Heidelinde Hobel

Learn More
Social engineering has emerged as a serious threat in virtual communities and is an effective means to attack information systems. The services used by today’s knowledge workers prepare the ground for sophisticated social engineering attacks. The growing trend towards BYOD (bring your own device) policies and the use of online communication and(More)
The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit Internet addresses. IPv6 was invented to overcome the latter as well as to revise other drawbacks and security vulnerabilities of its predecessor IPv4. Initially considered the savior in terms of security because of its mandatory IPsec support, it turned out not to(More)
With recent improvements in data retrieval and processing, data mining, business intelligence and other empirical approaches have a vast potential for various fields of research. For results derived using empirical methods, the underlying data set should be made available, at least during the review process for the reviewers, to ensure the quality of the(More)
Social engineering has become an emerging threat in virtual communities and is an effective means to attack information systems. Today's knowledge workers make use of a number of services that leverage sophisticated social engineering attacks. Moreover, there is a trend towards <i>BYOD</i> (bring your own device) policies and the usage of online(More)
Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat. Recently, the scientific community started to propose technical approaches to mitigate the threat of unspecified and potentially malicious functionality. However, these detection and prevention mechanisms are still hardly integrated(More)
Making Geographic Information Systems (GISs) “intelligent” is a fascinating idea that has challenged the GIScience community for decades and that, over the years, has been tackled from slightly different perspectives. In this paper we discuss the case of equipping GISs with the right tools to understand and address queries posed in a natural fashion from a(More)
Many international corporations have globally distributed supply chains exposing their operations to various local risks, e.g., natural disasters. To facilitate assessment of these risks, corporations have to identify geographic locations of their suppliers. However, automated identification of supplier locations is problematic for areas where geocoding of(More)