2007 |
10 | EE | Thomas Nowey,
Hannes Federrath:
Collection of Quantitative Data on Security Incidents.
ARES 2007: 325-334 |
2006 |
9 | EE | Klaus Plößl,
Thomas Nowey,
Christian Mletzko:
Towards a Security Architecture for Vehicular Ad Hoc Networks.
ARES 2006: 374-381 |
8 | EE | Christian Schläger,
Thomas Nowey,
José A. Montenegro:
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce.
ARES 2006: 709-716 |
7 | | Simone Dimler,
Hannes Federrath,
Thomas Nowey,
Klaus Plößl:
Awareness für IT-Sicherheit und Datenschutz in der Hochschulausbildung - Eine empirirsche Untersuchung.
Sicherheit 2006: 18-21 |
6 | EE | Christian Schläger,
Thomas Nowey:
Towards a Risk Management Perspective on AAIs.
TrustBus 2006: 41-50 |
2005 |
5 | EE | Rainer Böhme,
Thomas Nowey:
Economic Security Metrics.
Dependability Metrics 2005: 176-187 |
4 | EE | Martin Mink,
Thomas Nowey:
Human Factors.
Dependability Metrics 2005: 188-195 |
3 | | Thomas Nowey,
Hannes Federrath,
Christian Klein,
Klaus Plößl:
Ansätze zur Evaluierung von Sicherheitsinvestitionen.
Sicherheit 2005: 15-26 |
2 | | Klaus Plößl,
Hannes Federrath,
Thomas Nowey:
Schutzmöglichkeiten gegen Phishing.
Sicherheit 2005: 161-164 |
1 | EE | Klaus Plößl,
Hannes Federrath,
Thomas Nowey:
Protection Mechanisms Against Phishing Attacks.
TrustBus 2005: 20-29 |