Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2020Closing the Gap of Creating Design Concepts for DSS by Applying the Situation Awareness Oriented Design Principles
Dalinger, Elena; Feiser, Daniel
Conference Paper
2019Affective Content Classification using Convolutional Neural Networks
Claeser, Daniel
Conference Paper
2019An approach for solving real-time and synchronization issues in heterogeneous multi-processor software defined systems
Troll, P.; Buchin, B.; Fazel, K.; Adrat, M.
Conference Paper
2019Ergonomische Gestaltung adaptierbarer Mensch-Computer-Interfaces für die Interaktion beim Gehen
Conradi, Jessica
Dissertation
2019Forschungsbeiträge für eine smarte Führungsunterstützung im 21. Jahrhundert: Neuronale Netze und Machine Learning für Advanced Data Analytics
Geppert, Hanna; Gerz, Michael; Kurth, Frank
Journal Article
2019Joining the blunt and the pointy end of the spear: Towards a common framework of joint action, human-machine cooperation, cooperative guidance and control, shared, traded and supervisory control
Flemisch, F.; Abbink, D.A.; Itoh, M.; Pacaux-Lemoine, M.-P.; Weßel, G.
Journal Article
2019Joint Registration and Fusion of an Infra-Red Camera and Scanning Radar in a Maritime Context
Cormack, D.; Schlangen, I.; Hopgood, J.R.; Clark, D.E.
Journal Article
2019KoGra-R: Standardisierte statistische Auswertung von Korpusrecherchen
Hansen-Morath, Sandra; Schmitz, Hans-Christian; Schneider, Roman; Wolfer, Sascha
Book Article
2019LEO: Liquid Exploration Online
Höller, Frank; Javier Garcia Rosas, Francisco; Schulz, Dirk; Arya, Devvrat
Conference Paper
2019Linear time Fourier transforms of Sn-k-invariant functions on the symmetric group Sn
Clausen, M.
Journal Article
2019On the duality between belief networks and feed-forward neural networks
Baggenstoss, Paul
Journal Article
2019Recent Advancements in Digital Forensics, Pt.2
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen
Journal Article
2019Situational awareness, information exchange and operational control for civilian EU missions
Schmitz, Hans-Christian; Deneckere, Matthias; De Zan, Tommaso; Gräther, Wolfgang
Journal Article
2019Spline-based Robot Trajectory Generation using the Dynamic Window Approach
Demir, Baran; Höller, Frank; Garcia Rosas, Francisco; Schulz, Dirk; Goerke, Nils
Conference Paper
2019Tracking von Objektgruppen und ausgedehnten Zielobjekten
Feldmann, Michael
: Hanebeck, U.D.
Dissertation
2019Wir sind eine nette Gesellschaft
Schade, Ulrich; Seitz, Josef
Journal Article
201810 Jahre AFCEA Bonn e.V. Studienpreis
Wunder, Michael
Book Article
2018Accurately capturing speech feature distributions by extending supervectors for robust speaker recognition
Wilkinghoff, Kevin
Conference Paper
2018Acoustic event classification using multi-resolution HMM
Baggenstoss, Paul
Conference Paper
2018AFCEA 2018. Fraunhofer FKIE
 
Book
2018AI research in the context of security
Schade, Ulrich; Kurth, Frank
Book Article
2018Anmerkungen zu KI im militärischen Bereich
Schade, Ulrich
Journal Article
2018Anmerkungen zu KI-Anwendungen
Schade, Ulrich
Journal Article
2018Anwendungen der Künstlichen Intelligenz in der einsatzbezogenen IT
Gerz, Michael
Book Article
2018Application of IoT in military operations in a smart city
Johnsen, Frank T.; Zielinski, Zbigniew; Wrona, Konrad; Suri, Niranjan; Fuchs, Christoph; Pradhan, Manas; Furtak, Janusz; Vasilache, Bogdan; Pellegrini, Vincenzo; Dyk, Michał; Marks, Michał; Krzyszton, Mateusz
Conference Paper
2018An approach to measurement-based tactical radio modeling and real time emulation
Barz, C.; Fuchs, C.; Kirchhoff, J.; Krzyzek, M.; Brück, N.
Conference Paper
2018Assessment of cognitive radio networks through military capability development viewpoint
Tuukkanen, Topi; Couturier, Stefan; Buchin, Boyd; Bräysy, Timo; Krygier, Jaroslaw; Verheul, Erik; Nir, Vincent le; Smit, Niels
Conference Paper
2018Assistenzsystem zu Ähnlichkeiten in Programmen zur Unterstützung von Täterattributen bei Malware
Zwanger, Viviane
Book Article
2018Auswertung von Social Media
Schade, Ulrich
Book Article
2018Bedeutung von KI und Big Data für die NATO Science & Technology Organization
Wunder, Michael
Book Article
2018Behaviour adaptation using interaction patterns with augmented reality elements
Baltzer, M.C.A.; Lassen, C.; Lopez, D.; Flemisch, F.
Conference Paper
2018Beyond Moments: Extending the Maximum Entropy Principle to Feature Distribution Constraints
Baggenstoss, P.M.
Journal Article
2018Beyond Situation Awareness: Considerations for Sense-Making in Complex Intelligence Operations
Rein, K.; Biermann, J.
Conference Paper
2018Bit-interleaved polar coded modulation with iterative decoding
Saha, S.; Tschauner, M.; Adrat, M.; Schmitz, T.; Jax, P.; Vary, P.
Conference Paper
2018A classify-while-track approach using dynamical tensors
Govaers, F.
Conference Paper
2018Click & Grasp: Assistiertes Greifen beliebiger Objekte mittels Robot Vision
Schulz, Dirk
Book Article
2018A cloud-based architecture for an interoperable, resilient, and scalable C2 information system
Bau, Nico; Endres, Sven; Gerz, Michael; Gökgöz, Fahrettin
Conference Paper
2018Consolidating principles and patterns for human-centred usable security research and development
Lo Iacono, L.; Smith, Matthew; Zezschwitz, Emanuel von; Gorski, Peter Leo; Nehren, Peter
Conference Paper
2018Cyber defence: Visualizing and analyzing netflow log-files
Winkelholz, Carsten
Report
2018Cyber Security of Smart Buildings
Wendzel, Steffen; Tonejc, Jernej; Kaur, Jaspreet; Kobekova, Alexandra
Book Article
2018Deception Task Design in Developer Password Studies: Exploring a Student Sample
Naiakshina, Alena; Danilova, Anastasia; Tiefenau, Christian; Smith, Matthew
Conference Paper
2018Deep Learning zur Erschließung von Massendaten für die signalbasierte Aufklärung
Kurth, Frank
Book Article
2018Detection of covert channels in TCP retransmissions
Zillien, Sebastian; Wendzel, Steffen
Conference Paper
2018Distinguishing Wanted and Unwanted Targets Using Point Processes
Schlangen, I.; Degen, C.; Charlish, A.
Conference Paper
2018Einsatz von Virtual Reality zur Immersionssteigerung für Hubschrauberbesatzungen - Eine empirische Vorstudie
Kaufeld, Mara; Alexander, Thomas
Conference Paper
2018Emerging and unconventional: New attacks and innovative detection techniques. Editorial
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian
Journal Article
2018End-to-end optimization for tactical cognitive radio networks
Couturier, Stefan; Bräysy, Timo; Buchin, Boyd; Krygier, Jaroslaw; Nir, Vincent le; Smit, Niels; Tuukkanen, Topi; Verheul, Erik
Conference Paper
2018Entscheidungsunterstützung zur Bewertung von Domänen
Albertsson, Tobias
Book Article
2018Evaluation of decision making processes in critical situations
Fromm, L.; Zerbes, G.; Plegge, C.; Alexander, T.
Conference Paper
2018Exploiting smart city IoT for disaster recovery operations
Suri, N.; Zielinski, Z.; Tortonesi, M.; Fuchs, C.; Pradhan, M.; Wrona, K.; Furtak, J.; Vasilache, D.B.; Street, M.; Pellegrini, V.; Benincasa, G.; Morelli, A.; Stefanelli, C.; Casini, E.; Dyk, M.
Conference Paper
2018FKIE - verlässlicher Partner im Hintergrund
Martini, Peter
Journal Article
2018Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit
Hilgert, Jan-Niclas; Lambertz, Martin; Yang, Shuijan
Journal Article, Conference Paper
2018From situation awareness to intelligence: Increasing complexity in fusion models for sense-making
Krenc, Ksawery; Nimier, Vincent; Rein, Kellyn; Snidaro, Lauro; Biermann, Joachim; García, Jesús
Conference Paper
2018Fused Single Sensor Emitter Localization Using Time-Multiplex AOA and S4TDOA Measurements
Steffes, Christian; Allmann, Clemens; Oispuu, Marc
Conference Paper
2018Gathering and analyzing identity leaks for a proactive warning of affected users
Malderle, Timo; Wübbeling, Matthias; Knauer, Sven; Meier, Michael
Conference Paper
2018Gaussian Mixture Based Target Tracking Combining Bearing-Only Measurements and Contextual Information
Ulmke, M.; Govaers, F.
Conference Paper
2018A general approach to health monitoring & fault diagnosis of unmanned ground vehicles
Youssef, Mahmoud Youssef; Ota, Daniel
Conference Paper
2018General-Purpose Audio Tagging by Ensembling Convolutional Neural Networks based on Multiple Features
Wilkighoff, Kevin
Conference Paper
2018Generating natural language texts
Bense, Hermann; Schade, Ulrich; Dembach, Michael
Book Article
2018Gesture-based vehicle control in partially and highly automated driving for impaired and non-impaired vehicle operators: A pilot study
Meyer, R.; Spee, R. von; Altendorf, E.; Flemisch, F.O.
Conference Paper
2018Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research
Wendzel, Steffen
Conference Paper
2018Grand defence-technological challenges for Europe post-2020
: Beyerer, Jürgen (Editor); Martini, Peter (Editor)
Report
2018Handling vulnerabilities with mobile agents in order to consider the delay and disruption tolerant characteristic of military networks
Aurisch, T.; Jacke, A.
Conference Paper
2018Hunting observable objects for indication of compromise
Sykosch, Arnold; Ohm, Marc; Meier, Michael
Conference Paper
2018IMU based gesture recognition for mobile robot control using Online Lazy Neighborhood Graph search
Kulkarni, P.; Illing, B.; Gaspers, B.; Brüggemann, B.; Schulz, D.
Conference Paper
2018Information hiding. Challenges for forensic experts
Mazurczyk, Wojciech; Wendzel, Steffen
Journal Article
2018Informationsüberlegenheit durch taktisches Manned-Unmanned Teaming
Lassen, Christian
Journal Article
2018Introduction to semantic applications
Bartussek, Wolfram; Bense, Hermann; Hoppe, Thomas; Humm, Bernhard G.; Reibold, Anatol; Schade, Ulrich; Siegel, Melanie; Walsh, Paul
Book Article
2018IT-Sicherheit für TCP/IP- und IoT-Netzwerke
Wendzel, Steffen
Book
2018KI im Einsatz-Advanced Analytics & Machine Learning für sicherheitskritische Anwendungen
Martini, Peter
Book Article
2018KI-Forschung im Sicherheitskontext
Schade, Ulrich; Kurth, Frank
Book Article
2018Knowledge based anomaly detection for ground moving targets
Katsilieris, F.; Charlish, A.
Conference Paper
2018Kognitive Modelle für die Gestaltung und Entwicklung von Benutzungsschnittstellen
Winkelholz, Carsten
Book Article
2018Konzeption eines Systems zur netzwerkgestützten Ausbildung mit Mixed Reality Technologien
Ripkens, A.; Alexander, T.
