-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathrefmisc.bib
359 lines (309 loc) · 13.2 KB
/
refmisc.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
\begin{filecontents}{\Literaturverzeichnis.bib}
@mastersthesis{refmas:ASSS,
author={Alexander Steffen},
title={{Sicherheit Smartcard-basierter Zugangskontrollsysteme}},
school={Ruhr-Universität Bochum},
year={2012},
address={Universitätsstraße 150, 44801 Bochum},
month={Januar},
note={\url{hhttps://www.emsec.ruhr-uni-bochum.de/media/attachments/files/2012/04/Master-Arbeit-public.pdf}, Zugriff: 20.11.2021},
}
@INPROCEEDINGS{refip:NTAS,
author={Nour Elhouda Tabet and Media Anugerah Ayu},
booktitle={{2016 International Conference on Informatics and Computing (ICIC)}},
title={Analysing the security of NFC based payment systems},
year={2016},
volume={},
number={},
pages={169-174},
note={\url{http://dx.doi.org/10.1109/IAC.2016.7905710}, Zugriff: 19.10.2021},
}
@inproceedings{refip:NYRS,
author={Nilay Yildirim and Asaf Varol},
title={{A Research on Security Vulnerabilities in Online and Mobile Banking Systems}},
booktitle={{2019 7th International Symposium on Digital Forensics and Security (ISDFS)}},
year={2019},
month={06},
pages={1-5},
note={\url{http://dx.doi.org/10.3390/sym12081344}, Zugriff: 19.10.2021},
}
@INPROCEEDINGS{refip:MRHS,
author={M. Renaudin and F. Bouesse and Ph. Proust and J.P. Tual and L. Sourgen and F. Germain},
booktitle={{Proceedings Design, Automation and Test in Europe Conference and Exhibition}},
title={High security smartcards},
year={2004},
volume={1},
pages={228-232 Vol.1},
note={\url{http://dx.doi.org/10.1109/DATE.2004.1268853}, Zugriff: 26.10.2021},
}
@INPROCEEDINGS{refip:JFSB,
author={J.J. Farrell},
booktitle={{Proceedings 13th TRON Project International Symposium /TEPS '96}},
title={{Smartcards become an international technology}},
year={1996},
pages={134-140},
note={\url{https://doi.org/10.1109/TRON.1996.566204}, Zugriff: 30.10.2021},
}
@inproceedings{refip:DKAM,
author={Darius Khodawandi and Key Pousttchi and Dietmar G. Wiedemann},
title={{Akzeptanz mobiler Bezahlverfahren in Deutschland}},
booktitle={{Mobile Commerce - Anwendungen und Perspektiven, Proceedings zum 3. Workshop Mobile Commerce}},
year={2003},
pages={42-57},
publisher={Gesellschaft für Informatik e.V.},
address={Bonn},
}
@INPROCEEDINGS{refip:GMPS,
author={Gianluigi Me},
booktitle={ACS/IEEE International Conference on Computer Systems and Applications, 2003. Book of Abstracts.},
title={Payment security in mobile environment},
year={2003},
volume={},
number={},
pages={34-},
note={\url{http://dx.doi.org/10.1109/AICCSA.2003.1227468}, Zugriff: 02.11.2021},
}
@inbook{inbook:MHNS,
author={Martin Henze and Jens Hiller and René Hummen and Roman Matzutt and Klaus
Wehrle and Jan H. Ziegeldorf},
isbn={9781119226079},
title={{Network Security and Privacy for Cyber-Physical Systems}},
booktitle={{Security and Privacy in Cyber‐Physical Systems}},
chapter={2},
pages={25-56},
note={\url{https://doi.org/10.1002/9781119226079.ch2}, Zugriff: 06.11.2021},
year={2017},
publisher={John Wiley and Sons Ltd},
}
@inbook{inbook:SWCS,
author={Steffen Wendzel and Jernej Tonejc and Jaspreet Kaur and Alexandra Kobekova},
publisher={John Wiley \& Sons, Ltd},
isbn={9781119226079},
title={{Cyber Security of Smart Buildings}},
booktitle={{Security and Privacy in Cyber‐Physical Systems}},
chapter={16},
pages={327-351},
doi={https://doi.org/10.1002/9781119226079.ch16},
note={\url{https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119226079.ch16}, Zugriff: 06.11.2021},
eprint={https://onlinelibrary.wiley.com/doi/pdf/10.1002/9781119226079.ch16},
year={2017},
}
@Inbook{inbook:AHDS,
author={Alan Hevner and Samir Chatterjee},
title={{Design Science Research in Information Systems}},
bookTitle={{Design Research in Information Systems: Theory and Practice}},
year={2010},
publisher={Springer US},
address={Boston, MA},
pages={9--22},
isbn={978-1-4419-5653-8},
note={\url{https://doi.org/10.1007/978-1-4419-5653-8_2}, Zugriff: 04.11.2021},
}
@misc{periodical:ANST,
