Lothar Fritsch

Bilde av Lothar Fritsch
English version of this page
Mobiltelefon +47 96885758
Brukernavn
Besøksadresse Gaustadalléen 23B 0373 Oslo
Postadresse Postboks 1080 0316 Oslo

Vennligst se på min side på min engelsk side for mer informasjon.Der er det også mer informasjon om mina ytteligere publikasjoner utenfor Cristin-databasen. 

Publikasjoner

  • Fritsch, Lothar; Alzarqawee, Aws Naser Jaber & Yazidi, Anis (2023). An overview of artificial intelligence used in malware. I Zouganeli, Evi; Yazidi, Anis; Mello, Gustavo Borges Moreno E & Lind, Pedro (Red.), Nordic Artificial Intelligence Research and Development: 4th Symposium of the Norwegian AI Society, NAIS 2022, Oslo, Norway, May 31-June 1, 2022, Revised Selected Papers. Springer Nature. ISSN 9783031170294.
  • Alzarqawee, Aws Naser Jaber & Fritsch, Lothar (2023). Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators. I Leonard, Barolli (Red.), Advances on P2P, Parallel, Grid, Cloud and Internet Computing Proceedings of the 17th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2022). Springer. ISSN 978-3-031-19945-5. s. 249–257. doi: https%3A/doi.org/10.1007/978-3-031-19945-5_25.
  • Wairimu, Samuel & Fritsch, Lothar (2022). Modelling privacy harms of compromised personal medical data - beyond data breach, ARES 2022: The 17th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM). ISSN 978-1-4503-9670-7. s. 1–9. doi: 10.1145/3538969.3544462.
  • Fritsch, Lothar; Mecaliff, Marie; Opdal, Kathinka; Rundgreen, Mathias & Sachse, Toril S. (2022). Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacks. I Roßnagel, Heiko; Schunk, Christian H. & Mödersheim, Sebastian (Red.), Open Identity Summit 2022, LNI Volume P325. Gesellschaft für Informatik. ISSN 978-3-88579-719-7. s. 15–26. doi: 10.18420/OID2022_01.
  • Naser Jaber, Aws; Fritsch, Lothar & Haugerud, Hårek (2022). Improving Phishing Detection with the Grey Wolf Optimizer , 2022 International Conference on Electronics, Information, and Communication (ICEIC 2022) . IEEE (Institute of Electrical and Electronics Engineers). ISSN 9781665409353. doi: 10.1109/ICEIC54506.2022.9748592.
  • Nordin, Anna; Ängeby, Karin & Fritsch, Lothar (2022). Body-Area Sensing in Maternity Care: Evaluation of Commercial Wristbands for Pre-birth Stress Management. I Ur Rehman, Masood & Zoha, Ahmed (Red.), Body Area Networks. Smart IoT and Big Data for Intelligent Health Management. 16th EAI International Conference, BODYNETS 2021, Virtual Event, October 25-26, 2021, Proceedings. Springer International Publishing. ISSN 978-3-030-95592-2. doi: https%3A/doi.org/10.1007/978-3-030-95593-9_14.
  • Alzarqawee, Aws Naser Jaber & Fritsch, Lothar (2021). COVID-19 and Global Increases in Cybersecurity Attacks: Review of Possible Adverse Artificial Intelligence Attacks. I Jiamset, Keerapat; Kamolphiwong, Sinchai; Pongbangpho, Supakorn & Cheawsuwan, Thitirath (Red.), 25th International Computer Science and Engineering Conference (ICSEC). IEEE (Institute of Electrical and Electronics Engineers). ISSN 978-1-6654-1197-4. s. 434–442. doi: 10.1109/ICSEC53205.2021.9684603.
