Name
Papers
Collaborators
JULIAN SCHÜTTE
39
45
Citations 
PageRank 
Referers 
58
14.61
166
Referees 
References 
670
271
Search Limit
100670
Title
Citations
PageRank
Year
Towards Tracking Data Flows in Cloud Architectures00.342020
liOS: Lifting iOS Apps for Fun and Profit00.342019
Annotary: A Concolic Execution System For Developing Secure Smart Contracts20.412019
WebEye - Automated Collection of Malicious HTTP Traffic.00.342018
BDABE - Blockchain-based Distributed Attribute based Encryption.00.342018
An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space.10.352018
Practical Decentralized Attribute-Based Delegation Using Secure Name Systems00.342018
Der Trusted Connector im Industrial Data Space.00.342018
LUCON: Data Flow Control for Message-Based IoT Systems20.372018
Ordol: Obfuscation-Resilient Detection Of Libraries In Android Applications00.342017
Ariadnima — Android Component Flow Reconstruction and Visualization00.342017
A Taxonomy-Based Approach For Security In Software-Defined Networking00.342017
Practical Application-Level Dynamic Taint Analysis of Android Apps00.342017
Test-Based Cloud Service Certification Of Opportunistic Providers00.342016
A Data Usage Control System Using Dynamic Taint Tracking20.372016
Generating Threat Profiles for Cloud Service Certification Systems10.372016
Preventing Library Spoofing on Android00.342015
ConDroid: Targeted Dynamic Analysis of Android Applications100.532015
Apparecium: Revealing Data Flows in Android Applications10.342015
Preventing Library Spoofing on Android10.352015
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps50.502014
NFC? Aber sicher.00.342014
An Antivirus Api For Android Malware Recognition20.452013
A Configurable and Extensible Security Service Architecture for Smartphones10.392013
Native code execution control for attack mitigation on android70.502013
Architecting a security strategy measurement and management system20.382012
Model-Based security event management30.432012
Security Policies in Dynamic Service Compositions.10.362012
APOLLON: TOWARDS A SEMANTICALLY EXTENSIBLE POLICY FRAMEWORK00.342011
APOLLON: TOWARDS A SEMANTICALLY EXTENSIBLE POLICY FRAMEWORK00.342011
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence10.372011
Interdomain Policy Conflicts00.342010
QoS-Aware Self-adaptation of Communication Protocols in a Pervasive Service Middleware60.532010
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems.00.342010
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware70.492009
Towards Security in Decentralized Workflows20.362009
Securing Decentralized Workflows in Ambient Environments10.362008
On Path-Centric Navigation and Search Techniques for Personal Knowledge Stored in Topic Maps00.342007
Security made easy: Achieving user-friendly communication protection in ad-hoc situations00.342007