Skip to main content

DSI Publications

Conference Proceeding

Germany after PRISM: A superpower for the information society?

Observer Research Foundation: 22–24
Journal Pages
22–24
Book Review

Die Illusion vom „sauberen Krieg“ [The illusion of "clean" war]

Internationale Politik
Subject(s)
Economics, politics and business environment
Keyword(s)
electronic warfare, revolution in military affairs, cyber security
Review of: Confront and Conceal. Obama’s Secret Wars and Surprising Use of American Power by David E. Sanger, Dirty Wars: The World Is A Battlefield by Jeremy Scahill, and The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth by Mark Mazzetti.
Journal Pages
134–137
Book Chapter

Back to basics: Beyond network hygiene

In Best practices in computer network defense: Incident detection and response, edited by Melissa E. Hathaway, 54–64. Amsterdam: Ios Press.
Felix Lindner, Sandro Gaycken (2014)
Subject(s)
Economics, politics and business environment
Secondary Title
Best practices in computer network defense: Incident detection and response
Pages
54–64
ISBN
978-1-61499-371-1
Working Paper

Resetting the system: Why high security computing should be a policy priority

EastWest Institute Discussion Paper No. 1/2014
Sandro Gaycken, Greg Austin (2014)
Subject(s)
Economics, politics and business environment
Pages
24
Book

Einführung Cybercrime [Introduction to cybercrime]

Berlin: Free University Berlin
Subject(s)
Information technology and systems
Keyword(s)
Cyber crime
Book

Einführung Cyberwar [Introduction to cyber warfare]

Berlin: Free University Berlin
Subject(s)
Information technology and systems
Keyword(s)
cyber warfare, digitalization, hacking
Conference Proceeding

Cybercrime: Bedrohung, Intervention, Abwehr

Subject(s)
Economics, politics and business environment
Journal Article

Cyber as deterrent

SpringerBriefs in Cybersecurity: 1–10
Sandro Gaycken, Maurizio Martellini (2013)
Subject(s)
Economics, politics and business environment
Keyword(s)
Data encryption, systems and data security, computer communication networks
Journal Pages
1–10
Conference Proceeding

Stealthy dopant-level hardware Trojans

Cryptographic Hardware and Embedded Systems - CHES 2013: 197–214
Georg T. Becker, Fran­ces­co Regazzoni, Chris­tof Paar, Wayne P Burleson (2013)
Subject(s)
Information technology and systems
Keyword(s)
Hardware Trojans, malicious hardware, layout modifications, Trojan side-channel
Journal Pages
197–214
Book Chapter

Freiheit und Sicherheit in der fortgeschrittenen Informationsgesellschaft

In Jenseits von 1984: Datenschutz und Überwachung in der fortgeschrittenen Informationsgesellschaft. Eine Versachlichung, edited by Sandro Gaycken, 15–28. Bielefeld: Transcript Verlag.
Subject(s)
Economics, politics and business environment
Keyword(s)
Datenschutz, Überwachung, Kultur
Secondary Title
Jenseits von 1984: Datenschutz und Überwachung in der fortgeschrittenen Informationsgesellschaft. Eine Versachlichung
Pages
15–28
ISBN
978-3-8376-2003-0