Conference Paper
2018Kooperative Automation und Fernsteuerbarkeit von landgestützten Waffensystemen
Baltzer, Marcel; Bielecki, Konrad; Flemisch, Frank
Book Article
2018Künstliche Intelligenz im wehrtechnischen Umfeld - eine kritische Reflexion
Govaers, Felix
Book Article
2018Künstliche Intelligenz und der Faktor Mensch
Alexander, Thomas
Book Article
2018Learning from the best - naturalistic arbitration for cooperative driving
Weßel, G.; Schreck, C.; Altendorf, E.; Canpolat, Y.; Flemisch, F.
Conference Paper
2018Life-long privacy in the IoT? Measuring privacy attitudes throughout the life-cycle of IoT devices
Railean, A.; Reinhardt, D.
Conference Paper
2018Linear Subspaces of the Appearance Space
Mylo, M.; Klein, R.
Journal Article
2018Measuring the coverage of requirements through enterprise architecture models
Apelt, S.; Geppert, H.; Hasso, H.; Kudla, T.
Conference Paper
2018Modular verification and validation for NATO generic vehicle architecture-based land platforms
Ota, Daniel; Pradhan, Manas
Conference Paper
2018Multilingual named entity recognition on spanish-english code-switched tweets using support vector machines
Claeser, Daniel; Kent, Samantha; Felske, Dennis
Conference Paper
2018Multisensor Data Fusion for UAV Detection and Tracking
Jovanoska, S.; Brötje, M.; Koch, W.
Conference Paper
2018The new threats of information hiding: The road ahead
Cabaj, Krzysztof; Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen; Woodward, Alan; Zander, Sebastian
Journal Article
2018A newsfeed for C2 situational awareness
Schmitz, Hans-Christian; Bau, Nico; Endres, Sven; Gerz, Michael; Käthner, Sylvia; Mück, Daniel
Conference Paper
2018Not on my phone: Exploring users conception of related permissions
Muszynska, M.; Michels, D.; Zezschwitz, E. von
Conference Paper
2018On Anti-symmetry in Multiple Target Tracking
Koch, W.
Conference Paper
2018On Canonical Polyadic Decomposition of Non-Linear Gaussian Likelihood Functions
Govaers, F.
Conference Paper
2018One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels
Wendzel, Steffen; Eller, Daniela; Mazurczyk, Wojciech
Conference Paper
2018Parameter state estimation for bistatic sonar systems
Broetje, Martina; Broetje, Lars; Ehlers, Frank
Journal Article
2018Projektunabhängige Integrationsumgebung
Geppert, Hanna; Schulte, Thomas
Book Article
2018A queuing mechanism for delivering QoS-constrained web services in tactical networks
Lopes, Roberto Rigolin F.; Viidanoja, Antti; Lhotellier, Maximilien; Diefenbach, Anne; Jansen, Norman; Ginzler, Tobias
Conference Paper
2018Radar and Lidar Target Signatures of Various Object Types and Evaluation of Extended Object Tracking Methods for Autonomous Driving Applications
Haag, S.; Duraisamy, B.; Koch, W.; Dickmann, J.
Conference Paper
2018Readers' perception of computer-generated news: Credibility, expertise, and readability
Graefe, Andreas; Haim, Mario; Haarmann, Bastian; Brosius, Hans-Bernd
Journal Article
2018Realizing overlay Xcast in a tactical service infrastructure: An approach based on a service-oriented architecture
Diefenbach, Anne; Lopes, Roberto Rigolin F.; Lampe, Thorsten A.; Prasse, Christoph; Śliwa, Śliwa; Goniacz, Robert; Viidanoja, Antti
Conference Paper
2018Research on NLP for RE at Fraunhofer FKIE: A report on grouping requirements
Toews, D.; Heuss, T.
Conference Paper
2018Resurrecting Portable Network Graphics using Block Generators
Lambertz, Martin; Hilgert, Jan-Niclas; Schell, Roman
Journal Article, Conference Paper
2018Robust detection of jittered multiply repeating audio events using iterated time-warped ACF
Kurth, Frank; Wilkinghoff, Kevin
Conference Paper
2018Robust speaker identification by fusing classification scores with a neural network
Wilkinghoff, Kevin; Baggenstoss, Paul M.; Cornaggia-Urrigshardt, Alessia; Kurth, Frank
Conference Paper
2018SAD THUG: Structural Anomaly Detection for Transmissions of High-Value Information Using Graphics
Chapman, Jonathan
Conference Paper
2018Sammlung geleakter Identitätsdaten zur Vorbereitung proaktiver Opfer-Warnung
Malderle, Timo; Wübbeling, Matthias; Meier, Michael
Conference Paper
2018Security from the core: Design of a next generation cyber resilient architecture
Löw, A.; Maybaum, M.
Conference Paper
2018Session overview: Adaptation strategies and adaptation management
Fuchs, S.
Conference Paper
2018SLAM-based return to take-off point for UAS
Bender, D.; Koch, W.; Cremers, D.
Conference Paper
2018Softwareliste. Verwundbarkeiten im Unternehmen finden und verwalten
Uetz, Rafael; Benthin Sanguino, Luis Alberto; Ernst, Raphael
Journal Article
2018Sprachsignalverarbeitung für den Einsatz: Aktuelle Möglichkeiten und Grenzen von KI-Methoden
Kurth, Frank; Zeddelmann, Dirk von
Book Article
2018A Study on the Human and the Automation in Automated Driving: Getting to Know Each Other
Altendorf, E.; Schütz, R.; Canpolat, Y.; Weßel, G.; Flemisch, F.
Conference Paper
2018A survey of applicability of military data model architectures for smart city data consumption and integration
Pradhan, Manas; Fuchs, Christoph; Johnsen, Frank T.
Conference Paper
2018A survey of smart city assets for future military usage
Pradhan, Manas
Conference Paper
2018Taktiken für unbemannte Sensorplattformen bei einer dezentralen Datenfusion unter Wasser
Nissen, Ivor; Goetz, Michael
Book Article
2018Time evolution for dynamic probabilistic tensors in hierarchical tucker decomposition form
Govaers, F.
Conference Paper
2018Toward an architecture and data model to enable interoperability between federated mission networks and IoT-enabled smart city environments
Pradhan, Manas; Suri, Niranjan; Fuchs, Christoph; Bloebaum, Trude Hafsøe; Marks, Michał
Journal Article
2018Towards deriving insights into data hiding methods using pattern-based approach
Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof
Conference Paper
2018Trade-off between mental map and aesthetic criteria in simulated annealing based graph layout algorithms
Slopek, A.J.; Winkelholz, C.; Varga, M.
Conference Paper
2018Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services
Gruss, D.; Schwarz, M.; Wübbeling, M.; Guggi, S.; Malderle, T.; More, S.; Lipp, M.
Conference Paper
2018Virtual and Augmented Reality (VR/AR) in the Bundeswehr - a human-centred approach focusing on military applications
Alexander, Thomas
Book Article
2018Virtual Reality und Augmented Reality in der Bundeswehr - Einsatz mit dem Soldaten im Mittelpunkt
Alexander, Thomas
Book Article
2018Virtual tele-cooperation: Applying AR and VR for cooperative tele-maintenance and advanced distance learning
Alexander, T.; Ripkens, A.; Westhoven, M.; Kleiber, M.; Pfendler, C.
Conference Paper
2018Vision and driving support for shielded vehicles - implementation and test of an electronic vision replacement system with augmented reality
Lopez, D.; Baltzer, M.C.A.; Lassen, C.; Flemisch, F.
Conference Paper
2018Von KI zum teilautomatisierten, hochautomatisierten oder autonomen Fahren?
Flemisch, Frank; Baltzer, Marcel
Book Article
2018Ein Werkzeug zur automatisierten Analyse von Identitätsdaten-Leaks
Malderle, Timo; Wübbeling, Matthias; Knauer, Sven; Meier, Michael
Conference Paper
2018WoDiCoF - a testbed for the evaluation of (parallel) covert channel detection algorithms
Keidel, Ralf; Wendzel, Steffen; Zillien, Sebastian; Conner, Eric S.; Haas, Georg
Journal Article
2017Das (unheimliche und) unsichere Tal der Assistenz und Automation - Beschreibung und Absicherungsmöglichkeiten
Flemisch, F.O.; Altendorf, E.; Canpolat, Y.; Weßel, G.; Baltzer, M.; Lopez, D.; Herzberger, N.D.; Voß, G.M.I.; Schwalm, M.
Journal Article
2017Accumulated State Densities and Their Applications in Object Tracking
Koch, W.
Book Article
2017Analysis and test framework for the integration of ICT systems in the tactical domain
Angelstorf, F.; Becker, A.; Jansen, N.; Noth, F.
Conference Paper
2017Analysis of log-homotopy based particle flow filters
Altamash Khan, M.; Ulmke, Martin; Koch, Wolfgang
Journal Article
2017Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen
Conference Paper
2017Approach towards achieving an interoperable C4ISR infrastructure
Pradhan, M.; Tiderko, A.; Ota, D.
Conference Paper
2017Approach towards achieving interoperability between military land vehicle and robotic systems
Pradhan, Manas; Tiderko, Alexander; Ota, Daniel
Conference Paper
2017APRIM: An account and personal information manager
Hartlage, C.; Reinhardt, D.
Conference Paper
2017ARC24 - A double-arch positioner for bistatic RCS measurements with four degrees of freedom
Röding, M.; Sommerkorn, G.; Häfner, S.; Ihlow, A.; Jovanoska, S.; Thomä, R.S.
Conference Paper
2017Architekturübergreifende Detektion von Sicherheitslücken in Software
Padilla, E.; Ernst, R.
Book Article
2017Array radar resource management
Charlish, Alexander; Katsilieris, Fotios
Book Article
2017Automated detection and closing of holes in aerial point clouds using an UAS
Fiolka, T.; Rouatbi, F.; Bender, D.
Conference Paper
2017Bayesian processing of big data using log homotopy based particle flow filters
Khan, M.A.; Freitas, A. de; Mihaylova, L.; Ulmke, M.; Koch, W.
Conference Paper
2017Bearing of unmanned aerial vehicles by a volumetric microphone array
Haege, Miriam; Oispuu, Marc
Journal Article
2017Bearings-only tracking and doppler-bearing tracking with inequality constraint
Lai, Hoe Chee; Yang, Rong; Ng, Gee Wah; Govaers, Felix; Ulmke, Martin; Koch, Wolfgang
Conference Paper
2017Benchmark of 6D SLAM (6D simultaneous localisation and mapping) algorithms with robotic mobile mapping systems
Bedkowski, Janusz; Röhling, Timo; Höller, Frank; Schulz, Dirk; Schneider, Frank E.
Journal Article
2017Der Bezug der Sprache auf die Welt
Schmitz, Hans-Christian; Zimmermann, Thomas Ede
Book Article
2017Bi- and monostatic SAR-GMTI
Walterscheid, Ingo; Cristallini, Diego; Kohlleppel, Robert
Book Article
2017The challenge of preparing teams for the European robotics league: Emergency
Röning, J.; Kauppinen, M.; Pitkänen, V.; Kemppainen, A.; Tikanmäki, A.; Furci, M.; Palau Franco, M.; Winfield, A.; Stengler, E.; Brueggemann, B.; Schneider, F.; Castro, A.; Cordero Limon, M.; Viguria, A.; Ferri, G.; Ferreira, F.; Liu, X.; Petillot, Y.; Sosa, D.
Conference Paper
2017Characterization of discrete linear shift-invariant systems
Clausen, M.; Kurth, F.
