Login / Signup
Jens Heider
ORCID
Publication Activity (10 Years)
Years Active: 2003-2024
Publications (10 Years): 11
Top Topics
Reputation Information
Mobile Applications
Android Platform
Enterprise Architecture
Top Venues
EICC
ICISSP
Datenschutz und Datensicherheit
CRiSIS
</>
Publications
</>
Kris Heid
,
Jens Heider
Haven't we met before? - Detecting Device Fingerprinting Activity on Android Apps.
EICC
(2024)
Kris Heid
,
Jens Heider
,
Matthias Ritscher
,
Jan-Peter Stotz
Tracing Cryptographic Agility in Android and iOS Apps.
ICISSP
(2023)
Kris Heid
,
Vincent Andrae
,
Jens Heider
Towards detecting device fingerprinting on iOS with API function hooking.
EICC
(2023)
Kris Heid
,
Tobias Tefke
,
Jens Heider
,
Ralf C. Staudemeyer
Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective.
ICISSP
(2022)
Kris Heid
,
Jens Heider
Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws.
CRiSIS
(2022)
Paul Wagner
,
Kris Heid
,
Jens Heider
Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices.
ICISSP
(2021)
Kris Heid
,
Jens Heider
Automated, Dynamic Android App Vulnerability and Privacy Leak Analysis: Design Considerations, Required Components and Available Tools.
EICC
(2021)
Kris Heid
,
Jens Heider
,
Kasra Qasempour
Raising Security Awareness on Mobile Systems through Gamification.
EICC
(2020)
Sheikh Mahbub Habib
,
Nikolaos Alexopoulos
,
Md Monirul Islam
,
Jens Heider
,
Stephen Marsh
,
Max Mühlhäuser
Trust4App: Automating Trustworthiness Assessment of Mobile Applications.
TrustCom/BigDataSE
(2018)
Daniel Müssig
,
Robert Stricker
,
Jörg Lässig
,
Jens Heider
Highly Scalable Microservice-based Enterprise Architecture for Smart Ecosystems in Hybrid Cloud Environments.
ICEIS (3)
(2017)
Jens Heider
,
Jörg Lässig
Convergent Infrastructures for Municipalities as Connecting Platform for Climate Applications.
EnviroInfo (1)
(2016)
Steffen Bartsch
,
Bernhard J. Berger
,
Eric Bodden
,
Achim D. Brucker
,
Jens Heider
,
Mehmet Kus
,
Sönke Maseberg
,
Karsten Sohr
,
Melanie Volkamer
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
Sicherheit
(2014)
Jens Heider
Die Gretchenfrage: Wie halten Sie's mit der App-Sicherheit?
Datenschutz und Datensicherheit
38 (1) (2014)
Markus Will
,
Jörg Lässig
,
Daniel Tasche
,
Jens Heider
Regional Carbon Footprinting for Municipalities and Cities.
EnviroInfo
(2014)
Jens Heider
Das Ende der Paranoia?
Datenschutz und Datensicherheit
38 (1) (2014)
Jens Heider
,
Daniel Tasche
,
Jörg Lässig
,
Markus Will
A greenhouse gas accounting tool for regional and municipal climate change management.
SustainIT
(2013)
Jens Heider
Verantwortung: Smartphone.
Datenschutz und Datensicherheit
36 (3) (2012)
Jens Heider
,
Rachid El Khayari
Geht Ihr Smartphone fremd? - Übersicht der Angriffsvektoren für Geräte im Unternehmenseinsatz.
Datenschutz und Datensicherheit
36 (3) (2012)
Jens Heider
,
Julian Schütte
On Path-Centric Navigation and Search Techniques for Personal Knowledge Stored in Topic Maps.
TMRA
(2007)
Jens Heider
,
Julian Schütte
Security made easy: Achieving user-friendly communication protection in ad-hoc situations.
SECURWARE
(2007)
Mario Hoffmann
,
Jens Heider
,
Max Larsson
Modernes Identitäts- und Profildatenmanagement.
GI Jahrestagung (2)
(2003)