default search action
Jens Heider
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Kris Heid, Jens Heider:
Haven't we met before? - Detecting Device Fingerprinting Activity on Android Apps. EICC 2024: 11-18 - 2023
- [c16]Kris Heid, Vincent Andrae, Jens Heider:
Towards detecting device fingerprinting on iOS with API function hooking. EICC 2023: 78-84 - [c15]Kris Heid, Jens Heider, Matthias Ritscher, Jan-Peter Stotz:
Tracing Cryptographic Agility in Android and iOS Apps. ICISSP 2023: 38-45 - 2022
- [c14]Kris Heid, Jens Heider:
Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws. CRiSIS 2022: 1-17 - [c13]Kris Heid, Tobias Tefke, Jens Heider, Ralf C. Staudemeyer:
Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective. ICISSP 2022: 378-387 - 2021
- [c12]Kris Heid, Jens Heider:
Automated, Dynamic Android App Vulnerability and Privacy Leak Analysis: Design Considerations, Required Components and Available Tools. EICC 2021: 1-6 - [c11]Paul Wagner, Kris Heid, Jens Heider:
Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices. ICISSP 2021: 368-375 - 2020
- [c10]Kris Heid, Jens Heider, Kasra Qasempour:
Raising Security Awareness on Mobile Systems through Gamification. EICC 2020: 1:1-1:6
2010 – 2019
- 2018
- [c9]Sheikh Mahbub Habib, Nikolaos Alexopoulos, Md Monirul Islam, Jens Heider, Stephen Marsh, Max Mühlhäuser:
Trust4App: Automating Trustworthiness Assessment of Mobile Applications. TrustCom/BigDataSE 2018: 124-135 - 2017
- [c8]Daniel Müssig, Robert Stricker, Jörg Lässig, Jens Heider:
Highly Scalable Microservice-based Enterprise Architecture for Smart Ecosystems in Hybrid Cloud Environments. ICEIS (3) 2017: 454-459 - 2016
- [c7]Jens Heider, Jörg Lässig:
Convergent Infrastructures for Municipalities as Connecting Platform for Climate Applications. EnviroInfo (1) 2016: 311-320 - 2014
- [j4]Jens Heider:
Das Ende der Paranoia? Datenschutz und Datensicherheit 38(1): 1 (2014) - [j3]Jens Heider:
Die Gretchenfrage: Wie halten Sie's mit der App-Sicherheit? Datenschutz und Datensicherheit 38(1): 15-19 (2014) - [c6]Markus Will, Jörg Lässig, Daniel Tasche, Jens Heider:
Regional Carbon Footprinting for Municipalities and Cities. EnviroInfo 2014: 653-660 - [c5]Steffen Bartsch, Bernhard J. Berger, Eric Bodden, Achim D. Brucker, Jens Heider, Mehmet Kus, Sönke Maseberg, Karsten Sohr, Melanie Volkamer:
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen. Sicherheit 2014: 283-291 - 2013
- [c4]Jens Heider, Daniel Tasche, Jörg Lässig, Markus Will:
A greenhouse gas accounting tool for regional and municipal climate change management. SustainIT 2013: 1-3 - 2012
- [b1]Jens Heider:
Ubiquitous Personal Information Management (Ubiquitäre Persönliche Informationsverwaltung). Technical University of Munich, Germany, 2012 - [j2]Jens Heider:
Verantwortung: Smartphone. Datenschutz und Datensicherheit 36(3): 149 (2012) - [j1]Jens Heider, Rachid El Khayari:
Geht Ihr Smartphone fremd? - Übersicht der Angriffsvektoren für Geräte im Unternehmenseinsatz. Datenschutz und Datensicherheit 36(3): 155-160 (2012)
2000 – 2009
- 2007
- [c3]Jens Heider, Julian Schütte:
Security made easy: Achieving user-friendly communication protection in ad-hoc situations. SECURWARE 2007: 139-144 - [c2]Jens Heider, Julian Schütte:
On Path-Centric Navigation and Search Techniques for Personal Knowledge Stored in Topic Maps. TMRA 2007: 214-225 - 2003
- [c1]Mario Hoffmann, Jens Heider, Max Larsson:
Modernes Identitäts- und Profildatenmanagement. GI Jahrestagung (2) 2003: 379-385
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 20:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint