Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks M Ohm, H Plate, A Sykosch, M Meier Proceedings of the 17th International Conference on Detection of Intrusions …, 2020 | 274 | 2020 |
Towards Detection of Software Supply Chain Attacks by Forensic Artifacts M Ohm, A Sykosch, M Meier Proceedings of the 15th International Conference on Availability …, 2020 | 70 | 2020 |
On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages M Ohm, F Boes, C Bungartz, M Meier Proceedings of the 17th International Conference on Availability …, 2022 | 29 | 2022 |
Towards Detection of Malicious Software Packages Through Code Reuse by Malevolent Actors M Ohm, L Kempf, F Boes, M Meier GI Sicherheit 2022, 2022 | 29* | 2022 |
SoK: Practical Detection of Software Supply Chain Attacks M Ohm, C Stuke Proceedings of the 18th International Conference on Availability …, 2023 | 14 | 2023 |
You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node. js M Ohm, T Pohl, F Boes arXiv preprint arXiv:2305.19760, 2023 | 8 | 2023 |
Hunting Observable Objects for Indication of Compromise A Sykosch, M Ohm, M Meier Proceedings of the 13th International Conference on Availability …, 2018 | 4 | 2018 |
Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts C Doll, A Sykosch, M Ohm, M Meier Proceedings of the 14th International Conference on Availability …, 2019 | 3 | 2019 |
Assessing the Impact of Large Language Models on Cybersecurity Education: A Study of ChatGPT's Influence on Student Performance M Ohm, C Bungartz, F Boes, M Meier Proceedings of the 19th International Conference on Availability …, 2024 | 2 | 2024 |
Power Consumption of Common Symmetric Encryption Algorithms on Low-Cost Microchips M Ohm, L Taufenbach, K Weber, T Pohl EnviroInfo 2023, 2023 | 1 | 2023 |
Towards Robust, Explainable, and Privacy-Friendly Sybil Detection C Bungartz, F Boes, M Meier, M Ohm Proceedings of the 2024 Workshop on Artificial Intelligence and Security …, 2024 | | 2024 |
Using Pre-trained Transformers to Detect Malicious Source Code Within JavaScript Packages M Ohm, A Götz INFORMATIK 2024, 529-538, 2024 | | 2024 |
Measuring Resource Efficiency of LaTeX Paper Templates T Pohl, M Ohm EnviroInfo 2023, 2023 | | 2023 |
Studie zum Vergleich der Sicherheit von Open-Source-Software und Proprietärer Software OSB Alliance, M Ohm | | 2023 |
Software Supply Chain Angriffe - Analyse und Erkennung M Ohm Universitäts-und Landesbibliothek Bonn, 2021 | | 2021 |
An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique D Vogel, U Akhmedjanov, M Ohm, M Meier Proceedings of the 15th International Conference on Availability …, 2020 | | 2020 |
Fachlicher Schlussbericht des Teilvorhabens EVAKAL: Entwicklung von Verfahren zur Analyse, Korrelation und Austausch anonymisierter Lagebilder D Vogel, M Ohm, A Sykosch, M Meier Rheinische Friedrich-Wilhelms-Universität Bonn, 2020 | | 2020 |
The environmental impact of online advertisement M Ohm, F Prahl-Kamps, D Vogel Adjunct Proceedings of the 33rd edition of the EnviroInfo, 298, 2019 | | 2019 |