Tews, Erik
40  results:
Search for persons X
?
1

Ransomware Economics: A Two-Step Approach To Model Ransom P..:

, In: 2023 APWG Symposium on Electronic Crime Research (eCrime),
 
?
2

Ransomware: How attacker's effort, victim characteristics a..:

, In: 2022 APWG Symposium on Electronic Crime Research (eCrime),
Meurs, Tom ; Junger, Marianne ; Tews, Erik. - p. 1-13 , 2022
 
?
3

Lost and found : stopping bluetooth finders from leaking..:

, In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Weller, Mira ; Classen, Jiska ; Ullrich, Fabian.. - p. 184-194 , 2020
 
?
4

In-Depth Evaluation of Redirect Tracking and Link Usage:

Koop, Martin ; Tews, Erik ; Katzenbeisser, Stefan
Proceedings on Privacy Enhancing Technologies.  2020 (2020)  4 - p. 394-413 , 2020
 
?
5

BACRank: Ranking Building Automation and Control System Com..:

, In: Lecture Notes in Computer Science; Computer Safety, Reliability, and Security,
 
?
6

Disguised Chromium Browser : Robust Browser, Flash and C..:

, In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society,
 
?
7

Trust The Wire, They Always Told Me! : On Practical Non-..:

, In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks,
 
?
8

Privacy-Preserving Whole Genome Sequence Processing through..:

, In: Proceedings of the 13th Workshop on Privacy in the Electronic Society,
 
?
9

Security analysis of a widely deployed locking system:

, In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security,
Weiner, Michael ; Massar, Maurice ; Tews, Erik.. - p. 929-940 , 2013
 
?
11

Interactive decryption of DECT phone calls:

, In: Proceedings of the fourth ACM conference on Wireless network security,
 
?
13

Kann man mit DECT noch vertraulich telefonieren?:

Nohl, Karsten ; Tews, Erik
Datenschutz und Datensicherheit - DuD.  34 (2010)  11 - p. 758-760 , 2010
 
?
14

Practical attacks against WEP and WPA:

, In: Proceedings of the second ACM conference on Wireless network security,
Tews, Erik ; Beck, Martin - p. 79-86 , 2009
 
1-15