  • Bisztray, Tamas; Gruschka, Nils; Bourlai, Thirimachos & Fritsch, Lothar (2021). Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks. I Brömme, Arslan; Busch, Christoph; Damer, Naser; Dantcheva, Antitza; Gomez-Barrero, Marta; Raja, Kiran; Rathgeb, Christian; Sequeira, Ana F. & Uhl, Andreas (Red.), Proceedings of the 20th International Conference of the Biometrics Special Interest Group (BIOSIG2021). Gesellschaft für Informatik. ISSN 978-1-6654-2693-0. s. 81–90.
  • Zibuschka, Jan & Fritsch, Lothar (2021). Mapping Identity Management in Data Lakes. I Roßnagel, Heiko; Schunk, Christian & Mödersheim, Sebastian (Red.), Open Identity Summit 2021 Proceedings. Gesellschaft für Informatik. ISSN 978-3-88579-706-7.
  • Fritsch, Lothar & Gruschka, Nils (2021). Extraction and Accumulation of Identity Attributes from the Internet of Things. I Roßnagel, Heiko; Schunk, Christian & Mödersheim, Sebastian (Red.), Open Identity Summit 2021 Proceedings. Gesellschaft für Informatik. ISSN 978-3-88579-706-7. Fulltekst i vitenarkiv
  • Hatamian, Majid; Wairimu, Samuel; Momen, Nurul & Fritsch, Lothar (2021). A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. Empirical Software Engineering. ISSN 1382-3256. 26. doi: 10.1007/s10664-020-09934-4.
  • Bisztray, Tamas; Gruschka, Nils; Mavroeidis, Vasileios & Fritsch, Lothar (2020). Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics. I Roßnagel, Heiko; Schunck, Christian H.; Mödersheim, Sebastian & Hühnlein, Detlef (Red.), Open Identity Summit 2020. Gesellschaft für Informatik. ISSN 978-3-88579-699-2. s. 185–192. doi: 10.18420/ois2020_17.
  • Momen, Nurul & Fritsch, Lothar (2020). App-generated digital identities extracted through Android permission-based data access - a survey of app privacy, Sicherheit 2020, Sicherheit, Schutz und Zuverlässigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Springer Berlin/Heidelberg. ISSN 978-3-88579-695-4. s. 15–28. doi: 10.18420/sicherheit2020_01.
  • Momen, Nurul; Hatamian, Majid & Fritsch, Lothar (2019). Did App Privacy Improve After the GDPR? IEEE Security and Privacy. ISSN 1540-7993. doi: 10.1109/MSEC.2019.2938445.
  • Fritsch, Lothar (2018). How Big Data helps SDN with data protection and privacy. I Taheri, Javid (Red.), Big Data and Software Defined Networks. The Institution of Engineering and Technology. ISSN 978-1-78561-304-3. s. 339–351.
  • Schulz, Trenton & Fritsch, Lothar (2014). Accessibility and Inclusion Requirements for Future e-Identity Solutions. I Miesenberger, Klaus; Fels, Deborah; Archambault, Dominique; Peňáz, Petr & Zagler, Wolfgang (Red.), Computers Helping People with Special Needs - Proceedings of the 14th International Conference, ICCHP 2014, Paris, France, July 9-11, 2014; Bind 2. Springer Lecture Notes on Computer Science (LNCS) 8648. Springer. ISSN 978-3-319-08598-2. s. 316–323. doi: 10.1007/978-3-319-08596-8_50.
  • Schulz, Trenton & Fritsch, Lothar (2013). Identifying Trust Strategies in the Internet of Things. I Schulz, Trenton (Red.), Proceedings of the User-Centered Trust in Interactive Systems Workshop: a Workshop from NordiCHI 2012. Norwegian Computing Center. ISSN 978-82-539-0538-9. s. 19–23.
  • Paintsil, Ebenezer & Fritsch, Lothar (2013). Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets. I Furnell, Steven; Lambrinoudakis, Costas & Lopez, Javier (Red.), Trust, Privacy, and Security in Digital Business. Springer. ISSN 978-3-642-40342-2. s. 48–61. doi: 10.1007/978-3-642-40343-9_5.
