Author of the publication

Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services.

, , and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 188-203. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flooding Attack Issues of Web Services and Service-Oriented Architectures., and . GI Jahrestagung (1), volume P-133 of LNI, page 117-122. GI, (2008)Past and Present: A Case Study of Twitter's Responses to GDPR Data Requests., and . APF, volume 13888 of Lecture Notes in Computer Science, page 57-84. Springer, (2023)Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example., , , and . CODASPY, page 237-243. ACM, (2023)Where There is No CISO., , , , and . ICT4D, volume 657 of IFIP Advances in Information and Communication Technology, page 187-200. Springer, (2022)Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality., and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 3-19. Springer, (2019)Representing Data Protection Aspects in Process Models by Coloring., , and . APF, volume 12703 of Lecture Notes in Computer Science, page 143-155. Springer, (2021)Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts., and . CoRR, (2024)Extraction and Accumulation of Identity Attributes from the Internet of Things., and . Open Identity Summit, volume P-312 of LNI, page 179-192. Gesellschaft für Informatik e.V., (2021)Multi-Account Dashboard for Authentication Dependency Analysis., , and . ARES, page 39:1-39:13. ACM, (2022)Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks., , , and . BIOSIG, volume P-315 of LNI, page 81-90. Gesellschaft für Informatik e.V., (2021)