On GDPR compliance of companies’ privacy policies NM Müller, D Kowatsch, P Debus, D Mirdita, K Böttinger Text, Speech, and Dialogue: 22nd International Conference, TSD 2019 …, 2019 | 17 | 2019 |
Stalloris:{RPKI} Downgrade Attack T Hlavacek, P Jeitner, D Mirdita, H Shulman, M Waidner 31st USENIX Security Symposium (USENIX Security 22), 4455-4471, 2022 | 14 | 2022 |
Behind the scenes of RPKI T Hlavacek, P Jeitner, D Mirdita, H Shulman, M Waidner Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 10 | 2022 |
Beyond limits: How to disable validators in secure networks T Hlavacek, P Jeitner, D Mirdita, H Shulman, M Waidner Proceedings of the ACM SIGCOMM 2023 Conference, 950-966, 2023 | 3 | 2023 |
Poster: RPKI Kill Switch D Mirdita, H Shulman, M Waidner Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 3 | 2022 |
Language Dependencies in Adversarial Attacks on Speech Recognition Systems K Markert, D Mirdita, K Böttinger arXiv preprint arXiv:2202.00399, 2022 | 2 | 2022 |
The CURE to vulnerabilities in RPKI validation D Mirdita, H Schulmann, N Vogel, M Waidner arXiv preprint arXiv:2312.01872, 2023 | 1 | 2023 |
National Research Center for Applied Cybersecurity ATHENE Fraunhofer Institute for Secure Information Technology SIT Technische Universität Darmstadt Goethe-Universität Frankfurt T Hlavacek, P Jeitner, D Mirdita, H Shulman, M Waidner | | |