default search action
Zinaida Benenson
Person information
- affiliation: University of Erlangen-Nuremberg, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c49]Julia Wunder, Andreas Kurtz, Christian Eichenmüller, Freya Gassmann, Zinaida Benenson:
Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities. SP 2024: 1102-1121 - [i9]Julia Wunder, Alan Corona, Andreas Hammer, Zinaida Benenson:
On NVD Users' Attitudes, Experiences, Hopes and Hurdles. CoRR abs/2408.10695 (2024) - [i8]Julia Wunder, Janik Aurich, Zinaida Benenson:
From Chaos to Consistency: The Role of CSAF in Streamlining Security Advisories. CoRR abs/2408.14937 (2024) - 2023
- [c48]Lydia Weinberger, Christian Eichenmüller, Zinaida Benenson:
Interplay of Security, Privacy and Usability in Videoconferencing. CHI Extended Abstracts 2023: 185:1-185:10 - [c47]Katharina Schiller, Florian Adamsky, Zinaida Benenson:
Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks. CHI Extended Abstracts 2023: 288:1-288:15 - [c46]Franziska Bumiller, Christian Eichenmüller, Zinaida Benenson:
"You're not smart enough for it. You can't do it anyway." - Experiences and Coping Strategies of Female System Administrators. CHI Extended Abstracts 2023: 326:1-326:6 - [i7]Julia Wunder, Andreas Kurtz, Christian Eichenmüller, Freya Gassmann, Zinaida Benenson:
Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities. CoRR abs/2308.15259 (2023) - 2022
- [j7]Jan Gruber, Lena L. Voigt, Zinaida Benenson, Felix C. Freiling:
Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations. Digit. Investig. 43(Supplement): 301438 (2022) - [c45]Michael Körber, Anatoli Kalysch, Werner Massonne, Zinaida Benenson:
Usability of Antivirus Tools in a Threat Detection Scenario. SEC 2022: 306-322 - 2020
- [j6]Karen Renaud, Zinaida Benenson, Daniela Oliveira:
Balancing resistance and resilience. Netw. Secur. 2020(7): 20 (2020) - [j5]Gaston Pugliese, Christian Riess, Freya Gassmann, Zinaida Benenson:
Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective. Proc. Priv. Enhancing Technol. 2020(2): 558-577 (2020) - [c44]Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson:
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. SP 2020: 429-446 - [i6]Juan Quintero, Zinaida Benenson:
Understanding Usability and User Acceptance of Usage-Based Insurance from Users' View. CoRR abs/2011.01644 (2020)
2010 – 2019
- 2019
- [j4]Jan Schiller, Felix C. Freiling, Zinaida Benenson, Werner Massonne:
Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit. Inform. Spektrum 42(1): 38-47 (2019) - [j3]Frederik Armknecht, Zinaida Benenson, Philipp Morgner, Christian Müller, Christian Riess:
Privacy implications of room climate data. J. Comput. Secur. 27(1): 113-136 (2019) - [c43]Lena Reinfelder, Robert Landwirth, Zinaida Benenson:
Security Managers Are Not The Enemy Either. CHI 2019: 433 - [c42]Juan Quintero, Zinaida Benenson:
Understanding Usability and User Acceptance of Usage-Based Insurance from Users' View. MLMI 2019: 52-57 - [i5]Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. CoRR abs/1906.07841 (2019) - [i4]Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson:
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. CoRR abs/1906.11094 (2019) - [i3]Zinaida Benenson, Marianne Junger, Daniela Oliveira, Gianluca Stringhini:
Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302). Dagstuhl Reports 9(7): 117-154 (2019) - 2018
- [c41]Lamya Abdullah, Felix C. Freiling, Juan Quintero, Zinaida Benenson:
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing. CyberICPS/SECPRE@ESORICS 2018: 137-152 - [c40]Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson:
Malicious IoT Implants: Tampering with Serial Communication over the Internet. RAID 2018: 535-555 - [c39]Norman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix C. Freiling, Zinaida Benenson:
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently. SOUPS @ USENIX Security Symposium 2018: 341-356 - [c38]Lena Reinfelder, Andrea Schankin, Sophie Russ, Zinaida Benenson:
An Inquiry into Perception and Usage of Smartphone Permission Models. TrustBus 2018: 9-22 - [c37]Philipp Morgner, Felix C. Freiling, Zinaida Benenson:
Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products. WISEC 2018: 208-211 - [i2]Philipp Morgner, Zinaida Benenson:
Exploring Security Economics in IoT Standardization Efforts. CoRR abs/1810.12035 (2018) - 2017
- [c36]Philipp Morgner, Christian Müller, Matthias Ring, Björn M. Eskofier, Christian Riess, Frederik Armknecht, Zinaida Benenson:
Privacy Implications of Room Climate Data. ESORICS (2) 2017: 324-343 - [c35]Zinaida Benenson, Freya Gassmann, Robert Landwirth:
Unpacking Spear Phishing Susceptibility. Financial Cryptography Workshops 2017: 610-627 - [c34]Lena Reinfelder, Zinaida Benenson:
Exploring Security Processes in Organizations: the Case of Smartphones. MuC (Workshopband) 2017 - [c33]Philipp Morgner, Stephan Mattejat, Zinaida Benenson, Christian Müller, Frederik Armknecht:
Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning. WISEC 2017: 230-240 - 2016
- [c32]Johannes Sänger, Norman Hänsch, Brian Glass, Zinaida Benenson, Robert Landwirth, M. Angela Sasse:
Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces. CHI 2016: 3870-3882 - [c31]Christian Müller, Frederik Armknecht, Zinaida Benenson, Philipp Morgner:
On the security of the ZigBee Light Link touchlink commissioning procedure. Sicherheit 2016: 229-240 - [e1]Gabriele Lenzini, Giampaolo Bella, Zinaida Benenson, Carrie E. Gates:
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2016, Los Angeles, CA, USA, December 5, 2016. ACM 2016, ISBN 978-1-4503-4826-3 [contents] - [i1]Philipp Morgner, Stephan Mattejat, Zinaida Benenson:
All Your Bulbs Are Belong to Us: Investigating the Current State of Security in Connected Lighting Systems. CoRR abs/1608.03732 (2016) - 2015
- [c30]Ioannis Krontiris, Zinaida Benenson, Anna Girard, Ahmad Sabouri, Kai Rannenberg, Peter Schoo:
Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers. APF 2015: 104-123 - [c29]Zinaida Benenson, Gabriele Lenzini, Daniela Oliveira, Simon Parkin, Sven Uebelacker:
Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security. NSPW 2015: 85-99 - [c28]Zinaida Benenson, Anna Girard, Ioannis Krontiris:
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. WEIS 2015 - [p1]Yannis C. Stamatiou, Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vasiliki Liagkou, Apostolos Pyrgelis, Welderufael Tesfay:
Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust. Attribute-based Credentials for Trust 2015: 197-239 - 2014
- [c27]Norman Hänsch, Zinaida Benenson:
Specifying IT Security Awareness. DEXA Workshops 2014: 326-330 - [c26]Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, Yannis C. Stamatiou:
User Acceptance of Privacy-ABCs: An Exploratory Study. HCI (24) 2014: 375-386 - [c25]Zinaida Benenson, Anna Girard, Nadina Hintz, Andreas Luder:
Susceptibility to URL-based Internet attacks: Facebook vs. email. PerCom Workshops 2014: 604-609 - [c24]Nadina Hintz, Markus Engelberth, Zinaida Benenson, Felix C. Freiling:
Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten. Sicherheit 2014: 37-51 - [c23]Lena Reinfelder, Zinaida Benenson, Freya Gassmann:
Differences between Android and iPhone Users in Their Security and Privacy Awareness. TrustBus 2014: 156-167 - 2013
- [c22]Zinaida Benenson, Freya Gassmann, Lena Reinfelder:
Android and iOS users' differences concerning security and privacy. CHI Extended Abstracts 2013: 817-822 - 2012