  • Røssvoll, Till Halbach & Fritsch, Lothar (2013). Trustworthy and Inclusive Identity Management for Applications in Social Media. I Kurosu, Masaaki (Red.), Human-Computer Interaction. Users and Contexts of Use. Springer. ISSN 978-3-642-39264-1. s. 68–77. doi: 10.1007/978-3-642-39265-8_8.
  • Røssvoll, Till Halbach & Fritsch, Lothar (2013). Reducing the User Burden of Identity Management: A Prototype Based Case Study for a Social-Media Payment Application. I Miller, Leslie (Red.), ACHI 2013, The Sixth International Conference on Advances in Computer-Human Interactions. IARIA. ISSN 978-1-61208-250-9. s. 364–370.
  • Paintsil, Ebenezer & Fritsch, Lothar (2013). Executable Model-Based Risk Assessment Method for Identity Management Systems. I Fischer-Hübner, Simone; Leeuw, Elisabeth de & Mitchell, Chris (Red.), Policies and Research in Identity Management. Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Springer. ISSN 978-3-642-37282-7. s. 97–99. doi: 10.1007/978-3-642-37282-7_8.
  • Zibuschka, Jan & Fritsch, Lothar (2012). A hybrid approach for highly available & secure storage of pseudo-SSO credentials. I Jøsang, Audun & Carlsson, Bengt (Red.), Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 – November 2, 2012. Proceedings. Springer. ISSN 978-3-642-34209-7. s. 169–183. doi: 10.1007/978-3-642-34210-3_12.
  • Kohlweiss, Markulf & Fritsch, Lothar (2012). Privatsphäre trotz intelligenter Zähler. digma - Zeitschrift für Datenrecht und Informationssicherheit. ISSN 1424-9944. 12(1), s. 22–26.
  • Fritsch, Lothar; Groven, Arne-Kristian & Schulz, Trenton (2012). On the Internet of Things, Trust is Relative. Communications in Computer and Information Science. ISSN 1865-0929. 277, s. 267–273. doi: 10.1007/978-3-642-31479-7_46.
  • Paintsil, Ebenezer & Fritsch, Lothar (2011). Taxonomy of Privacy and Security Risks Contributing Factors. I Fischer-Hübner, Simone; Duquenoy, Penny; Hansen, Marit; Leenes, Ronald & Zhang, Ge (Red.), Privacy and Identity Management for Life. 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers. Springer. ISSN 9783642207686. s. 52–63.
  • Paintsil, Ebenezer & Fritsch, Lothar (2011). A Taxonomy of Privacy and Security Risks Contributing Factors. IFIP Advances in Information and Communication Technology. ISSN 1868-4238. 352, s. 52–63. doi: 10.1007/978-3-642-20769-3_5.
  • Paintsil, Ebenezer & Fritsch, Lothar (2011). Towards Legal Privacy Risk Assessment Automation in Social Media, INFORMATIK 2011 - Informatik schafft Communities. Gesellschaft für Informatik. ISSN 978-3-88579-286-4.
  • Fritsch, Lothar (2011). Security and privacy engineering for corporate use of social community platforms, INFORMATIK 2011 - Informatik schafft Communities. Gesellschaft für Informatik. ISSN 978-3-88579-286-4.
  • Scherner, Tobias & Fritsch, Lothar (2011). Technology Assurance, Digital Privacy. Springer. ISSN 978-3-642-19049-0. s. 597–608.
  • Solheim, Ivar; Dale, Øystein; Fritsch, Lothar; Røssvoll, Till Halbach; Holmqvist, Knut & Tjøstheim, Ingvar (2010). Search and navigation as retrieval strategies in large photo collections. I Doherty, Aiden R.; Gurrin, Cathal; Jones, Gareth J.F. & Smeaton, Alan F. (Red.), Proceedings of the Information Access for Personal Media Archives Workshop (IAPMA2010). Milton Keynes. ISSN 1872327869.