Conference Paper
2017CIMIC Information Management Database (CIMD) - Information and process management in Civil-Military Cooperation (CIMIC)
Kaster, Jürgen; Austen, Hubert
Book Article
2017Cognitive and Cooperative Assistance System (COGAS): An innovative concept to support air target identification onboard ships of the German Navy
Özyurt, Emre; Kaster, Annette
Book Article
2017Cognitive radar management
Charlish, Alexander; Hoffmann, Folker
Book Article
2017Cooperative guidance and control in highly automated convoys - StrAsRob
Baltzer, Marcel; Rudolph, Claudia; Lopez Hernandez, Daniel; Flemisch, Frank
Conference Paper
2017Correlation based classification of complex PRI modulation types
Katsilieris, F.; Apfeld, S.; Charlish, A.
Conference Paper
2017Cyber-warface-vulnerabilities of modern devices
Weidenbach, Peter
Conference Paper
2017Design and Analysis of Hierarchically Modulated BICM-ID Receivers With Low Inter-Layer Interferences
Tschauner, M.; Oshim, M.F.T.; Adrat, M.; Antweiler, M.; Eschbach, B.; Vary, P.
Journal Article
2017Detecting zero-day attacks using context-aware anomaly detection at the application-layer
Duessel, Patrick; Gehl, Christian; Flegel, Ulrich; Dietrich, Sven; Meier, Michael
Journal Article
2017Development and analysis of an anti-jam preprocessor for satellite navigation receivers
Engel, Ulrich
Dissertation
2017Distributed and collaborative malware analysis with MASS
Rump, F.; Behner, T.; Ernst, R.
Conference Paper
2017EnArgus 2.0 - Zentrales Informationssystem Energieforschungsförderung. Schlussbericht
Oppermann, Leif; Hirzel, Simon; Krassowski, Joachim; Heiwolt, Karoline; Ruland, Rudolf; Koch, Thomas
Report
2017euRathlon and ERL emergency: A multi-domain multi-robot grand challenge for search and rescue robots
Winfield, Alan F.T.; Franco, Marta Palau; Brüggemann, Bernd; Castro, Ayoze; Ferri, Gabriele; Ferreira, Fausto; Liu, Xingcun; Petillot, Yvan; Roning, Juha; Schneider, Frank; Stengler, Erik; Sosa, Dario; Viguria, Antidio
Conference Paper
2017Evaluating the RBM without integration using PDF projection
Baggenstoss, Paul
Conference Paper
2017Evaluation of the scalability of OLSRv2 in an emulated realistic military scenario
Marcus, K.; Barz, C.; Kirchhoff, J.; Rogge, H.; Nilsson, J.; Velt, R. in t'; Suri, N.; Hansson, A.; Sterner, U.; Hauge, M.; Lee, K.; Holtzer, A.; Buchin, B.; Peuhkuri, M.; Misirlioglu, L.
Conference Paper
2017Exploiting structural signal information in passive emitter localization
Steffes, Christian
Dissertation
2017Exploring Design Directions for Wearable Privacy
Krombholz, Katharina; Dabrowski, Adrian; Smith, Matthew; Weippl, Edgar
Conference Paper
2017Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis
Hilgert, J.-N.; Lambertz, M.; Plohmann, D.
Journal Article, Conference Paper
2017Finite point processes and their application to target tracking
Degen, Christoph
Dissertation
2017Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie. Jahresbericht 2016/2017
 
Annual Report
2017Future army electronic warfare - challenges for realistic training and exercise
Rehbein, Berthold
Conference Paper
2017The Future of Digital Forensics: Challenges and the Road Ahead
Caviglione, Luca; Wendzel, Steffen; Mazurczyk, Wojciech
Journal Article
2017GazeTouchPIN: Protecting sensitive data on mobile devices using secure multimodal authentication
Khamis, M.; Hassib, M.; Zezschwitz, E. von; Bulling, A.; Alt, F.
Conference Paper
2017Glottal Mixture Model (GLOMM) for speaker identification on telephone channels
Baggenstoss, Paul; Wilkinghoff, K.; Kurth, F.
Conference Paper
2017Heterogeneous tactical radio networks with flexible IP-waveforms
Barz, C.; Fuchs, C.; Kirchhoff, J.; Niewiejska, J.; Rogge, H.
Conference Paper
2017Hierarchical salient object detection for assisted grasping
Klein, D.A.; Illing, B.; Gaspers, B.; Schulz, D.; Cremers, A.B.
Conference Paper
2017A hybrid method using temporal and spatial information for 3D lidar data segmentation
Tuncer, M.A.C.; Schulz, D.
Conference Paper
2017Implementing human centred design in the context of a graphical user interface redesign for ship manoeuvring
Costa, N.A.; Holder, E.; MacKinnon, S.N.
Journal Article
2017Implementing Information and Communication Technology Onboard: An Example for the Integration of Information Received via Communication Equipment with Onboard Navigation Systems
Holder, E.; Motz, F.
Book Article
2017Influence of letter size on word reading performance during walking
Conradi, J.
Conference Paper
2017Information form distributed Kalman filtering (IDKF) with explicit inputs
Pfaff, F.; Noack, B.; Hanebeck, U.D.; Govaers, F.; Koch, W.
Conference Paper
2017Information management in a civilian mission EUCAP Somalia case study
Schmitz, Hans-Christian; Pienemann, Reinout; Deneckere, Matthias
Conference Paper
2017Inter-Protocol Steganography for Real-Time Services and its Detection Using Traffic Coloring Approach
Lehner, Florian; Mazurczyk, Wojciech; Keller, Jörg; Wendzel, Steffen
Conference Paper
2017Interaction patterns for cooperative guidance and control
Baltzer, M.C.A.; Lopez, D.; Flemisch, F.; Weßel, G.
Conference Paper
2017Interface conformance testing for future military land platforms
Ota, Daniel; Hazizi, Ditmir
Conference Paper
2017Interference of simulated IEEE 802.11 links with directional antennas
Rademacher, M.; Jonas, K.
Conference Paper
2017Introduction to real aperture array radar
Nickel, Ulrich
Book Article
2017Introduction to the Proceedings of the 2017 NATO Workshop on Cyber Resilience
Madahar, B.; ÖZSAVAŞ, E.E.; Moller, A.; Schmidt, H.; McCallam, D.; Lorents, P.; Raugas, M.
Conference Paper
2017Introductory remarks on tracking- and fusion-driven radar systems technology
Koch, Wolfgang
Book Article
2017Linear time fourier transforms of Sn-k-invariant functions on the symmetric group Sn
Clausen, M.; Hühne, P.
Conference Paper
2017Malpedia: A collaborative effort to inventorize the malware landscape
Plohmann, Daniel; Clauß, Martin; Enders, Steffen; Padilla, Elmar
Presentation
2017Map-based drone homing using shortcuts
Bender, Daniel; Koch, Wolfgang; Cremers, Daniel
Conference Paper
2017Maximum entropy PDF projection: A review
Baggenstoss, P.M.
Conference Paper
2017Menu styles of mobile devices and their influence on gaze behavior while walking
Conradi, Jessica; Nord, Bjoern; Alexander, Thomas
Conference Paper
2017Militärische Aspekte künstlicher Intelligenz
Koch, Wolfgang
Journal Article
2017Multidimensional real-time assessment of user state and performance to trigger dynamic system adaptation
Schwarz, Jessica; Fuchs, Sven
Conference Paper
2017Multiple sensor data fusion for drone defence
Koch, W.; Antweiler, M.
Book Article
2017Multisensorielle Drohnenabwehr
Koch, W.; Antweiler, M.
Book Article
2017Multistatic tracking for passive radar applications
Brötje, Martina; Koch, Wolfgang
Book Article
2017Network management issues in military cognitive radio networks
Bräysyi, Timo; Tuukkanen, Topi; Couturier, Stefan; Verheul, Erik; Smit, Niels; Buchin, Boyd; Nir, Vincent le; Krygier, Jaroslaw
Conference Paper
2017A new method and results for analyzing decision-making processes in automated driving on highways
Altendorf, Eugen; Schreck, Constanze; Flemisch, Frank
Conference Paper
2017Novel radar techniques and applications. Vol.1: Real aperture array radar, imaging radar, and passive and multistatic radar
: Klemm, Richard; Nickel, Ulrich; Gierull, Christoph; Lombardo, Pierfrancesco; Griffiths, Hugh; Koch, Wolfgang
Book
2017Novel radar techniques and applications. Vol.2: Waveform diversity and cognitive radar, and target tracking and data fusion
: Klemm, Richard; Griffiths, Hugh; Koch, Wolfgang
Book
2017Obstacles to the Adoption of Secure Communication Tools
Abu-Salma, Ruba; Sasse, M. Angela; Bonneau, Joseph; Danilova, Anastasia; Naiakshina, Alena; Smith, Matthew
Conference Paper
2017Online 3D LIDAR Monte Carlo localization with GPU acceleration
Bedkowski, J.M.; Röhling, T.
Journal Article
2017Passenger safety during rescue and evacuation from passenger vessels: A holistic concept for the integration of technical assistance
Höckling, S.; Kunz, A.; Motz, F.
Conference Paper
2017People tracking and data fusion for UWB radar applications
Jovanovska, Snezhana; Govaers, Felix; Thomä, Reiner
Book Article
2017Persistent maritime traffic monitoring for the Canadian Arctic
Ulmke, Martin; Battistello, Giulia; Biermann, Joachim; Mohrdieck, Camilla; Pelot, Ronald; Koch, Wolfgang
Conference Paper
2017Preface. Detection of Intrusions and Malware, and Vulnerability Assessment
Polychronakis, M.; Meier, M.
Conference Paper
2017Quality of service resource management for search strategy design in electronic support
Apfeld, S.; Charlish, A.; Koch, W.
Conference Paper
2017Quantum suite - a look inside the NSA toolbox
Wübbeling, Matthias; Sykosch, Arnold; Meier, Michael
Conference Paper
2017Quincy: Detecting host-based code injection attacks in memory dumps
Barabosch,Thomas; Bergmann, Nikla; Padilla, Elmar; Dombeck, Adrian
Conference Paper
2017Reactive/proactive connectivity management in a tactical service-oriented infrastructure
Lopes, R.R.F.; Nieminen, M.; Viidanoja, A.; Wolthusen, S.D.
Conference Paper
2017Realtime Hierarchical Clustering Based on Boundary and Surface Statistics
Klein, D.A.; Schulz, D.; Cremers, A.B.
Conference Paper
2017Recent Advancements in Digital Forensics. Pt.1
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen
Journal Article
2017Reclaim your prefix: Mitigation of prefix hijacking using IPsec tunnels
Wübbeling, Matthias; Meier, Michael
Conference Paper
2017Requirements view for enterprise architectures. A pragmatic extension to the NATO Architecture Framework
Apelt, S.; Buga, I.; Geppert, H.; Hasso, H.; Kudla, T.
Conference Paper
2017Robots for radiation
Schneider, Frank; Gaspers, Bastian; Wildermuth, Dennis
Journal Article
2017Sensor data fusion for automated threat recognition in manned-unmanned infantry platoons
Wildt, J.; Varela, M.; Ulmke, M.; Brüggermann, B.
Conference Paper
2017Sensor management for radar networks
Charlish, Alexander; Nadjiasngar, R.
Book Article
2017Shared and cooperative control of ground and air vehicles. Introduction and general overview
Flemisch, F.; Canpolat, Y.; Altendorf, E.; Weßel, G.; Itoh, M.; Baltzer, M.; Pacaux-Lemoine, M.-P.; Abbink, D.; Schutte, P.
Conference Paper
2017Shared information space. A solution outline for a global information grid
Angelstorf, Fabian; Apelt, Stefan; Bau, Nico; Jansen, Norman; Käthner, Sylvia
Conference Paper
2017Single tree detection in agro-silvo-pastoral systems from high resolution digital surface models obtained from UAV- and gyrocopter-based RGB-imaging
Bareth, Georg; Bolten, Andreas; Bongartz, Jens; Jenal, Alexander; Kneer, Caspar; Lussem, Ulrike; Waldhoff, Guido; Weber, Immanuel
Poster
2017Software security: Cross-platform vulnerability detection
Padilla, E.; Ernst, R.
