Hardware based two-factor user authentication for the Internet of Things MA Gurabi, O Alfandi, A Bochem, D Hogrefe 2018 14th International Wireless Communications & Mobile Computing …, 2018 | 16 | 2018 |
Determination of the Sun's and the Moon's sizes and distances: Revisiting Aristarchus' method F Momeni, RJ H. Papei, S Bereliani, A Miri, A Aghababaei, N Nikjoo, ... American Journal of Physics 85, 207-215, 2017 | 8 | 2017 |
Calculating the speed of vehicles using wireless sensor networks O Alfandi, A Bochem, MA Gurabi, AR Díaz, MI Mehedi, D Hogrefe 2016 federated conference on computer science and information systems …, 2016 | 8 | 2016 |
SASP: a Semantic web-based Approach for management of Sharable cybersecurity Playbooks M Akbari Gurabi, A Mandal, J Popanda, R Rapp, S Decker Proceedings of the 17th International Conference on Availability …, 2022 | 5 | 2022 |
Towards Privacy-Preserving Classification-as-a-Service for DGA Detection A Drichel, MA Gurabi, T Amelung, U Meyer 2021 18th International Conference on Privacy, Security and Trust (PST), 1-10, 2021 | 5 | 2021 |
Towards Privacy-Preserving Sharing of Cyber Threat Intelligence for Effective Response and Recovery L Nitz, MA Gurabi, A Mandal, B Heitmann ERCIM NEWS 126, 33, 2021 | 5 | 2021 |
From Collaboration to Automation: A Proof of Concept for Improved Incident Response. L Nitz, M Zadnik, MA Gurabi, M Obrecht, A Mandal ERCIM News 2022 (129), 31, 2022 | 3 | 2022 |
Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and Challenges M Akbari Gurabi, F Hermsen, A Mandal, S Decker IFIP International Summer School on Privacy and Identity Management, 158-174, 2023 | 1 | 2023 |