  • Jøsang, Audun; Fritsch, Lothar & Mahler, Tobias (2010). Privacy Policy Referencing. Lecture Notes in Computer Science (LNCS). ISSN 0302-9743. 6264, s. 129–140.
  • Fritsch, Lothar; Fuglerud, Kristin Skeide & Solheim, Ivar (2010). Towards Inclusive Identity Management. Identity in the Information Society. ISSN 1876-0678. 3(3), s. 515–538. doi: 10.1007/s12394-010-0075-6. Fulltekst i vitenarkiv
  • Jøsang, Audun; Fritsch, Lothar & Mahler, Tobias (2010). Privacy Policy Referencing. I Katsikas, Sokratis K.; Lopez, Javier & Soriano, Miguel (Red.), TrustBus, Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings, Lecture Notes in Computer Science 6264. Springer. ISSN 978-3-642-15151-4.
  • Fritsch, Lothar (2009). Business risks from naive use of RFID in tracking, tracing and logistics. I Wissendheit, U & Hollstein, T (Red.), RFID SysTech 2009 - ITG Fachbericht 216. VDE Verlag GmbH. ISSN 978-3-8007-3168-8.
  • Fritsch, Lothar; Groven, Arne-Kristian & Strand, Lars Kristoffer (2009). A holistic approach to Open-Source VoIP security: Preliminary results from the EUX2010SEC project. I Bestak, Robert; Laurent, George; Zaborovsky, Vladimir S. & Dini, Cosmin (Red.), Proceedings of the The Eighth International Conference on Networks (ICN) 2009. International Academy, Research and Industry Association (IARIA). ISSN 978-0-7695-3552-4. s. 275–280 .

Se alle arbeider i Cristin

  • de Leeuw, Elisabeth; Fischer-Hübner, Simone & Fritsch, Lothar (2010). Second IFIP WG 11.6 Working Conference, IDMAN 2010. Springer. ISBN 978-3-642-17302-8. 145 s.

Se alle arbeider i Cristin

  • Øye, Olav-Johan & Fritsch, Lothar (2022). Slik kan du unngå dataangrep . [Fagblad]. Forskning.no.
  • Ellen Synnøve, Viseth; Fritsch, Lothar & Marques, Nuno (2022). Anklager NSM for å senke terskelen for diskriminering mot russere . [Fagblad]. Teknisk Ukeblad.
  • Fritsch, Lothar & Julie, Solvin Jacobsen (2022). Hva er hacking? Viten + Snakkis podcast @ OsloMet. [Internett]. Vitenogsnakkis.oslomet.no.
  • Hegnar, Emma Victoria; Brustad, Emilie & Fritsch, Lothar (2022). Ekspert om hackerangrepet: - Kan ha vært en avledningsmanøver. [Avis]. Dagbladet.
  • Fritsch, Lothar (2021). Battlefield of cyber weapons - The future war of connected smart things and algorithms.
  • Fritsch, Lothar (2021). Perspectives on Source Protection - Privacy risk .
  • Tilman, Baumgärtel & Fritsch, Lothar (2021). Piazza virtuale ion the Internet - Interview with Lothar Fritsch, 18.03.2019. [Internett]. https://vangoghtv.hs-mainz.de/?portfolio=piazza-virtuale-onl.
  • Zibuschka, Jan & Fritsch, Lothar (2021). Mapping Identity Management in Data Lakes.
  • Fritsch, Lothar; Tjøstheim, Ingvar & Kitkowska, Agnieszka (2018). I’m Not That Old Yet! The Elderly and Us in HCI and Assistive Technology.
  • Fritsch, Lothar (2015). Information privacy: Technology, principles, and challenges .
  • Fritsch, Lothar (2014). Management of Privacy Risks in Information Systems.
  • Fritsch, Lothar (2014). Big Data - Implikasjoner for bedriftens strategi og sikkerhet.