Book Article
2017Software vulnerability analysis using CPE and CVE
Benthin Sanguino, Luis Alberto; Uetz, Rafael
Report
2017Software-Defined Wireless Mesh Networking
Rademacher, M.; Jonas, K.; Siebertz, F.; Rzyska, A.; Schlebusch, M.; Kessel, M.
Journal Article
2017Special issue on increasing flexibility in wireless software defined radio systems
Singh, Sarvpreet; Adrat, Marc; Ulbricht, Gerald
Journal Article
2017Spherical near-field scanning with pointwise probe correction
Cornelius, R.; Heberling, D.
Journal Article
2017Standardization to deal with multilingual information in social media during large-scale crisis situations using crisis management language
Rein, Kellyn; Coote, Ravi; Sikorski, Lukas; Schade, Ulrich
Book Article
2017Steganography for Cyber-physical Systems
Wendzel, S.; Mazurczyk, W.; Haas, G.
Journal Article
2017Target parameter estimation and array features
Nickel, Ulrich
Book Article
2017TDOA/TOA-based geolocation using ADS-B transponder signals - experimental results
Steffes, C.; Konle, W.; Koch, W.
Conference Paper
2017A Technical Review of SCA Based Software Defined Radios: Vision, Reality and Current Status
Adrat, M.; Bernier, S.; Buchin, B.; Dingman, K.; Kovarik, V.; Marks, J.; Miller, S.; Muralidharan, R.; Nicollet, E.; Pucker, L.; Quintana, A.; Turner, M.
Journal Article
2017Test-retest stability of EEG and eye tracking metrics as indicators of variations in user state - an analysis at a group and an individual level
Schwarz, J.; Fuchs, S.
Conference Paper
2017Token level code-switching detection using Wikipedia as a lexical resource
Claeser, Daniel; Felske, Dennis; Kent, Samantha
Conference Paper
2017Towards a dynamic selection and configuration of adaptation strategies in augmented cognition
Fuchs, Sven; Schwarz, Jessica
Conference Paper
2017Towards a toolkit for utility and privacy-preserving transformation of semi-structured data using data pseudonymization
Kasem-Madani, Saffija; Meier, Michael; Wehner, Martin
Conference Paper
2017Towards a verification and validation test framework for open system architectures
Ota, Daniel; Charchalakis, Periklis; Stipidis, Elias
Conference Paper
2017Trade-off analysis of a service-oriented and hierarchical queuing mechanism
Lopes, Roberto Rigolin F.; Viidanoja, Antti; Lhotellier, Maximilien; Mazurkiewicz, Michal; Melis, Giampaolo; Diefenbach, Anne; Ginzler, Tobias; Jansen, Norman
Conference Paper
2017UI-design and evaluation for human-robot-teaming in infantry platoons
Westhoven, Martin; Lassen, Christian; Trautwein, Irmtrud; Remmersmann, Thomas; Brüggemann, Bernd
Conference Paper
2017Understanding shoulder surfing in the wild: Stories from users and observers
Eiband, M.; Khamis, M.; Zezschwitz, E. von; Hussmann, H.; Alt, F.
Conference Paper
2017Uniform Manifold Sampling (UMS): Sampling the maximum entropy PDF
Baggenstoss, Paul
Journal Article
2017Using robots for firefighters and first responders: Scenario specification and exemplary system description
Schneider, F.E.; Wildermuth, D.
Conference Paper
2017Verfahren und Vorrichtung zur Separation und Peilung von überlagerten Signalkomponenten basierend auf einem von einem Array aus Elementen aus Sensoren oder Antennen erhaltenen Mehrkanalsignal
Hermanns, Frank
Patent
2017Verfahren zur Prädiktion der Wahrscheinlichkeitsdichte zumindest einer kinematischen Zustandsgröße eines sich bewegenden Objekts und Zielverfolgungsvorrichtung
Demissie, Bruno
Patent
2017A VHF waveform for the CORASMA simulator
Couturier, Stefan; Bettinger, Olaf; Keip, Cédric
Conference Paper
2017Virtual environments for competency-oriented education and training
Alexander, T.; Westhoven, M.; Conradi, J.
Book Article
2017Welcome Message from the Program Committee Chairs
Sabelfeld, A.; Smith, M.
Conference Paper
2017What’s going on in energy efficiency research? A platform to enhance the transparency of energy research funding in Germany
Hirzel, Simon; Plötz, Patrick; Rohde, Clemens; Teufel, Benjamin; Krassowski, Joachim; Beier, Carsten; Rauscher, Thomas; Frick, Jürgen; Schreiner, Michael; Wagner, Hermann-Josef; Flamme, Stefan; Pöstges, Arne; Oppermann, Leif; Heiwolt, Karoline; Ruland, Rudolf; Sikorski, Lukas; Seier, Maximilian; Frietsch, Oliver; Koch, Thomas
Conference Paper
2017Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
Naiakshina, Alena; Danilova, Anastasia; Tiefenau, Christian; Herzog, Marco; Smith, Matthew
Conference Paper
2017WS-notification case study and experiment
Johnsen, Frank T.; Bloebaum, Trude H.; Alcaraz Calero, Jose Maria; Wang, Qi; Nightingale, James; Manso, Marco; Jansen, Norman
Conference Paper
2016"Integration - vernetzt denken, Technik verbinden" - Ideen und Denkanstöße aus der Wissenschaft
Wunder, M.
Book Article
2016An adaptable multimodal crew assistance system for NATO generic vehicle architecture
Pradhan, M.; Ota, D.
Conference Paper
2016An adaptive receiver search strategy for electronic support
Apfeld, S.; Charlish, A.; Koch, W.
Conference Paper
2016Advances in wireless community networks with the community-lab testbed
Navarro, L.; Vinas, R.B.; Barz, C.; Bonicioli, J.; Braem, B.; Freitag, F.; Vilata-I-Balaguer, I.
Journal Article
2016Analysis of BICM-ID receivers exploiting transformations of extrinsic information
Adrat, M.; Lewandowsky, J.; Tschauner, M.; Antweiler, M.
Journal Article
2016Analysis of sigmoid-based blind equalizer algorithms
Meyer, S.
Conference Paper
2016Analyzing the Spanish strip cipher by combining combinatorial and statistical methods
Sanguino, L.A.B.; Leander, G.; Paar, C.; Esslinger, B.; Niebel, I.
Journal Article
2016Approach towards application of commercial off-the-shelf internet of things devices in the military domain
Pradhan, M.; Gökgöz, F.; Bau, N.; Ota, D.
Conference Paper
2016Arms control in cyberspace - architecture for a trust-based implementation framework based on conventional arms control methods
Maybaum, M.; Tölle, J.
Conference Paper
2016Assessing the search and rescue domain as an applied and realistic benchmark for robotic systems
Schneider, Frank E.; Wildermuth, Dennis
Conference Paper
2016Automated driving using shared and cooperative guidance and control: Revisiting past research with a new model
Altendorf, E.; Baltzer, M.; Canpolat, Y.; Lopez, D.; Schreck, C.; Weßel, G.; Flemisch, F.
Journal Article, Conference Paper
2016A bayesian classification approach using class-specific features for text categorization
Tang, B.; He, H.B.; Baggenstoss, P.M.; Kay, S.
Journal Article
2016CIMIC Information Management Database (CIMD) - Informations- und Wissensmanagement in der Zivil-Militärischen Zusammenarbeit
Kaster, Jürgen; Austen, Hubert
Book Article
2016Class-specific model mixtures for the classification of acoustic time series
Baggenstoss, Paul M.; Harrison, Brian F.
Journal Article
2016Combining log-homotopy flow with tensor decomposition based solution for Fokker-Planck equation
Altamash Khan, M.; Ulmke, M.; Demissie, B.; Govaers, F.; Koch, W.
Conference Paper
2016Combining the glottal mixture model (GLOMM) with UBM for speaker recognition
Baggenstoss, P.M.
Conference Paper
2016Comparing single task assignments control with supervisory control through automated plan generation
Remmersmann, T.; Schade, U.; Schlick, C.M.
Conference Paper
2016A comprehensive measurement study of domain generating malware
Plohmann, D.; Yakdan, K.; Klatt, M.; Bader, J.; Gerhards-Padilla, E.
Conference Paper
2016Considerations for enhancing situation assessment through multi-level fusion of hard and soft data
Garcia, J.; Rein, K.; Biermannn, J.; Krenc, K.; Snidaro, L.
Conference Paper
2016Context exploitation for target tracking
Battistello, Giulia; Mertens, M.; Ulmke, M.; Koch, W.
Book Article
2016Cooperative guidance, control, and automation
Flemisch, F.; Winner, H.; Bruder, R.; Bengler, K.
Book Article
2016Corporate Semantic Web - Applications, Technology, Methodology: Summary of the Dagstuhl Workshop 2015
Hoppe, T.; Humm, B.; Schade, U.; Heuss, T.; Hemmje, M.; Vogel, T.; Gernhardt, B.
Journal Article
2016Covert channel-internal control protocols: attacks and defense
Kaur, J.; Wendzel, S.; Eissa, O.; Tonejc, J.; Meier, M.
Journal Article
2016Debunking security-usability tradeoff myths
Sasse, M.A.; Smith, M.; Herley, C.; Lipford, H.; Vaniea, K.
Journal Article
2016Decentralized cluster detection in distributed systems based on self-organized synchronization
Singh, V.; Esch, M.; Scholtes, I.
Conference Paper
2016Detecting anomalous electrical appliance behavior based on motif transition likelihood matrices
Reinhardt, A.; Reinhardt, D.
Conference Paper
2016Developers are not the enemy!: The need for usable security APIs
Green, M.; Smith, M.
Journal Article
2016DGArchive - Schäden durch Schadsoftware verhindern
Jopen, S.
Conference Paper
2016Direct position determination for TDOA-Based single sensor localization
Steffes, C.; Oispuu, M.
Journal Article
2016E-Navigation
Bergmann, M.; Callsen-Bracker, H.-H.; Motz, F.
Book Article
2016EEF: Exponentially Embedded Families with Class-Specific Features for Classification
Tang, B.; Kay, S.; He, H.; Baggenstoss, P.M.
Journal Article
2016euRathlon 2015: A multi-domain multi-robot grand challenge for search and rescue robots
Winfield, A.F.T.; Franco, M.P.; Brueggemann, B.; Castro, A.; Limon, M.C.; Ferri, G.; Ferreira, F.; Liu, X.; Petillot, Y.; Roning, J.; Schneider, F.; Stengler, E.; Sosa, D.; Viguria, A.
Conference Paper
2016Evaluation of GSM passive radar data and its use in multistatic tracking
Broetje, M.; Knoedler, B.; Koch, W.
Conference Paper
2016Extending OLSRv2 for tactical applications
Barz, C.; Fuchs, C.; Kirchhoff, J.; Niewiejska, J.; Rogge, H.
Conference Paper
2016Fast classification of accessible terrain with a 3D laser range finder
Röhling, T.
Conference Paper
2016Fast moving pedestrian detection based on motion segmentation and new motion features
Zhang, S.; Klein, D.A.; Bauckhage, C.; Cremers, A.B.
Journal Article
2016Future digital forensics in an advanced trusted environment
Maybaum, M.; Toelle, J.
Conference Paper
2016GazeTouchPass: Multimodal authentication using gaze and touch on mobile devices
Khamis, M.; Alt, F.; Hassib, M.; Zezschwitz, E. von; Hasholzner, R.; Bulling, A.
Conference Paper
2016Ground target tracking with RCS estimation based on signal strength measurements
Mertens, M.; Ulmke, M.; Koch, W.G.