- [c21]Zinaida Benenson, Olaf Kroll-Peters, Matthias Krupp:
Security feeling of mobile phone users. FedCSIS 2012: 1179-1183 - [c20]Zinaida Benenson, Olaf Kroll-Peters, Matthias Krupp:
Mentale Modelle der IT-Sicherheit bei der Nutzung mobiler Endgeräte. Sicherheit 2012: 7-24 - 2011
- [c19]Zinaida Benenson, Andreas Dewald, Hans-Georg Eßer, Felix C. Freiling, Tilo Müller, Christian Moch, Stefan Vömel, Sebastian Schinzel, Michael Spreitzenbarth, Ben Stock, Johannes Stüttgen:
Exploring the Landscape of Cybercrime. SysSec@DIMVA 2011: 71-74 - 2010
- [j2]Markus Bestehorn, Zinaida Benenson, Erik Buchmann, Marek Jawurek, Klemens Böhm, Felix C. Freiling:
Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption. Ad Hoc Sens. Wirel. Networks 9(1-2): 85-107 (2010) - [j1]Zinaida Benenson, Erik-Oliver Blaß, Felix C. Freiling:
Attacker Models for Wireless Sensor Networks (Angreifermodelle für drahtlose Sensornetze). it Inf. Technol. 52(6): 320-324 (2010)
2000 – 2009
- 2009
- [c18]Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos, Felix C. Freiling, Tassos Dimitriou:
Cooperative Intrusion Detection in Wireless Sensor Networks. EWSN 2009: 263-278 - 2008
- [b1]Zinaida Benenson:
Access control in wireless sensor networks. University of Mannheim, Germany, 2008, pp. 1-149 - [c17]Zinaida Benenson, Markus Bestehorn, Erik Buchmann, Felix C. Freiling, Marek Jawurek:
Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks. ADHOC-NOW 2008: 279-292 - 2007
- [c16]Matthias R. Brust, Adrian Andronache, Steffen Rothkugel, Zinaida Benenson:
Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks. COMSWARE 2007 - [c15]Zinaida Benenson:
Lower Bounds. Algorithms for Sensor and Ad Hoc Networks 2007: 117-130 - [c14]Zinaida Benenson, Felix C. Freiling, Peter M. Cholewinski:
Advanced Evasive Data Storage in Sensor Networks. MDM 2007: 146-151 - 2006
- [c13]Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso:
Safety, Liveness, and Information Flow: Dependability Revisited. ARCS Workshops 2006: 56-65 - [c12]Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner:
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178 - [c11]Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan:
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. ESORICS 2006: 34-48 - [c10]Andreas Achtzehn, Zinaida Benenson, Christian Rohner:
Implementing Agreement Protocols in Sensor Networks. MASS 2006: 858-863 - [c9]Zinaida Benenson, Lexi Pimenidis, Felix C. Freiling, Stefan Lucks:
Authenticated Query Flooding in Sensor Networks. PerCom Workshops 2006: 644-647 - [c8]Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis:
Authenticated Query Flooding in Sensor Networks. SEC 2006: 38-49 - [c7]Alexander Becher, Zinaida Benenson, Maximillian Dornseif:
Tampering with Motes: Real-World Attacks on Wireless Sensor Networks. Sicherheit 2006: 26-29 - [c6]Alexander Becher, Zinaida Benenson, Maximillian Dornseif:
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. SPC 2006: 104-118 - 2005
- [c5]Zinaida Benenson, Ulrich Kühn, Stefan Lucks:
Cryptographic Attack Metrics. Dependability Metrics 2005: 133-156 - [c4]Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan:
An algorithmic framework for robust access control in wireless sensor networks. EWSN 2005: 158-165 - [c3]Zinaida Benenson, Peter M. Cholewinski, Felix C. Freiling:
Simple Evasive Data Storage in Sensor Networks. IASTED PDCS 2005: 779-784 - [c2]Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan:
Secure Multi-Party Computation with Security Modules. Sicherheit 2005: 41-52 - 2004
- [c1]Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan:
User Authentication in Sensor Networks. GI Jahrestagung (2) 2004: 385-389
Coauthor Index
aka: Felix C. Gärtner
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint