Deine Suchergebnisse für On the Similarity of Web Measurements Under Different Experimental Setups
On the Similarity of Web Measurements Under Different Experimental SetupsN. Demir, M. Große-Kampmann, T. Holz, J. Hörnemann, Norbert Pohlmann (Institut für Internet-Sicherheit), T. Urban, C. Wressnegger: “On the Similarity of Web Measurements Under Different Experimental Setups”. In Proceedings of the… weitere Informationen | ![]() |
Reproducibility and Replicability of Web Measurement Studies…missing. We underline the criticality of this finding by performing a large-scale Web measurement study on 4.5 million pages with 24 different measurement setups to demonstrate the influence of the… weitere Informationen | ![]() |
Understanding Regional Filter Lists: Efficacy and Impact…which they were designed. Finally, we show that the majority of the rules on the lists were not used in our experiment and that only a fraction of the rules… weitere Informationen | ![]() |
Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk…that they increase user protection in the regions for which they were designed. Finally, we show that the majority of the rules on the lists were not used in our… weitere Informationen | ![]() |
Our (in)Secure Web: Understanding Update Behavior of Websites and Its Impact on SecurityN. Demir, K. Wittek, N. Pohlmann, T. Urban : (Institut für Internet-Sicherheit) “Our (in)Secure Web: Understanding Update Behavior of Websites and Its Impact on Security”, In Proceedings of the Passive… weitere Informationen | ![]() |
A Large-Scale Study of Cookie Banner Interaction Tools and Their Impact on Users’ Privacy…that the number of cookies, category of used cookies, and individual cookies in terms of their key names differ based on the used extension. Previous studies have either analyzed the… weitere Informationen | ![]() |
Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs…Additionally, we analyze which tracking techniques and servicesare used. … More information on the subject “Towards Understanding the Impact of the GDPR on Online Advertisement”: Articles: “Beyond the Front Page:… weitere Informationen | ![]() |
Exploring the Effects of Cybersecurity Awareness and Decision-Making Under RiskO. Braun, J. Hörnemann, M. Große-Kampmann, Norbert Pohlmann (Institut für Internet-Sicherheit), T. Urban: „Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk”, The 6th International Conference on Science of Cyber… weitere Informationen | ![]() |
The Unwanted Sharing Economy: An Analysis of Cookie Syncing and User Transparency under GDPR…online tracking companies should do to bemore compliant with the new regulation. … More information on the subject “Towards Understanding the Impact of the GDPR on Online Advertisement”: Articles: “Beyond… weitere Informationen | ![]() |
Towards Understanding First-Party Cookie Tracking in the Field…over 2021. Introduction The business model of many modern (Web) applications relies on the revenue generated by “renting” space on their services to advertisement companies. These ad-tech companies try to… weitere Informationen | ![]() |
Statistical anomaly detection in ETHEREUM transaction graphs…is based on on-chain voting from the consortium members, while the ensuing actions are executed by the Iron Throne holder, a position that is voted for off-chain once a year…. weitere Informationen | ![]() |
Sandnet: Network Traffic Analysis of Malicious Software…to understand the workings of yet unknown software [8, 14, 17]. Understanding the behavior of malicious software may not only provide insights about actions of malicious intents, upcoming techniques, and… weitere Informationen | ![]() |
Building Trustworthiness and Acceptance of IT Security Solutions…easily or even intuitively by the user. Performance of cybersecurity mechanisms: The extent to which the performance of the IT solution decreases, for example through the encryption of the data…. weitere Informationen | ![]() |
Plenty of Phish in the Sea: Analyzing Potential Pre-Attack Surface…of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions…. weitere Informationen | ![]() |
Internet Early Warning System: The Global View…collection of information in compliance with data protec-tion regulations and optimization of the amount of information, so as to be able to store information in the long term and therefore… weitere Informationen | ![]() |
The Internet Industry in Germany 2020 to 2025…which are largely contingent on the overall economic situation. A damper on the digital decade? Definitely not! The figures of the new study make it clear that the current crisis… weitere Informationen | ![]() |
Measuring the Impact of the GDPR on Data Sharing in Ad Networks…on the subject “Towards Understanding the Impact of the GDPR on Online Advertisement”: Articles: “Beyond the Front Page: Measuring Third Party Dynamics in the Field” “Measuring the Impact of the… weitere Informationen | ![]() |
The global View of Security Situation in the Internet…thousands of motorists, solutions have been developed to overcome the lack of information. There is a close network of traffic counter loops which record the traffic volume and situation on… weitere Informationen | ![]() |
eco – Discussion Paper – DNS over HTTPS (DoH)…within the industry to, on the one hand, ensure the protection of user privacy through the DoH protocol, and on the other hand, ensure user choice and digital self-determination. This… weitere Informationen | ![]() |
tNAC – trusted Network Access Control meets security platform…But the core limitation is the lack of trustworthiness caused by the use of common operating systems. The trustworthiness created by any NAC solution depends on the trustworthiness of the… weitere Informationen | ![]() |