Journal Article
2016GSM passive coherent location signal processing: Impact on system performance
Zemmari, Reda
: Thomä, Reiner S.; Koch, Wolfgang; Heuberger, Albert
Dissertation
2016Guest Editorial: Evolutionary advancements in wireless software defined radio systems
Singh, S.; Adrat, M.; Marabissi, D.; Armani, C.
Journal Article
2016H-Mode - A Haptic-Multimodal Interaction Concept for Cooperative Guidance and Control of Partially and Highly Automated Vehicles
Altendorf, Eugen; Baltzer, Marcel; Heesen, Matthias; Kienle, Martin; Meier, Sonja; Weißgerber, Thomas; Flemisch, Frank
Book Article
2016Head turn scaling below the threshold of perception in immersive virtual environments
Westhoven, M.; Paul, D.; Alexander, T.
Conference Paper
2016Helping Johnny to analyze malware: A usability-optimized decompiler and malware analysis user study
Yakdan, K.; Dechand, S.; Gerhards-Padilla, E.; Smith, M.
Conference Paper
2016A hierarchical framework to analyze shared control conflicts between human and machine
Itoh, M.; Flemisch, F.; Abbink, D.
Journal Article, Conference Paper
2016How to increase the security of smart buildings?
Wendzel, S.
Journal Article
2016Improved calculation of aS resilience against IP prefix hijacking
Wübbeling, Matthias; Meier, Michael
Conference Paper
2016Information hiding in communication networks : Fundamentals, mechanisms, and applications
Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian; Houmansadr, Amir; Szczypiorski, Krzysztof
Book
2016Integrated object segmentation and tracking for 3D LIDAR data
Tuncer, M.A.C.; Schulz, D.
Conference Paper
2016Interaction dialog design for the use of mobile devices while walking
Conradi, Jessica; Nord, Bjoern; Alexander, Thomas
Conference Paper
2016Job alerts in the wild: Study of expectations and effects of location-based notifications in an existing mobile crowdsourcing application
Reinhardt, D.; Michalak, M.; Lokaiczyk, R.
Conference Paper
2016Joint protection of a military formation using heterogeneous sensors in a mobile ad hoc network: Concept and field tests
Hörst, J.; Govaers, F.; Rehbein, B.; Barz, C.; Sevenich, P.
Conference Paper
2016Kalkuliertes Risiko. Marktübersicht Sandboxes als Komplettsysteme
Clauß, Martin; Ernst, Raphael
Journal Article
2016Key factors in industrial control system security
Chapman, J.P.; Ofner, S.; Pauksztelo, P.
Conference Paper
2016Kognitives und kooperatives Assistenzsystem COGAS: Ein innovatives Konzept zur Unterstützung der Luftzielidentifizierung an Bord von Marineschiffen
Özyurt, Emre; Kaster, Annette
Book Article
2016Konzeption und Entwicklung eines kognitiven und kooperativen Assistenzsystems zur interaktiven Unterstützung bei sicherheitskritischen Aufgaben
Özyurt, Emre
Dissertation
2016Layers of shared and cooperative control, assistance and automation
Pacaux-Lemoine, M.-P.; Flemisch, F.
Journal Article, Conference Paper
2016Machine learning methods for anomaly detection in BACnet networks
Tonejc, J.; Güttes, S.; Kobekova, A.; Kaur, J.
Journal Article
2016Maximum entropy feature fusion
Baggenstoss, P.M.
Conference Paper
2016Message from the Program Chairs
Tölle, J.; Akkaya, K.
Conference Paper
2016Methoden und Systeme zur effizienten HF-Breitbandaufklärung
Kurth, F.
Conference Paper
2016Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions
Naumann, M.; Wendzel, S.; Mazurczyk, W.; Keller, J.
Journal Article
2016Micro-Doppler based detection and tracking of UAVs with multistatic radar
Hoffmann, F.; Ritchie, M.; Fioranelli, F.; Charlish, A.; Griffiths, H.
Conference Paper
2016Modellierung und Simulation des Menschen bei Sicherheitsaufgaben
Alexander, Thomas
Book Article
2016Multi-level fusion of hard and soft information for intelligence
Biermann, Joachim; García, Jesús; Krenc, Ksawery; Nimier, Vincent; Rein, Kellyn; Snidaro, Lauro
Book Article
2016Multi-sensor maritime monitoring for the Canadian Arctic: Case studies
Battistello, G.; Gonzalez, J.; Ulmke, M.; Koch, W.; Mohrdieck, C.
Conference Paper
2016Multisensorielle Drohnenabwehr. Forschungsaspekte einer Herausforderung
Koch, Wolfgang
Journal Article
2016Multisensorielle UAS-Abwehr - Forschungsaspekte einer technologischen Herausforderung
Koch, W.
Conference Paper
2016My scrawl hides it all: Protecting text messages against shoulder surfing with handwritten fonts
Eiband, M.; Zezschwitz, E. von; Buschek, D.; Hußmann, H.
Conference Paper
2016Nonlinear filter design using Fokker-Planck propagator in Kronecker tensor format
Demissie, B.; Khan, M.A.; Govaers, F.
Conference Paper
2016Observability analysis for heterogeneous passive sensors exploiting signal propagation velocities
Hörst, J.; Koch, W.
Conference Paper
2016On angle estimation in GSM passive coherent location systems
Zemmari, R.; Knoedler, B.; Nickel, U.
Conference Paper
2016On box-operations for L-values and their applicability to soft-decision algorithms
Adrat, M.; Tschauner, M.; Bebawi, N.; Antweiler, M.; Eschbach, B.; Vary, P.
Conference Paper
2016On importance of steganographic cost for network steganography
Mazurczyk, Wojciech; Wendzel, Steffen; Azagra Villares, Ignacio; Szczypiorski, Krzysztof
Journal Article
2016On quantifying the effective password space of grid-based unlock gestures
Zezschwitz, E. von; Eiband, M.; Buschek, D.; Oberhuber, S.; Luca, A. de; Alt, F.; Hussmann, H.
Conference Paper
2016On the detection of small UAV using a GSM passive coherent location system
Knoedler, B.; Zemmari, R.; Koch, W.
Conference Paper
2016OP4: An OPPortunistic Privacy-Preserving Scheme for Crowdsensing Applications
Reinhardt, D.; Manyugin, I.
Conference Paper
2016PASSAGES - a system for improved safety and security of maritime operations in arctic areas
Biermann, J.
Conference Paper
2016A population based ACO algorithm for the combined tours TSP problem
Clauss, M.; Lotzmann, L.; Middendorf, M.
Conference Paper
2016A position free boresight calibration for INS-camera systems
Bender, D.; Cremers, D.; Koch, W.
Conference Paper
2016POSTER: An educational network protocol for covert channel analysis using patterns
Wendzel, S.; Mazurczyk, W.
Conference Paper
2016Posture based recognition of the visual focus of attention for adaptive mobile information systems
Westhoven, M.; Plegge, C.; Henrich, T.; Alexander, T.
Conference Paper
2016Privacy in mobile participatory sensing: Current trends and future challenges
Christin, D.
Journal Article
2016Product Development Projects. Dynamics and Emergent Complexity
Schlick, Christopher Marc; Demissie, Bruno
Book
2016Prozesskette automatisierte Auflärung (PAA) - Unbemannte Fahrzeuge zur Aufklärungsunterstützung für einen abgesessenen Zug
Brüggemann, B.
Conference Paper
2016Ressourcenmanagement - Schlüsseltechnologie für Überwachung und Aufklärung
Koch, W.
Conference Paper
2016Robust compressive shift retrieval in linear time
Clausen, M.; Kurth, F.
Conference Paper
2016Robust detection of multiple bioacoustic events with repetitive structures
Kurth, F.
Conference Paper
2016Robust features for representing structured signal components
Kurth, F.
Journal Article
2016The ROS multimaster extension for simplified deployment of multi-robot systems
Tiderko, A.; Höller, F.; Röhling, T.
Book Article
2016Sandbox evasion the easy way - evading major commercial sandboxes
Clauß, Martin; Ernst, Raphael
Conference Paper
2016Scaling the world of monocular SLAM with INS-measurements for UAS navigation
Bender, D.; Rouatbi, F.; Schikora, M.; Cremersy, D.; Koch, W.
Conference Paper
2016Search and retrieval of human casualties in outdoor environments with unmanned ground systems - system overview and lessons learned from ELROB 2014
Brüggemann, Bernd; Wildermuth, Dennis; Schneider, Frank E.
Conference Paper
2016Second IEEE workshop on pervasive energy services 2016 - Welcome and committees
Reinhardt, A.; Reinhardt-Christin, D.; Duerr, F.
Conference Paper
2016Security, privacy and reliability of smart buildings
Wendzel, S.; Keller, J.
Journal Article
2016The security-usability tradeoff myth
Sasse, M.A.; Smith, M.
Journal Article
2016Sense-making for intelligence analysis on social media data
Pritzkau, A.
Conference Paper
2016Sequential distance dependent Chinese Restaurant Processes for motion segmentation of 3D LIDAR data
Tuncer, M.A.C.; Schulz, D.
Conference Paper
2016Shared control is the sharp end of cooperation: Towards a common framework of joint action, shared control and human machine cooperation
Flemisch, F.; Abbink, D.; Itoh, M.; Pacaux-Lemoine, M.-P.; Weßel, G.
Journal Article, Conference Paper
2016Sicherheit 2016. Sicherheit, Schutz und Zuverlässigkeit
: Meier, Michael; Reinhardt, Delphine; Wendzel, Steffen
Conference Proceedings
2016Situationsanalyse durch multispektrale Sensordatenfusion - Architekturen und Experimente
Koch, W.
Conference Paper
2016SnapApp: Reducing authentication overhead with a time-constrained fast unlock option
Buschek, D.; Hartmann, F.; Zezschwitz, E. von; Luca, A. de; Alt, F.
Conference Paper
2016SoK: Lessons Learned from Android Security Research For Appified Software Platforms
Acar, Yasemin; Backes, Michael; Bugiel, Sven; Fahl, Sascha; McDaniel, Patrick; Smith, Matthew
Conference Paper
2016Survey-based exploration of attitudes to participatory sensing tasks in location-based gaming communities
Reinhardt, D.; Heinig, C.
Journal Article
2016TACTICS TSI architecture: A European reference architecture for tactical SOA
Diefenbach, A.; Ginzler, T.; McLaughlin, S.; Sliwa, J.; Lampe, T.A.; Prasse, C.
Conference Paper
2016Testing trajectories against pre-defined scenarios
Krause, T.; Govaers, F.; Koch, W.
Conference Paper
2016Time and frequency synchronization characteristics in rapid prototyping environments
Schmidt, Philip; Meyer, Stephan; Bögel, Gerd vom; Grabmaier, Anton
Conference Paper
2016Towards duty - BML communication enables a multi-robot system supporting an infantry platoon
Remmersmann, T.; Trautwein, I.; Schade, U.; Brüggemann, B.; Lassen, C.; Westhoven, M.; Wolski, M.
Conference Paper
2016Tracking and counting multiple people using distributed seismic sensors
Damarla, T.; Oispuu, M.; Schikora, M.; Koch, W.
Conference Paper
2016Tracking and Data Fusion for Ground Surveillance
Mertens, M.; Feldmann, M.; Ulmke, M.; Koch, W.
Book Article
2016Trajectory optimization for multi-platform bearing-only tracking with ghosts
Hoffmann, F.; Charlish, A.; Koch, W.
Conference Paper
2016Tutorial on prototyping the HMI for autonomous vehicles: A human centered design approach
Gowda, N.; Sirkin, D.; Ju, W.; Baltzer, M.
