1 code implementation • 9 Mar 2021 • Dominik Meißner, Felix Engelmann, Frank Kargl, Benjamin Erb
Empirical sciences and in particular psychology suffer a methodological crisis due to the non-reproducibility of results, and in rare cases, questionable research practices.
Cryptography and Security Computers and Society
1 code implementation • 9 Feb 2020 • Stephan Kleber, Rens Wouter van der Heijden, Frank Kargl
Protocol reverse engineering based on traffic traces infers the behavior of unknown network protocols by analyzing observable network messages.
Networking and Internet Architecture Cryptography and Security
no code implementations • 3 May 2018 • Rens Wouter van der Heijden, Henning Kopp, Frank Kargl
The purpose of multi-source fusion is to combine information from more than two evidence sources, or subjective opinions from multiple actors.
no code implementations • 24 Apr 2017 • Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne, Stephan Wesemeyer
This paper focusses on the formal analysis of a particular element of security mechanisms for V2X found in many proposals: the revocation of malicious or misbehaving vehicles from the V2X system by invalidating their credentials.
Cryptography and Security D.2.4; D.4.6