Katharina Kohls
Katharina Kohls
Geverifieerd e-mailadres voor cs.ru.nl
Titel
Geciteerd door
Geciteerd door
Jaar
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
L Schönherr, K Kohls, S Zeiler, T Holz, D Kolossa
Network and Distributed System Security Symposium (NDSS), 2019
912019
Breaking LTE on Layer Two
D Rupprecht, K Kohls, T Holz, C Pöpper
IEEE Symposium on Security and Privacy, 0, 2019
582019
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
A Zarras, K Kohls, M Dürmuth, C Pöpper
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
192016
Skypeline: Robust hidden data transmission for VoIP
K Kohls, T Holz, D Kolossa, C Pöpper
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
92016
I-DWRR—An insolvency enabled scheduling scheme extending Deficit Weighted Round Robin
PB Bök, K Kohls, Y Tüchelmann, K Kollorz
2011 IEEE GLOBECOM Workshops (GC Wkshps), 695-700, 2011
72011
On the Challenges of Geographical Avoidance for Tor
K Kohls, K Jansen, D Rupprecht, T Holz, C Pöpper
Network and Distributed System Security Symposium (NDSS), 2019
62019
Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two
K Kohls, D Rupprecht, T Holz, C Pöpper
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
52019
POSTER: Traffic Analysis Attacks in Anonymity Networks
KS Kohls, C Pöpper
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
52017
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
K Kohls, C Pöpper
European Symposium on Research in Computer Security, 512-530, 2018
42018
Distributed flow permission inspection for mission-critical communication of untrusted autonomous vehicles
PB Bok, KS Kohls, D Behnke, C Wietfeld
2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), 1-6, 2014
42014
IMP4GT: IMPersonation Attacks in 4G NeTworks
D Rupprecht, K Kohls, T Holz, C Pöpper
Symposium on Network and Distributed System Security (NDSS). ISOC, 2020
32020
BIM-basierte Bauablaufsimulation von Hochbauten
K Kohls, M Block, A Marx, M Hamm
Forum Bauinformatik, 145-152, 2010
32010
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
R Sundara Raman, P Shenoy, K Kohls, R Ensafi
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
2020
Call Me Maybe: Eavesdropping Encrypted {LTE} Calls With ReVoLTE
D Rupprecht, K Kohls, T Holz, C Pöpper
29th {USENIX} Security Symposium ({USENIX} Security 20), 73-88, 2020
2020
Internet Anonymity and Privacy in the Presence of Large-Scale Adversaries
KS Kohls
Ruhr University Bochum, Germany, 2019
2019
Improving the Distributed Fair Congestion Avoidance Protocol for Home Area Networks with Internet Access Links
PB Bok, K Kohls, S Dunhaupt, Y Tuchelmann
2012 21st International Conference on Computer Communications and Networks …, 2012
2012
Poster: Application-Layer Routing Attacks on Tor
K Kohls, C Pöpper
Robust Hidden Data Transmission for VoIP
K Kohls, T Holz, D Kolossa, C Pöpper
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–18