Conference Paper
2016Unbemannte Systeme zur Unterstützung eines Infanteriezuges
Brüggemann, Bernd; Schade, Ulrich; Schulz, Lothar
Journal Article
2016Unified description for network information hiding methods
Wendzel, S.; Mazurczyk, W.; Zander, S.
Journal Article
2016Unmanned systems for radiological and nuclear measuring and mapping
Schneider, Frank E.; Gaspers, Bastian; Tiderko, Alexander; Katorgin, Oleg; Wildermuth, Dennis
Conference Paper
2016Usable Security - The Source Awakens
Smith, Matthew
Non Book Material
2016Using probabilistic multipath routing to improve route stability in MANETs
Rump, F.; Jopen, S.A.; Frank, M.
Conference Paper
2016Vorrichtung und Verfahren zum Einschränken einer Ursprungsmenge von Programmfragmenten auf eine Teilmenge von Programmfragmenten
Eschweiler, Sebastian
Patent
2016What's in a message? Exploring dimensions of trust in reported information
Dragos, V.; Rein, K.
Conference Paper
2016You can't watch this! Privacy-respectful photo browsing on smartphones
Zezschwitz, E. von; Ebbinghaus, S.; Hussmann, H.; Luca, A. de
Conference Paper
2015Accumulated state densities and their use in decorrelated track-to-track fusion
Koch, W.; Govaers, F.
Conference Paper
2015Advanced methods for ground target tracking with airborne phased-array pulse-doppler radar
Mertens, Michael
Dissertation
2015Advanced security gateways for heterogeneous tactical ad hoc networks
Barz, C.; Quinkert, F.
Conference Paper
2015Air traffic monitoring using datastream analysis techniques
Schueller, Gereon; Schmiegelt, Philip; Behrend, Andreas
Conference Paper
2015Analysis of a modified switchable bayesian learning automaton for cognitive radio
Werker, H.; Couturier, S.; Rauschen, D.; Adrat, M.; Antweiler, M.
Conference Paper
2015Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
Caviglione, L.; Lalande, J.-F.; Mazurczyk, W.; Wendzel, S.
Conference Paper
2015Anticipation in cognitive radar using stochastic control
Charlish, A.; Hoffmann, F.
Conference Paper
2015ARMing the trusted platform module pro-active system integrity monitoring focussing on peer system notification
Maybaum, M.; Toelle, J.
Conference Paper
2015Augmented reality navigation displays: Maintaining situational awareness in the e-Navigation era
Pecota, S.R.; Grabowski, M.; Holder, E.
Journal Article
2015Automatic detection of hidden threats in the TeraSCREEN passive millimeter-wave imaging subsystem
Madhogaria, S.; Schikora, M.
Conference Paper
2015Automatic Privacy Classification of Personal Photos
Buschek, D.; Bader, M.; Zezschwitz, E. von; Luca, A.E. de
Conference Paper
2015Averting the privacy risks of smart metering by local data preprocessing
Reinhardt, A.; Englert, F.; Christin, D.
Journal Article
2015B.Hive: A zero configuration forms honeypot for productive web applications
Pohl, C.; Zugenmaier, A.; Meier, M.; Hof, H.-J.
Conference Paper
2015BACtag - Data Leakage Protection für Gebäude
Anhaus, Eva Maria; Wendzel, Steffen
Conference Paper
2015Bewertung der Befahrbarkeit von Böden mit CCMod2 - ein Service auch für die Landwirtschaft
Zieger, Petra; Biermann, Joachim; Hedel, Ralf
Conference Paper
2015Bistatic simultaneous transmitter localization and mapping
Michaelis, M.
Conference Paper
2015BML for communicating with multi-robot systems
Remmersmann, T.; Schade, U.; Rein, K.; Tiderko, A.
Conference Paper
2015BOTWATCHER: Transparent and generic botnet tracking
Barabosch, T.; Dombeck, A.; Yakdan, K.; Gerhards-Padilla, E.
Conference Paper
2015Bridging semantic interoperability gaps with SILF
Ford, Reginald; Hansen, Bjorn Jervell; Hanz, David; Kuehne, Sven; Last, Mark; Mojtahedzadeh, Vahid; Nogalski, Dariusz; Santos, Leopoldo; Tuncer, Fulya; Wunder, Michael
Conference Paper
2015Can I help you setting your privacy? A survey-based exploration of users' attitudes towards privacy suggestions
Reinhardt, D.; Engelmann, F.; Hollick, M.
Conference Paper
2015Car detection by fusion of HOG and causal MRF
Madhogaria, S.; Baggenstoss, P.M.; Schikora, M.; Koch, W.; Cremers, D.
Journal Article
2015Challenges for network aspects of cognitive radio
Couturier, S.; Krygier, J.; Bentstuen, O.I.; Nir, V. le
Conference Paper
2015Class-specific model mixtures for the classification of time-series
Baggenstoss, P.M.
Conference Paper
2015Compact controlled reception pattern antenna for interference mitigation tasks of global navigation satellite system receivers
Alshrafi, W.; Engel, U.; Bertuch, T.
Journal Article
2015Comparison of augmented state track fusion methods for non-full-rate communication
Govaers, Felix; Chong, Chee-Yee; Mori, Shozo; Koch, Wolfgang
Conference Paper
2015Context-based ground target tracking - an integrated approach
Mertens, Michael; Ulmke, Martin
Conference Paper
2015A Cooperative Automation Concept for User-oriented Support of Air Target Identification
Özyurt, E.; Flemisch, F.; Döring, B.
Journal Article, Conference Paper
2015Countermeasures for covert channel-internal control protocols
Kaur, J.; Wendzel, S.; Meier, M.
Conference Paper
2015Coupled Human-machine Tele-manipulation
Brüggemann, B.; Röhling, T.; Welle, J.
Journal Article
2015Creativity in mind: Evaluating and maintaining advances in network steganographic research
Wendzel, Steffen; Palmer, Carolin
Journal Article
2015A CRPA based preprocessor design for GNSS-receivers with optimized output signal
Engel, U.
Conference Paper
2015Derivative-augmented features as a dynamic model for time-series
Baggenstoss, P.M.
Conference Paper
2015Design and comparative evaluation of an iterative contact point estimation method for static stability estimation of mobile actively reconfigurable robots
Brunner, M.; Fiolka, T.; Schulz, D.; Schlick, C.M.
Journal Article
2015Direct single sensor TDOA localization using signal structure information
Steffes, C.; Oispuu, M.
Conference Paper
2015A distributed privacy-preserving mechanism for mobile urban sensing applications
Christin, D.; Bub, D.M.; Moerov, A.; Kasem-Madani, S.
Conference Paper
2015Distributed server systems for C2-simulation interoperation
Pullen, J.M.; Khimeche, L.; Remmersmann, T.; Schade, U.; Cuneo, X.
Conference Paper
2015Dynamic-occlusion likelihood incorporation in a PHD filter based range-only tracking system
Jovanoska, Snezhana; Govaers, Felix; Thomae, Reiner; Koch, Wolfgang
Conference Paper
2015Easy to draw, but hard to trace? On the observability of grid-based (Un)lock patterns
Zezschwitz, E. von; Luca, A. de; Janssen, P.; Hussmann, H.
Conference Paper
2015Editorial: Special Issue on Ground Robots Operating in Dynamic, Unstructured and Large-Scale Outdoor Environments
Lacroix, S.; Schneider, F.; Wildermuth, D.; Winfield, A.
Journal Article
2015ELROB and EURATHLON: Improving search & rescue robotics through real-world robot competitions
Schneider, F.E.; Wildermuth, D.; Wolf, H.-L.
Conference Paper
2015EnArgus - ontology based search
Dembach, M.; Sikorski, L.; Ruland, R.
Conference Paper
2015EnArgus: Zentrales Informationssystem Energieforschungsförderung
Oppermann, Leif; Hinrichs, Elke; Schade, Ulrich; Koch, Thomas; Rettweiler, Manuela; Ohrem, Frederike; Plötz, Patrick; Beier, Carsten; Prinz, Wolfgang
Conference Paper
2015Enhanced maritime traffic picture for the Canadian Arctic
Battistello, Giulia; Ulmke, Martin; Mohrdieck, Camilla
Conference Paper
2015Enterprise architecture-based service portfolio management for automated service catalog generation
Landsberg, C.; Esch, M.
Conference Paper
2015Entwicklung und Untersuchung eines Konzepts zur interaktiven Erhebung von Arbeitsprozessen
Feiser, Daniel
: Thüring, Manfred; Rötting, Matthias; Schlick, Christopher M.; Flemisch, Frank O.
Dissertation
2015Ergonomie für Straßentransport mit Assistenzfunktionen von Robotern
Flemisch, Frank; Krasni, Alexander
Book Article
2015Exploring human vision driven features for pedestrian detection
Zhang, S.S.; Bauckhage, C.; Klein, D.A.; Cremers, A.B.
Journal Article
2015Explosive material detection through analysis of infrared and raman spectrums captured by a portable sensor
El Mokni, Hichem; Heinskill, Josef; Schikora, Marek
Conference Paper
2015A fast histogram-based similarity measure for detecting loop closures in 3-D LIDAR data
Röhling, T.; Mack, J.; Schulz, D.
Conference Paper
2015Forschungsprojekt Robot}air{
Hegenberg, J.; Herrmann, R.; Ziegner, D.; Schmidt, L.; Günther, T.; Ordonez-Müller, A.; Kroll, A.; Barz, T.; Schulz, D.
Journal Article
2015Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie. Jahresbericht 2014/2015
 
Annual Report
2015From Laboratory into Real Life: The EURATHLON and ELROB Disaster Response Robotics Competitionse
Schneider, F.E.; Wildermuth, D.
Conference Paper
2015Gaussian-mixture based ensemble Kalman filter
Govaers, Felix; Koch, Wolfgang; Willett, Peter
Conference Paper
2015"The good, the bad and the ugly": Evaluation of wi-fi steganography
Szczypiorski, K.; Janicki, A.; Wendzel, S.
Journal Article
2015H-Mode 2D. Eine haptisch-multimodale Bedienweise für die kooperative Führung teil- und hochautomatisierter Fahrzeuge
Altendorf, Eugen; Baltzer, Marcel; Kienle, Martin; Meier, Sonja; Weißgerber, Thomas; Heesen, Matthias; Flemisch, Frank
Book Article
2015Human systems integration for robotic assistant systems
Flemisch, Frank; Krasni, Alexander
Book Article
2015I feel like i'm taking selfies all day! Towards understanding biometric authentication on smartphones
Luca, A. de; Hang, A.; Zezschwitz, E. von; Hussmann, H.
Conference Paper
2015I know what you did last week! Do you? Dynamic security questions for fallback authentication on smartphones
Hang, A.; Luca, A. de; Hussmann, H.
Conference Paper
2015Improvements in the implementation of log-homotopy based particle flow filters
Khan, Muhammad Altamash; Ulmke, Martin
Conference Paper
2015Inferring smartphone positions based on collecting the environment's response to vibration motor actuation
Diaconita, I.; Reinhardt, A.; Christin, D.; Rensing, C.
Conference Paper
2015Innovative Informationstechnologie für Führungs- und Aufklärungsprozesse
Martini, Peter; Schlick, Christopher
Book Article
2015Integrations- und Analysefähigkeit für Wirkketten
Wunder, Michael
Book Article
2015Interaction design of automatic steering for collision avoidance
Heesen, M.; Dziennus, M.; Hesse, T.; Schieben, A.; Brunken, C.; Loper, C.; Kelsch, J.; Baumann, M.
Journal Article
2015ITFComp: A compression algorithm for ARM architecture Instruction Trace Files
Qasem, M.; Pustina, L.
Conference Paper
2015Locked your phone? Buy a new one? From tales of fallback authentication on smartphones to actual concepts
Hang, A.; Luca, A. de; Zezschwitz, E. von; Demmler, M.; Hussmann, H.
Conference Paper
2015Looking behind a corner using multipath-exploiting UWB radar
Zetik, R.; Eschrich, M.; Jovanoska, S.; Thoma, R.S.
Journal Article
2015Mastering situation awareness in healtcare database systems
Behrend, A.; Schmiegelt, P.; Gawlick, D.; Liu, Zhen Hua; Fehling, R.
Conference Paper
2015Measuring and limiting the covert channel risk of XML document transmission
Steinmetz, P.
Conference Paper
2015Measuring and modeling performance of WLAN communication for multistatic sonar applications
Jopen, S.A.; Schulz, A.; Ernst, R.
Conference Paper
2015MedEvac: Low-risk rescue of injured personnel by robots
Brüggemann, Bernd; Schulz, Dirk
Book Article
2015MedEvac: Risikoarme Bergung von Verwundeten durch Roboter
Brüggemann, Bernd; Schulz, Dirk
Book Article
2015Message from the program chairs
Kanhere, S.; Tölle, J.
Conference Paper
2015Middleware for coordinating a tactical router with SOA services
Jansen, N.; Krämer, D.; Barz, C.; Niewiejska, J.; Spielmann, M.
Conference Paper
2015The MIP information model - a semantic reference for Command & Control
Gerz, M.; Mulikita, M.; Bau, N.; Gökgöz, F.
Conference Paper
2015Monte Carlo based distance dependent Chinese restaurant process for segmentation of 3D LIDAR data using motion and spatial features
Tuncer, Mehmet Ali Cagri; Schulz, Dirk
Conference Paper
2015Multicast performance comparison of SMF and ODMRP using the CONFINE testbed
Kirchhoff, J.; Niewiejska, J.; Fuchs, C.; Barz, C.; Rogge, H.
Conference Paper
2015Novel approaches for security in building automation systems
Kaur, Jaspreet; Herdin, Christian; Tonejc, Jernej; Wendzel, Steffen; Meier, Michael; Szlosarczyk, Sebastian
Conference Paper
2015OLSRv2 for community networks: Using directional airtime metric with external radios
Barz, C.; Fuchs, C.; Kirchhoff, J.; Niewiejska, J.; Rogge, H.
Journal Article
2015On improving connectivity and network efficiency in a heterogeneous military environment
Lubkowski, P.; Hauge, M.; Landmark, L.; Barz, C.; Sevenich, P.
Conference Paper
2015On the functional derivative with respect to the Dirac Delta
Degen, C.; Streit, R.; Koch, W.
Conference Paper
2015An open process for software development in classified environments as prerequisite for military app stores
Kudla, T.; Esch, M.; Ota, D.; Schwarz, G.
Conference Paper
2015Optimal Touch Button Size for the use of Mobile Devices while Walking
Conradi, J.; Busch, O.; Alexander, T.
Journal Article
2015Optimizing continuous queries using update propagation with varying granularities
Behrend, A.; Griefahn, U.; Voigt, H.; Schmiegelt, P.
Conference Paper
2015Parameter estimation for multistatic active sonar using extended fixed points
Broetje, Martina; Pikora, Kolja
Conference Paper
2015ParasiteEx: Disinfecting parasitic malware platform-independently
Barabosch, Thomas; Dombeck, Adrian; Gerhards-Padilla, Elmar
Conference Paper
2015Participatory Design for Security-Related User Interfaces
Weber, S.; Harbach, M.; Smith, M.
Conference Paper
2015Pattern-based survey and categorization of network covert channel techniques
Wendzel, Steffen; Zander, Sebastian; Fechner, Bernhard; Herdin, Christian
Journal Article
2015PerCom PhD Forum'15: Seventh annual PhD forum on pervasive computing and communications, 2015 - Welcome and committees
Chellappan, S.; Christin, D.
Conference Paper
2015PerEnergy'15: First IEEE workshop on Pervasive Energy Services 2015 - Welcome and committees
Reinhardt, A.; Christin, D.; Duerr, F.
Conference Paper
2015Performance analysis of underwater network protocols within international sea trial
Goetz, M.; Nissen, I.; Otnes, R.; Walree, P. van
Conference Paper
2015A performance model for target tracking with a radar network
Nadjiasngar, R.; Charlish, A.
Conference Paper
2015Phased array radar resource management using continuous double auction
Charlish, A.; Woodbridge, K.; Griffiths, H.
Journal Article
2015Practical use of BML and MSDL standards for supporting French German training
El Abdouni Khayari, R.; Lotz, H.B.; Krosta, U.; Khimeche, L.; Cuneo, X.; Remmersmann, T.
Conference Paper
2015Quality of service management for a multi-mission radar network
Charlish, A.; Nadjiasngar, R.
Conference Paper
2015Quality of service resource management for a radar network
Nadjiasngar, R.; Charlish, A.
Conference Paper
2015Real-time streaming with millisecond granularity
Ofner, S.; Frank, M.
Conference Paper
2015Receiver diversity impact on GSM passive coherent location systems
Zemmari, R.; Feldmann, M.; Knoedler, B.
Conference Paper
2015Robust detection of threats hidden underneath human clothing in a given passive millimeter-wave screening scenario
Madhogaria, Satish; Schikora, Marek
Conference Paper
2015Rough terrain motion planning for actively reconfigurable mobile robots
Brunner, M.
: Schlick, C.; Flemisch, F.
Dissertation
2015Securing BACnet's pitfalls
Kaur, Jaspreet; Tonejc, Jernej; Wendzel, Steffen; Meier, Michael
Conference Paper
2015Self-calibration of a passive radar system using GSM base stations
Knoedler, B.; Zemmari, R.
Conference Paper
2015Sensor deployment for motion trajectory tracking with a genetic algorithm
Domingo-Perez, F.; Lazaro-Galilea, J.L.; Bravo, I.; Martin-Gorostiza, E.; Salido-Monzu, D.; Llana, A.; Govaers, F.
Conference Paper
2015Sequential likelihood ratio test based on the Distributed Kalman Filter for multi sensor track extraction
Govaers, F.
Conference Paper
2015Show me your phone, I will tell you who your friends are: Analyzing smartphone data to identify social relationships
Reinhardt, D.; Engelmann, F.; Moerov, A.; Hollick, M.
Conference Paper
2015A simple sensor management criterion for radar beam control based on the CB-MeMBer filter
Katsilieris, F.; Driessen, H.; Yarovoy, A.
Conference Paper
2015SOA and wireless mobile networks in the tactical domain: Results from experiments
Manso, M.; Alcaraz Calero, J.M.; Barz, C.; Hafsøe Bloebaum, T.; Chan, K.; Jansen, N.; Trethan Johnsen, F.; Markarian, G.; Meiler, P.-P.; Owens, I.; Sliwa, J.; Wang, Q.
Conference Paper
2015SoK: Secure messaging
Unger, N.; Dechand, S.; Bonneau, J.; Fahl, S.; Perl, H.; Goldberg, I.; Smith, M.
Conference Paper
2015Special Issue on Recent Innovations in Wireless Software-Defined Radio Systems
Adrat, M.; Ascheid, G.
Journal Article
2015Strategic deployment in graphs
Langetepe, E.; Lenerz, A.; Bruggemann, B.
Journal Article
2015SwiPIN: Fast and secure PIN-entry on smartphones
Zezschwitz, E. von; Luca, A. de; Brunkow, B.; Hussmann, H.
Conference Paper
2015Temporal state management for supporting the real-time analysis of clinical data
Behrend, A.; Schmiegelt, P.; Xie, J.; Fehling, R.; Ghoneimy, A.; Liu, Z.H.; Chan, E.; Gawlick, D.
Conference Paper
2015Third International Workshop on Self-Adaptive and Self-Organising Socio-Technical Systems (SASOST 2015)
Anders, G.; Botev, J.; Esch, M.
Conference Paper
2015Threat-based sensor management for target tracking
Katsilieris, F.; Driessen, H.; Yarovoy, A.
Journal Article
2015To Pin or Not to Pin - Helping App Developers Bullet Proof Their TLS Connections
Oltrogge, M.; Acar, Y.; Dechand, S.; Smith, M.; Fahl, S.
Conference Paper
2015Towards a mobile context-sensitive framework for interoperability and improved situational awareness in crisis and emergency management
Coote, Ravi; Rein, Kellyn; Esch, Markus; Schade, Ulrich
Conference Paper
2015Towards a structured selection of game engines for virtual environments
Westhoven, Martin; Alexander, Thomas
Conference Paper
2015Using enhanced F0-trajectories for multiple speaker detection in audio monitoring scenarios
Cornaggia-Urrigshardt, A.; Kurth, F.
Conference Paper
2015VCCFinder: Finding potential vulnerabilities in open-source projects to assist code audits
Perl, H.; Dechand, S.; Smith, M.; Arp, D.; Yamaguchi, F.; Rieck, K.; Fahl, S.; Acar, Y.
Conference Paper
2015Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making
Tonejc, Jernej; Kaur, Jaspreet; Karsten, Adrian; Wendzel, Steffen
Journal Article, Conference Paper
2015Workshop on Middleware for a Smarter Use of Electric Energy (MidSEE 2015). Message from the workshop chairs
Reinhardt, A.; Christin, D.; Renner, C.
Conference Paper
2015Worried about privacy? Let your PV converter cover your electricity consumption fingerprints
Reinhardt, A.; Egarter, D.; Konstantinou, G.; Christin, D.
Conference Paper
2014Accuracy study for a piecewise maneuvering target with unknown maneuver change times
Hörst, J.; Oispuu, M.; Koch, W.
Journal Article
2014Adaptive Automation als sozialer Akteur. Anforderungen an die Gestaltung aus psychologischer und systemtheoretischer Sicht
Schwarz, J.; Fuchs, S.
Conference Paper
2014Aiding autonomous underwater vehicles navigation using multistatic sonar data
Daun, M.; Brötje, L.; Ehlers, F.
Conference Paper
2014Airborne emitter tracking by fusing heterogeneous bearing data
Schikora, M.; Bender, D.; Koch, W.
Conference Paper
2014Airborne multiple emitter tracking by fusing heterogeneous bearing data
Schikora, M.
Dissertation
2014Analyse der Kopfhaltung beim Einsatz von Head-Mounted Displays mittels des Ovako Working Posture Analysing Systems (OWAS)
Mertens, A.; Brandl, C.; Theis, S.; Alexander, T.; Bützler, J.; Schlick, C.M.
Conference Paper
2014Analysis of likelihood approximations for bearings-only measurements
Hörst, J.
Conference Paper
2014Analysis of visual performance during the use of mobile devices while walking
Conradi, Jessica; Alexander, Thomas
Conference Paper
2014Anforderungen an die Benutzung von Mobilgeräten und Smartphones aus Sicht der Ergonomie
Alexander, T.; Conradi, J.; Theis, S.; Schlick, C.M.
Conference Paper
2014Array-based direction finding and localization for small aerial platforms
Oispuu, M.; Nickel, U.
Conference Paper
2014Aspects of track-to-track fusion
Koch, W.
Book Article
2014Audiovisual prosody of uncertainty. An overview
Wollermann, C.; Schröder, B.; Schade, U.
Journal Article, Conference Paper
2014Automatic extraction of oil palm trees in high resolution aerial color images from a plantation in Ecuador
Gonzalez, J.; Ponce de Leon, F.; Biermann, J.
Journal Article, Conference Paper
2014Autonomous reconnaissance and surveillance in urban structures - Eurathlon 2013
Hoeller, F.; Konigs, A.; Schulz, D.
Conference Paper
2014Bayesian knowledge propagation
Koch, W.
Book Article
2014Bee master: Detecting host-based code injection attacks
Barabosch, T.; Eschweiler, S.; Gerhards-Padilla, E.