author={Lena Graefe},
title={{Anzahl der Neuzulassungen von Caravans und Reisemobilen in Deutschland von 2013 bis 2020}},
publisher={Statista GmbH},
address={Hamburg},
year={2021},
pages={Online-Ressource},
language={ger},
note={\url{https://de.statista.com/statistik/daten/studie/662102/umfrage/neuzulassungen-von-caravans-und-reisemobile-in-deutschland/}, Zugriff: 15.10.2011},
library={UB},
}
%howpublished={https://de.statista.com/statistik/daten/studie/662102/umfrage/neuzulassungen-von-caravans-und-reisemobile-in-deutschland/},
@misc{periodical:UBST,
author={Lena Graefe},
title={{Übernachtungen in Beherbergungsstätten in Deutschland bis September 2021}},
publisher={Statista GmbH},
address={Hamburg},
year={2021},
pages={Online-Ressource},
language={ger},
note={\url{https://de.statista.com/statistik/daten/studie/73548/umfrage/uebernachtungen-in-beherbergungsstaetten-und-auf-campingplaetzen/}, Zugriff: 15.10.2011},
library={UB},
}
%howpublished={https://de.statista.com/statistik/daten/studie/73548/umfrage/uebernachtungen-in-beherbergungsstaetten-und-auf-campingplaetzen/},
@misc{periodical:AUST,
author={Lena Graefe},
title={{Anzahl der Übernachtungen von Gästen in Beherbergungsstätten in Deutschland von September 2019 bis September 2021}},
publisher={Statista GmbH},
address={Hamburg},
year={2021},
pages={Online-Ressource},
language={ger},
note={\url{https://de.statista.com/statistik/daten/studie/73548/umfrage/uebernachtungen-in-beherbergungsstaetten-und-auf-campingplaetzen/}, Zugriff: 15.10.2011},
library={UB},
}
%howpublished={https://de.statista.com/statistik/daten/studie/73548/umfrage/uebernachtungen-in-beherbergungsstaetten-und-auf-campingplaetzen/},
@misc{periodical:AdCJ,
author={Lena Graefe},
title={{Altersverteilung von deutschen Campingurlaubern im Jahr 2019}},
publisher={Statista GmbH},
address={Hamburg},
year={2019},
pages={Online-Ressource},
language={ger},
note={\url{https://de.statista.com/statistik/daten/studie/1044777/umfrage/altersverteilung-der-deutschen-campingurlaubern/}, Zugriff: 15.10.2011},
library={UB},
}
% howpublished={https://de.statista.com/statistik/daten/studie/1044777/umfrage/altersverteilung-der-deutschen-campingurlaubern/},
@misc{misc:MSND,
author={Markus Siepermann},
editor={{Springer Gabler Verlag}},
year={2018},
title={Gabler Wirtschaftslexikon: Stichwort: Digital Native},
howpublished={\url{https://wirtschaftslexikon.gabler.de/definition/digital-native-54496}},
note={Zugriff: 15.10.2011}
}
@misc{booklet:BSSE,
author={{BSI}},
editor={{Bundesamt für Sicherheit in der Informationstechnik}},
note={Zugriff: 26.12.2021},
year={2020},
title={{Social Engineering – der Mensch als Schwachstelle}},
howpublished={\url{https://www.bsi.bund.de/DE/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Social-Engineering/social-engineering_node.html}},
}
@misc{booklet:BKCB,
author={Bundeskriminalamt},
editor={Bundeskriminalamt},
note={Zugriff: 26.12.2021},
year={2020},
title={{Cybercrime Bundeslagebild 2020}},
howpublished={\url{https://www.bka.de/SharedDocs/Downloads/DE/Publikationen/JahresberichteUndLagebilder/Cybercrime/cybercrimeBundeslagebild2020.html;jsessionid=1A921B916A930B1DEB3130BCF4399153.live291?nn=28110}},
}
@INPROCEEDINGS{refip:CMBM,
author={Christoph Matthies and Lukas Pirl and Amir Azodi and Christoph Meinel},
booktitle={2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)},
title={Beat your mom at solitaire — A review of reverse engineering techniques and countermeasures},
year={2015},
pages={1094-1097},
doi={10.1109/ICSESS.2015.7339242},
note={\url{https://ieeexplore.ieee.org/document/7339242}, Zugriff: 26.12.2021},
}
@inproceedings{refip:SGRM,
author={Serge Demeyer},
booktitle={{2011 27th IEEE International Conference on Software Maintenance (ICSM)}},
year={2011},
month={09},
pages={600},
title={Research methods in computer science},
note={\url{http://dx.doi.org/10.1109/ICSM.2011.6080841}, Zugriff: 26.12.2021},
}
@misc{refst:nmap,
title={{Nmap: the Network Mapper - Free Security Scanner}},
howpublished={\url{https://nmap.org/}},
