S., Kwitt, R., & Piva, A. (Eds.), Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec '14) (pp. 97–108). New York, NY, USA: ACM.
    Mehr Details BibTeX DOI

    Quiring, E., & Schöttle, P. (2014). On the Combination of Randomized Thresholds and Non-Parametric Boundaries to Protect Digital Watermarks against Sensitivity Attacks. In Proceedings of the Information Hiding and Multimedia Security Workshop, Salzburg, Austria, 41–48.
    Mehr Details BibTeX

    Forschungsartikel (Zeitschrift)

    Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., & Böhme, R. (2014). Secure Team Composition to Thwart Insider Threats and Cyber-Espionage. ACM Transactions on Internet Technology, 14(2-3), 19:1-22.
    Mehr Details BibTeX DOI

  • 2013

    Forschungsartikel (Buchbeitrag)

    Johnson, B., Schöttle, P., Laszka, A., Grossklags, J., & Böhme, R. (2013). Bitspotting: Detecting Optimal Adaptive Steganography. In Shi, Y. Q., Kim, H.-J., & Pérez-González, F. (Eds.), Digital Forensics and Watermaking (pp. 1–15). Lecture Notes in Computer Science. Berlin Heidelberg: Springer. (online first)
    Mehr Details BibTeX

    Schöttle, P., & Böhme, R. (2013). Die totale Transparenz. In Dabrowski, M., Wolf, J., & Abmeier, K. (Eds.), Ethische Herausforderungen im Web 2.0 (pp. 1–23). Schöningh. (online first)
    Mehr Details BibTeX

    Forschungsartikel in Sammelband (Konferenz)

    Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., & Böhme, R. (2013). Managing the weakest link: A game-theoretic approach for the mitigation of insider threats. In Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, Egham, Großbritannien, 273–290.
    Mehr Details BibTeX Gesamter Text DOI

    Schöttle, P., Laszka, A., Johnson, B., Grossklags, J., & Boehme, R. (2013). A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding. In Proceedings of the 21th European Signal Processing Conference (EUSIPCO), 2013, Marrakech, Morocco. (online first)
    Mehr Details BibTeX

  • 2012

    Forschungsartikel (Buchbeitrag)

    Johnson, B., Schöttle, P., & Böhme, R. (2012). Where to Hide the Bits?. In Grossklags, J., & Walrand, J. (Eds.), Decision and Game Theory for Security (pp. 1–17). Lecture Notes in Computer Science: Vol. 7638. Berlin Heidelberg: Springer.
    Mehr Details BibTeX

    Schöttle, P., & Böhme, R. (2012). A Game-Theoretic Approach to Content-Adaptive Steganography. In Kirchner, M., & Ghosal, D. (Eds.), Information Hiding (14th International Conference) (pp. 125–141). Lecture Notes in Computer Science: Vol. 7692. Berlin Heidelberg: Springer-Verlag.
    Mehr Details BibTeX

    Forschungsartikel in Sammelband (Konferenz)

    Schöttle, P., Korff, S., & Böhme, R. (2012). Weighted Stego-Image Steganalysis for Naive Content-Adaptive Embedding. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Teneriffa, 193–198.
    Mehr Details BibTeX

  • 2008

    Forschungsartikel in Sammelband (Konferenz)

    Schöttle, P., Dreibholz, T., & Rathgeb, E. (2008). On the application of anomaly detection in reliable server pooling systems for improved robustness against denial of service attacks. In Proceedings of the 33rd IEEE Conference on Local Computer Networks, LCN 2008, Montreal, AB, can, 207–214.
    Mehr Details BibTeX Gesamter Text DOI