Jörg Vieweg

Learn More
Adenocarcinoma of the prostate is the most common cancer in men. The majority of cancers are discovered once they have already metastasized, and there is no effective therapy for prostatic cancer at this stage. The use of cytokine-secreting tumor cell preparations as therapeutic vaccines for the treatment of advanced prostate cancer was investigated in the(More)
Although renal cell carcinoma has been shown to respond to immunotherapy, renal cell carcinoma-specific rejection antigens and their corresponding CTL epitopes have rarely been described. The use of dendritic cells (DCs) transfected with mRNA isolated from tumor cells may allow specific immunotherapy even in cancers for which potent rejection antigens have(More)
We have shown previously that treatment of rats bearing the Dunning R3327 MatLyLu prostatic tumor with human interleukin 2 (IL-2) gene-modified tumor cell preparations induces potent antitumor immunity in the animal. To test the clinical feasibility of using genetically modified tumor vaccines for the treatment of prostate cancer, we have explored the use(More)
In this paper we propose a novel, network-based, distributed anomaly detection framework for smart phones. Our approach is based upon the distributed collection of arbitrary, static and dynamic smart phone features. Our approach is not limited to features that can be obtained directly on a device, but also includes features that are provided by other(More)
In this paper we present an approach to add Remote Attestation capabilities to the Google Chrome OS platform. Our approach is based on the combination of two integral aspects of Chrome OS: (1) its Verified Boot procedure and (2) its extensible, app-based architecture. Verified Boot ensures the integrity of the static operating system base including(More)
1. OUR CONTRIBUTION Due to the increasing level of utilization, smartphones are commonly used in enterprise environments nowadays. This introduces new threats to such environments like mobile malware with different behavior (mostly exfiltration of user information or abuse of premium services [1]). However, there is currently no established way for an(More)