note={Zugriff: 10.12.2021},
year={2021},
author={Nmap.Org},
}
@misc{refst:wisa,
title={{About Wireshark}},
howpublished={\url{https://www.wireshark.org/}},
note={Zugriff: 10.12.2021},
year={2021},
author={Wireshark},
}
@misc{refst:ARES,
title={{Establishing Security Best Practices in Access Control}},
howpublished={\url{https://www.readkong.com/page/establishing-security-best-practices-in-access-control-2712189}},
note={Zugriff: 10.12.2021},
year={2010},
author={Andreas Rohr and Karsten Nohl and Henryk Plötz},
}
@misc{refst:IPIO,
title={{IP-Spoofing: So einfach manipulieren Angreifer Datenpakete}},
howpublished={\url{https://www.ionos.de/digitalguide/server/sicherheit/ip-spoofing-grundlagen-und-gegenmassnahmen/}},
note={Zugriff: 14.12.2021},
year={2020},
author={IONOS},
}
@INPROCEEDINGS{refip:KSDD,
author={K.S. Vanitha and S. V. UMA and S.K. Mahidhar},
booktitle={{2017 International Conference on Circuits, Controls, and Communications (CCUBE)}},
title={{Distributed denial of service: Attack techniques and mitigation}},
year={2017},
volume={},
number={},
pages={226-231},
}
@inproceedings{refip:VDSD,
author={Veronika Durcekova and Ladislav Schwartz and Nahid Shahmehri},
booktitle={{2012 ELEKTRO}},
year={2012},
month={05},
pages={55-60},
title={{Sophisticated Denial of Service Attacks Aimed at Application Layer}},
isbn={978-1-4673-1180-9},
journal={{Proceedings of 9th International Conference, ELEKTRO 2012}},
note={\url{http://dx.doi.org/10.1109/ELEKTRO.2012.6225571}, Zugriff: 02.12.2021},
}
@misc{refst:REWE,
title={{Über uns: REFE digital}},
howpublished={\url{https://www.rewe-digital.com/ueber-uns.html}},
note={Zugriff: 17.12.2021},
author={{REWE Digital}},
year={2021},
}
@misc{refst:MYENSO,
title={{Die Idee von myEnso}},
howpublished={\url{https://www.myenso.de/content/idee}},
note={Zugriff: 17.12.2021},
author={{myenso}},
year={2021},
}
@INPROCEEDINGS{refip:HSSI,
author={H. Sharp and A. Finkelstein and G. Galal},
booktitle={{Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99}},
title={Stakeholder identification in the requirements engineering process},
year={1999},
volume={},
number={},
pages={387-391},
note={\url{https://doi.org/10.1109/DEXA.1999.795198}, Zugriff: 18.12.2021},
}
@INPROCEEDINGS{refip:LYSP,
author={Lee, Yun-kyung and Kim, Young-ho and Kim, Jeong-nyeo},
booktitle={{2021 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)}},
title={IoT standard platform architecture that provides defense against DDoS attacks},
year={2021},
volume={},
number={},
pages={1-3},
doi={10.1109/ICCE-Asia53811.2021.9641892},
note={\url{https://doi.org/10.1109/ICCE-Asia53811.2021.9641892}, Zugriff: 18.12.2021},
}
@misc{refst:2fa,
title={{Zwei-Faktor-Authentisierung}},
howpublished={\url{https://www.bsi.bund.de/DE/Themen/Verbraucherinnen-und-Verbraucher/Informationen-und-Empfehlungen/Cyber-Sicherheitsempfehlungen/Accountschutz/Zwei-Faktor-Authentisierung/zwei-faktor-authentisierung_node.html}},
note={Zugriff: 24.12.2021},
year={2021},
author={{BSI}},
}
@INPROCEEDINGS{refip:simf,
author={Sanjar Ibrokhimov and Kueh Lee Hui and Ahmed Abdulhakim Al-Absi and hoon jae lee and Mangal Sain},
booktitle={{2019 21st International Conference on Advanced Communication Technology (ICACT)}},
title={{Multi-Factor Authentication in Cyber Physical System: A State of Art Survey}},
year={2019},
volume={},
number={},
pages={279-284},
note={\url{https://doi.org/10.23919/ICACT.2019.8701960}, Zugriff: 25.11.2021},
}
@misc{refst:scpt,
title={What is a side-channel attack?},
howpublished={\url{https://resources.infosecinstitute.com/topic/what-is-a-side-channel-attack/}},
note={Zugriff: 25.12.2021},
year={2020},
author={Pedro Tavares},
}
@INPROCEEDINGS{refip:ZYAM,
author={Zhi-Yuan Hu and Yao-Wei Liu and Xiao Hu and Jian-Hua Li},
booktitle={IEEE INFOCOM 2004},
title={Anonymous micropayments authentication (AMA) in mobile data network},
year={2004},
volume={1},
number={},
pages={53},
note={\url{https://doi.org/10.1109/INFCOM.2004.1354480}, Zugriff: 19.10.2021},
}
\end{filecontents}