  • Fritsch, Lothar (2014). Innovasjoner innen trygge og personvernsøkende elektroniske identiteter fra forskning - Research innovations in information security and privacy in electronic identity management.
  • Fritsch, Lothar (2014). E-ID, Sosiale Medier,industristandarder- nytteverdi og risiko. Innføring i populære e-ID-systemer.
  • Fritsch, Lothar (2014). The metered self vs. managed healthcare IoT - a reality check.
  • Fritsch, Lothar (2014). Helsedata, e-helse, IKT og personvern - hvor oppstår og lagres det helsedata?
  • Grønli, Kristen Straumsheim; Hellman, Riitta; Fuglerud, Kristin Skeide & Fritsch, Lothar (2014). Snart kan passordene bestå av lyder, bilder og mønster - Norske forskere vil gjøre nett-tjenester tilgjengelig for alle. [Internett]. Teknisk Ukeblad.
  • Grønli, Kristin Straumsheim; Fritsch, Lothar; Hellman, Riitta & Fuglerud, Kristin Skeide (2014). Utestengt fra nettjenester. [Internett]. Forsnkningsrådet.no.
  • Fritsch, Lothar; Grønli, Kristen Straumsheim & Snekkenes, Einar (2014). Identifisering uten hamstring av persondata. [Internett]. Forskningsrådet.no.
  • Fritsch, Lothar; Grønli, Christin Straumsheim & Snekkenes, Einar (2014). Vi gir for mye info om oss selv på nett. [Internett]. Forskning.no.
  • Fritsch, Lothar (2013). The Clean Privacy Ecosystem of the Future Internet. Future Internet. ISSN 1999-5903. 5(1), s. 34–45. doi: 10.3390/fi5010034.
  • Schulz, Trenton & Fritsch, Lothar (2012). Identifying Trust Strategies in the Internet of Things.
  • Fritsch, Lothar (2012). Scientific Writing and Publishing - An introduction for new PhD students at NR. A course on writing guidlines, publication channels, and program committees as part of your publication strategy.
  • Roßnagel, Heiko; Camenisch, Jan; Fritsch, Lothar; Houdeau, Detlef; Hühnlein, Detlef & Lehmann, Anja [Vis alle 8 forfattere av denne artikkelen] (2012). FutureID – Shaping the Future of Electronic Identity.
  • Fritsch, Lothar (2012). Trust and Privacy in the Internet of Things in the User’s View - Keynote talk on "Future Trends and Challenges" track.
  • Fritsch, Lothar (2012). Undesirable side effects: From NFC to IoT.
  • Fritsch, Lothar (2011). Identifisering, Autentisering, Autorisering - Identifisering, Autentisering, Autorisering.
  • Fritsch, Lothar (2011). Motbør for mobilbillett - Intervjuet av Bjørn Egil Halvorsen. Ukjent.
  • Hagalisletto, Anders Moen & Fritsch, Lothar (2011). Mobilnett-kollapsen: Vi må leve med risikoen (kronikk). Ukjent.
  • Fritsch, Lothar (2011). Management of Privacy Risks in Information Systems.
  • Fritsch, Lothar (2011). Privacy and Regulatory Requirements.
  • Fritsch, Lothar (2011). Sikkerhet og Personvern i Sosiale Medier - Utfordringer i bedriftens IKT-strategi.
  • Fritsch, Lothar (2011). Information Security in Social Media - Challenges for Corporate IT strategy.
  • Hagalisletto, Anders Moen & Fritsch, Lothar (2011). Mobilnett-kollapsen: Vi må leve med risikoen. Forskning.no. ISSN 1891-635X.
  • Fritsch, Lothar (2011). Economics of Cybersecurity - Economic perspectives on Information Security.
  • Fritsch, Lothar (2011). Motbør for mobilbillett. [Avis]. Aften.
  • Fritsch, Lothar (2011). Eliteskrekk. [Avis]. Dagens Næringsliv.
  • Fritsch, Lothar (2011). Identifisering, Autentisering, Autorisering - forskjeller og implikasjoner i e-ID-anvendelser.
  • Skomedal, Åsmund & Fritsch, Lothar (2010). Høringsuttalelse Cybersikkerhet. Ukjent.
  • Fritsch, Lothar (2010). Nettverksbygging og tverrfaglighet med EU ”Network of Excellence”.
  • Fritsch, Lothar; Toresson, Ludwig; Shaker, Maher & Olars, Sebastian (2020). Privacy impact self-assessment app. Karlstads Universitet.
  • Tjøstheim, Ingvar; Leister, Wolfgang; Mork, Heidi Camilla & Fritsch, Lothar (2016). Research Directions for Studying Users’ Privacy Awareness. Norsk Regnesentral.
  • Fritsch, Lothar & Abie, Habtamu (2013). 2nd PETweb II & ASSET joint PhD Seminar. Norsk Regnesentral.
  • Schulz, Trenton; Fritsch, Lothar; Schlehahn, Eva; Hansen, Marit & Zwingelberg, Harald (2013). FutureID Deliverable D22.7 Accessibility and Inclusion Requirements. Norsk Regnesentral.
  • Fritsch, Lothar & Snekkenes, Einar (2013). Alternative Approaches to Privacy Risk Assessment: Summary of the PETweb II VERDIKT project sponsored by the Research Council of Norway (2009-2013). Norsk Regnesentral. ISSN 978-82-539-0539-6. 1(1029).
  • Paintsil, Ebenezer; Fritsch, Lothar & Snekkenes, Einar (2013). Privacy and Security Risks Analysis of Identity Management Systems. Gjøvik University College. ISSN 978-82-93269-23-6. 1(1-2013).
  • Fritsch, Lothar (2012). Privacy visualization requirements in the Internet of Things - A uTRUSTit FP7 ICT project note, 7.9.2012. Norsk Regnesentral.
  • Fritsch, Lothar (2012). Documentation of the 3rd PETweb II PhD student workshop - Joint PhD student workshop of the VERDIKT PETweb II and ASSET projects in Gjøvik, 13.9.2012. Norsk Regnesentral.
  • Fritsch, Lothar (2012). Documentation of the 2nd PETweb II PhD student workshop - 2-day PhD student workshop of the VERDIKT PETweb II projects in Rømskog, 19.3.2012. Norsk Regnesentral.
  • Fritsch, Lothar (2011). Utprøving av Buypass e-ID og Altinn.no - Resultat av smartkort-studie i e-Me prosjekt. Norsk Regnesentral.
  • Fritsch, Lothar (2011). Social Media, e-ID and Privacy - Background for the e-Me project. Norsk Regnesentral.
  • Fritsch, Lothar (2011). Social Media, e-ID and Privacy - Background for the e-Me project. Norsk Regnesentral.
  • Fritsch, Lothar (2011). Utprøving av Buypass e-ID og Altinn.no - Resultat av smartkort-studie i e-Me prosjekt. Norsk Regnesentral.
  • Schulz, Trenton; Fritsch, Lothar; Solheim, Ivar; Tjøstheim, Ingvar; Petró, Dániel & Arfwedson, Henrik [Vis alle 7 forfattere av denne artikkelen] (2011). uTRUSTit Deliverable D2.2 Definition of User Scenarios. Norwegian Computing Center.
  • Fritsch, Lothar & Fuglerud, Kristin Skeide (2010). Time and Usability as Upper Boundary in Friend and Family Security and Privacy. Norsk Regnesentral.
  • Fritsch, Lothar & Paintsil, Ebenezer (2010). 1st PhD retreat documentation - Minutes of the PETweb II PhD workshop, April 15-16, 2010. Norsk Regnesentral.

Se alle arbeider i Cristin

Publisert 2. des. 2019 14:53 - Sist endret 11. des. 2019 14:23