Martin Hell
YOU?
Author Swipe
View article: Soil arching in geosynthetic and steel grid-reinforced pile-supported embankments
Soil arching in geosynthetic and steel grid-reinforced pile-supported embankments Open
High-density deformation measurements were used to investigate the load distribution on, and the deformed shape of the basal reinforcement in pile-supported embankments. Two cases were analysed: a geosynthetic-reinforced (GR) embankment in…
View article: Seasonal tourism's impact on wastewater composition: Evaluating the potential of alternating activated adsorption in primary treatment
Seasonal tourism's impact on wastewater composition: Evaluating the potential of alternating activated adsorption in primary treatment Open
Primary treatment processes have gained attention in recent research and development due to their potential for redirecting carbon towards anaerobic digestion, which can subsequently be used for the production of biomethane. The alternatin…
View article: Microbial response on the first full-scale DEMON® biomass transfer for mainstream deammonification
Microbial response on the first full-scale DEMON® biomass transfer for mainstream deammonification Open
Sidestream partial nitritation and deammonification (pN/A) of high-strength ammonia wastewater is a well-established technology. Its expansion to the mainstream is, however mainly impeded by poor retention of anaerobic ammonia oxidizing ba…
View article: Security Issue Classification for Vulnerability Management with Semi-supervised Learning
Security Issue Classification for Vulnerability Management with Semi-supervised Learning Open
Open-Source Software (OSS) is increasingly common in industry software and enables developers to build better applications, at a higher pace, and with better security. These advantages also come with the cost of including vulnerabilities t…
View article: On-demand Key Distribution for Cloud Networks
On-demand Key Distribution for Cloud Networks Open
Emerging fine-grained cloud resource billing creates incentives to review the software execution footprint in virtual environments. Operators can use novel virtual execution environments with ever lower overhead: from virtual machines to c…
View article: Using Program Analysis to Identify the Use of Vulnerable Functions
Using Program Analysis to Identify the Use of Vulnerable Functions Open
Open-Source Software (OSS) is increasingly used by software applications. It allows for code reuse, but also comes with the problem of potentially being affected by the vulnerabilities that are found in the OSS libraries. With large number…
View article: Communicating Cybersecurity Vulnerability Information: A Producer-Acquirer Case Study
Communicating Cybersecurity Vulnerability Information: A Producer-Acquirer Case Study Open
View article: Issue Information
Issue Information Open
Research on constructing sponge city indicator
View article: Evaluation of the HAVOSS software process maturity model
Evaluation of the HAVOSS software process maturity model Open
The HAVOSS (Handling Vulnerabilities in OSS) maturity model describes important processes for managing security vulnerabilities in OSS modules in developed products. So far, the model has not been evaluated in any real assessment process. …
View article: Electromagnetic Side-Channel Attack on AES using Low-end Equipment
Electromagnetic Side-Channel Attack on AES using Low-end Equipment Open
Side-channel attacks on cryptographic algorithms targets the implementation of the algorithm. Information can leak from the implementation in several different ways and, in this paper, electromagnetic radiation from an FPGA is considered. …
View article: Software Evaluation of Grain-128AEAD for Embedded Platforms
Software Evaluation of Grain-128AEAD for Embedded Platforms Open
Grain-128AEAD is a stream cipher supporting authenticated encryptionwith associated data, and it is currently in round 2 of the NIST lightweight cryptostandardization process. In this paper we present and benchmark software implementations…
View article: On the Suitability of Using SGX for Secure Key Storage in the Cloud
On the Suitability of Using SGX for Secure Key Storage in the Cloud Open
View article: Automated CPE Labeling of CVE Summaries with Machine Learning
Automated CPE Labeling of CVE Summaries with Machine Learning Open
View article: Software-Defined Networking for Emergency Traffic Management in Smart Cities
Software-Defined Networking for Emergency Traffic Management in Smart Cities Open
View article: Sharing of Vulnerability Information Among Companies – A Survey of Swedish Companies
Sharing of Vulnerability Information Among Companies – A Survey of Swedish Companies Open
Software products are rarely developed from scratch and vulnerabilities in such products might reside in parts that are either open source software or provided by another organization. Hence, the total cybersecurity of a product often depe…
View article: A Recommender System for User-specific Vulnerability Scoring (full version)
A Recommender System for User-specific Vulnerability Scoring (full version) Open
With the inclusion of external software components in their software, vendors also need to identify and evaluate vulnerabilities in the components they use.A growing number of external components makes this process more time-consuming, as …
View article: Guarding the Guards: Accountable Authorities in VANETs
Guarding the Guards: Accountable Authorities in VANETs Open
In this paper we present an approach to gaining increased anonymity from authorities within a VANET. Standardization organizations and researchers working on VANETs recognize privacy as highly important. However, most research focuses on p…
View article: Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code Open
We demonstrate a tool for identifying, prioritizing and evaluating vulnerabilities in software. The tool aims to improve security in products by making maintenance more efficient and robust. Software components and release versions are mat…
View article: Havoss: A Maturity Model For Handling Vulnerabilities In Third Party Oss Components
Havoss: A Maturity Model For Handling Vulnerabilities In Third Party Oss Components Open
Security has been recognized as a leading barrier for IoT adoption. The growing number of connected devices and reported software vulnerabilities increases the importance firmware updates. Maturity models for software security do include p…
View article: Weißgrundige Keramik der Späthallstattzeit aus Salzburg
Weißgrundige Keramik der Späthallstattzeit aus Salzburg Open
-
View article: Ein neuer Tulpenbecher-Fund aus Salzburg
Ein neuer Tulpenbecher-Fund aus Salzburg Open
-
View article: Ein litzenkeramisches Gefäßbruchstück aus Salzburg
Ein litzenkeramisches Gefäßbruchstück aus Salzburg Open
-
View article: Bronzenadeln als Weihegaben in salzburgischen Mooren
Bronzenadeln als Weihegaben in salzburgischen Mooren Open
-
View article: Zur Verbreitung der altbronzezeitlichen Spangen- und Halsringbarren
Zur Verbreitung der altbronzezeitlichen Spangen- und Halsringbarren Open
-
View article: Ein neues Riegsee-Schwert aus der Saalach bei Bad Reichenhall
Ein neues Riegsee-Schwert aus der Saalach bei Bad Reichenhall Open
-
View article: HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components
HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components Open
View article: Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors
Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors Open
View article: Keltisch-norisches Kriegergrab aus Salzburg
Keltisch-norisches Kriegergrab aus Salzburg Open
-
View article: Zwei Steinäxte vom Kamme der Ostalpen
Zwei Steinäxte vom Kamme der Ostalpen Open
-
View article: Tongefäße aus dem Grabfeld von Hallstatt
Tongefäße aus dem Grabfeld von Hallstatt Open
-