Publikationen

2022

[22-01] N. Mayer, S. Wendzel, J. Keller.
Untersuchung des Gender-gaps bei Cybersecurity-Publikationen.
To appear in: Proc. SICHERHEIT 2022, Karlsruhe, 5.-8. April 2022.
[22-02] J. Keller, S. Litzinger.

Systematic Search Space Design for Energy-Efficient Static Scheduling of Moldable Tasks.
In: Journal of Parallel and Distributed Computing, Vol. 162 pp. 44-58, 2022

[22-03] C. Heßeling, J. Keller.
Replication Study Challenges and New Number Formats for Chaotic Pseudo Random Number Generators.
In: it - Information Technology,Vol. 64 No. 1-2 pp. 5-13, 2022.
[22-04]

A. Ernstsson, N. Vandenbergen, J. Keller, C. Kessler.
A Deterministic Portable Parallel Pseudo-Random Number Generator for Pattern-Based Programming of Heterogeneous Parallel Systems.
In: International Journal of Parallel Programming,Vol. 50 pp. 1-22, 2022.

[22-05]

M. Choras, R. Burduk, R. Kozik, J. Keller.
Special issue on Advances and Practical Applications of Deep and Shallow Machine Learning.
Journal of Universal Computer Science, Vol. 28 No. 3, pp. 225-226, March 2022.

[22-06] C. Heßeling, J. Keller.
Pareto-Optimal Covert Channels in Sensor Data Transmission.
In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022), Special Session on Advanced and Reliable Solutions to Counter Malware and Stegomalware (DETONATOR 2022), Barcelona June 15-16, pp. 79-84, 2022.
[22-07] C. Heßeling, J. Keller, S. Litzinger.
Kleptography in Authentication Protocols: Why is it Still Possible?
In: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2022), Special Session on Advanced and Reliable Solutions to Counter Malware and Stegomalware (DETONATOR 2022), Barcelona June 15-16, pp. 109-110, 2022.
[22-08]

L. Oden, J. Keller.
Improving Cryptanalytic Applications with Stochastic Runtimes on GPUs and Multicores.
In: Parallel Computing, Vol. 112 pp. 102944, 2022.

[22-09]

C. Heßeling, J. Keller, S. Litzinger.
Network Steganography Through Redundancy in Higher-Radix Floating-Point Representations.
In: Proc. 17th International Conference on Availability, Reliability and Security (ARES 2022), pp. 48:1-48:7, August 23-26, 2022.

[22-10]

T. Schmidbauer, J. Keller, S. Wendzel.
Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication.
In: Proc. 17th International Conference on Availability, Reliability and Security (ARES 2022), pp. 50:1-50:10, August 23-26, 2022.

[22-11] J. Keller, S. Litzinger, C. Kessler.

Integrating Energy-Optimizing Scheduling of Moldable Streaming Tasks with Design Space Exploration for Multiple Core Types on Configurable Platforms.
In: Journal of Signal Processing Systems, Vol. 94 No. 9 pp. 849-864, 2022.

[22-12]

D. Spiekermann, J. Keller.
Challenges of Network Traffic Classification Using Deep Learning in Virtual Networks.
To appear in: Proc. Informatik 2022, 2nd International Workshop on Digital Forensics (DF2022), Hamburg, Sept 26-30, 2022.

[22-13] D. Spiekermann, J. Keller.
Requirements for Crafting Virtual Network Packet Captures.
In: Journal of Cybersecurity and Privacy,Vol. 2 No. 3 pp. 516-526, 2022.
[22-14]

J. Keller, E. Marciniszyn.
Improved Concept and Implementation of a Fountain Code Covert Channel.
To appear in: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2022.

[22-15]

S. Wendzel, T. Schmidbauer, S. Zillien, J. Keller.
Did You See That? A Covert Channel Exploiting Recent Legitimate Traffic.
In: arXiv:2212.11850, Dec 2022.