Conference Paper
2014Beiträge zur robusten und effizienten Erschließung von digitalen Funksignalen
Kreuzer, S.
Dissertation
2014Bleep bleep! Determining smartphone locations by opportunistically recording notification sounds
Diaconita, I.; Reinhardt, A.; Christin, D.; Rensing, C.
Conference Paper
2014Box-particle probability hypothesis density filtering
Schikora, M.; Gning, A.; Mihaylova, L.; Cremers, D.; Koch, W.
Journal Article
2014Can smart plugs predict electric power consumption? A case study
Reinhardt, A.; Christin, D.; Kanhere, S.S.
Conference Paper
2014A case study in optimizing continuous queries using the magic update technique
Behrend, A.; Schueller, G.
Conference Paper
2014Case study: Limitations of parameter estimation for non-cooperative multistatic active sonar by association ambiguities
Michaelis, M.; Broetje, M.; Ehlers, F.
Conference Paper
2014Characterizing objects and sensors
Koch, W.
Book Article
2014Clutter cancellation in passive radar using GSM broadcast channels
Demissie, B.
Journal Article
2014Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files
Zwanger, V.; Gerhards-Padilla, E.; Meier, M.
Conference Paper
2014Cognitive engineering of automated assembly processes
Mayer, M.P.; Odenthal, B.; Faber, M.; Winkelholz, C.; Schlick, C.M.
Journal Article
2014Collaborative security monitoring based on the MonIKA framework for privacy-preserving information sharing
Kiesling, T.; Motsch, N.; Kaufmann, H.; Elsner, T.; Wübbeling, M.; Meier, M.
Conference Paper
2014Commanding heterogeneous multi-robot teams
Remmersmann, T.; Schade, U.; Tiderko, A.
Conference Paper
2014Comparing shift-autocorrelation with cepstrum for detection of burst pulses in impulsive noise
Baggenstoss, P.M.; Kurth, F.
Journal Article
2014Comparison of tracklet fusion and distributed Kalman filter for track fusion
Chong, C.-Y.; Mori, S.; Govaers, F.; Koch, W.
Conference Paper
2014Complex structures and collective dynamics in networked systems: Foundations for self-adaptation and self-organization
Scholtes, I.; Esch, M.
Conference Paper
2014Concept for the integration of information received via communication equipment with onboard navigational systems
Holder, E.; Motz, F.; Horoufchin, H.; Baldauf, M.
Conference Paper
2014A concurrently updatable index structure for predicted paths of moving objects. Editorial
Schmiegelt, P.; Behrend, A.; Seeger, B.; Koch, W.
Journal Article, Conference Paper
2014Cooperative Spectrum Sensing for a Real-Time Cognitive Radio Demonstrator
Rauschen, D.; Couturier, S.; Adrat, M.; Antweiler, M.; Elders-Boll, H.
Conference Paper
2014Corporate Semantic Web Search
Bense, H.; Dembach, M.; Kioscha, K.; Schade, U.; Sikorski, L.
Conference Paper
2014Current and future directions for virtual simulation in operational platforms
Alexander, T.; Goldberg, S.R.
Book Article
2014Detecting host-based code injections attacks
Barabosch, T.
Abstract
2014Detection of audio events with repetitive structure using generalized autocorrelations
Kurth, F.; Cornaggia-Urrigshardt, A.
Conference Paper
2014Display options for head-up information
Holder, E.; Motz, F.
Conference Paper
2014Distributed bearings-only tracking using the federated Kalman filter
Govaers, F.; Wilms, M.
Conference Paper
2014Distributed radar tracking using the double debiased distributed Kalman filter
Charlish, A.; Govaers, F.; Koch, W.
Conference Paper
2014Do you hear what I hear? Using acoustic probing to detect smartphone locations
Diaconita, I.; Reinhardt, A.; Englert, F.; Christin, D.; Steinmetz, R.
Conference Paper
2014Dynamic occlusion handling in the PHD filter for range-only tracking: Proof of concept
Jovanoska, S.; Govaers, F.; Thomä, R.; Koch, W.
Conference Paper
2014Emitter localization under multipath propagation using a likelihood function decomposition that is linear in target space
Degen, C.; Govaers, F.; Koch, W.
Conference Paper
2014Energy detection based on long-term estimation of gaussian noise distribution
Couturier, S.; Rauschen, D.
Conference Paper
2014Envisioning smart building botnets
Wendzel, Steffen; Zwanger, Viviane; Meier, Michael; Szlosarczyk, Sebastian
Conference Paper
2014Ergonomic DHM systems - limitations and trends - a review focused on the "Future of Ergonomics"
Alexander, T.; Paul, G.
Conference Paper
2014Erkennungsmethoden für Kernel-Level Rootkits - Die unsichtbare Bedrohung
Ernst, R.; Weidenbach, P.
Journal Article
2014euRathlon Outdoor Robotics Challenge: Year 1 Report
Winfield, A.F.T.; Franco, M.P.; Brüggemann, B.; Castro, A.; Djapic, V.; Ferri, G.; Petillot, Y.; Roning, J.; Schneider, F.E.; Sosa, D.; Viguria, A.
Conference Paper
2014Evaluation and extension of the cognitive assistant system (COGAS) for user-oriented support of air target identification
Özyurt, E.; Döring, B.; Flemisch, F.
Conference Paper
2014Exploiting doppler blind zone information for ground moving target tracking with bistatic airborne radar
Mertens, M.; Koch, W.; Kirubarajan, T.
Journal Article
2014Feed-back to acquisition: Sensor management
Koch, W.
Book Article
2014Field experiments for TDoA-based localization of GSM base stations
Steffes, C.
Conference Paper
2014Framework for Semantic Interoperability
Wunder, M. et al.
Report
2014Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie. Jahresbericht 2013/2014
 
Annual Report
2014Der Fraunhofer-Verbund IUK Technologie: Europas größte Forschungsorganisation
Martini, P.
Conference Paper
2014The generalized intensity filter
Degen, C.
Conference Paper
2014Generalized solution to smoothing and out-of-sequence processing
Govaers, F.; Koch, W.
Journal Article
2014GIS-basierte Nutzerschnittstelle für Führungsinformationssysteme
Jansen, N.; Krämer, D.; Spielmann, M.
Conference Paper
2014GSM passive coherent location system: Performance prediction and measurement evaluation
Zemmari, R.; Broetje, M.; Battistello, G.; Nickel, U.
Journal Article
2014GSM passive radar: Range resolution improvement using data-dependent non parametric approach
Knoedler, B.; Zemmari, R.; Nickel, U.
Conference Paper
2014A guide for preparing and executing an effective port security exercise
Wagner, A.; Motz, F.
Conference Paper
2014Haltungserfassung zur Anpassung mobiler Nutzungsschnittstellen
Henrich, T.; Plegge, C.; Westhoven, M.; Alexander, T.
Conference Paper
2014Hey, NSA: Stay away from my market! Future proofing app markets against powerful attackers
Fahl, S.; Dechand, S.; Perl, H.; Fischer, F.; Smrcek, J.; Smith, M.
Conference Paper
2014Hidden and uncontrolled - on the emergence of network steganographic threats
Wendzel, Steffen; Mazurczyk, Wojciech; Caviglione, Luca; Meier, Michael
Conference Paper
2014Hidden and under control
Wendzel, S.; Keller, J.
Journal Article
2014High-resolution range-Doppler processing by coherent block-sparse estimation
Demissie, B.; Berger, C.R.
Journal Article
2014Histogram-PMHT for extended targets and target groups in images
Wieneke, M.; Davey, S.
Journal Article
2014Honey, I Shrunk the keys: Influences of mobile devices on password composition and authentication performance
Zezschwitz, E. von; Luca, A. de; Hussmann, H.
Conference Paper
2014HoneyAgent: Detecting malicious java applets by using dynamic analysis
Gassen, J.; Chapman, J.P.
Conference Paper
2014Host-based code injection attacks: A popular technique used by malware
Barabosch, T.; Gerhards-Padilla, E.
Conference Paper
2014How to compare movement? A review of physical movement similarity measures in geographic information science and beyond
Ranacher, P.; Tzavella, K.
Journal Article
2014Image-based analysis to study plant infection with human pathogens
Schikora, M.; Schikora, A.
Journal Article
2014Implementation of an urban operations simulation model
Klaproth, O.W.; Döring, B.; Alexander, T.
Conference Paper
2014Improved routing anomaly detection to protect end users
Wübbeling, M.
Abstract
2014Improving Human Effectiveness Through Embedded Virtual Simulation
: Alexander, T.; Goldberg, S.
Book
2014In Search of Interoperability Standards for Human Behaviour Representations
Gunzelmann, G.; Gaughan, C.; Alexander, T.; Huiskamp, W.; Bosch, K. van den; Jong, S. de; Bruzzone, A.G.; Tremori, A.
Presentation
2014Informationstechnologie für verteilte Führungsinformationssysteme
Wunder, M.
Conference Paper
2014INS-camera calibration without ground control points
Bender, D.; Schikora, M.; Sturm, J.; Cremers, D.
Conference Paper
2014Integration of advanced object properties
Koch, W.
Book Article
2014Integration of advanced sensor properties
Koch, W.
Book Article
2014Integration of soft data for information fusion: Pitfalls, challenges and trends
Dragos, V.; Rein, K.
Conference Paper
2014Integration of topographical information
Koch, W.
Book Article
2014Intelligente Verarbeitung von Sensordaten
Koch, W.
Conference Paper
2014Inter-AS routing anomalies: Improved detection and classification
Wübbeling, M.; Elsner, T.; Meier, M.
Conference Paper
2014Interactive multi-robot command and control with quasi-natural command language
Remmersmann, T.; Schade, U.; Schlick, C.
Conference Paper
2014Interoperabilität von Führungssystemen - ein zentrales Thema für die Forschung
Wunder, Michael
Book Article
2014Introduction and motivation
Goldberg, S.; Alexander, T.; Magee, L.
Book Article
2014ISPS port risk assessment: Getting the most out of the process?
Linkmann, G.; Holder, E.; Motz, F.
Conference Paper
2014It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception
Harbach, M.; Zezschwitz, E. von; Fichtner, A.; Luca, A. de; Smith, M.
Conference Paper
2014IT-gestütztes Management und Controlling - Verdeckte Kanäle – eine zunehmende Gefahr für Unternehmensdaten
Wendzel, Steffen; Keller, Jörg
Journal Article
2014Komplexe Einsatzsysteme verstehen. Fregatte Klasse 124 und Korvette Klasse 130
Witt, O.; Mihatsch, E.; Küttelwesch, H.
Journal Article
2014Koordination und Kooperation in Mehrrobotersystemen unter spatialen Nebenbedingungen
Brüggemann, B.
: Martini, P.
Dissertation
2014The language of actions: Recovering the syntax and semantics of goal-directed human activities
Kuehne, H.; Arslan, A.; Serre, T.
Conference Paper
2014Measuring software security by known vulnerabilities
Sykosch, A.
Abstract
2014Mediating the interaction between human and automation during the arbitration processes in cooperative guidance and control of highly automated vehicles: Base concept and first study
Baltzer, M.; Altendorf, E.; Meier, S.; Flemisch, F.
Conference Paper
2014Metrics for path planning of reconfigurable robots in uneven terrain
Brunner, M.; Brüggemann, B.; Schulz, D.
Conference Paper
2014MIM NIEM Options Analysis: Report to the NATO Data Management Syndicate of the Information and Integrated Services Capability Team
ONeill, D.; Klucznik, F.; Burkhart, L.; Connelly, I.; Roberts, W.; Beck, G.; Gerz, M.; Bau, N.
Report
2014Mismatch loss constrained instrumental variable filtering for GSM passive bistatic radar
Bahlke, F.; Zemmari, R.; Nickel, U.; Pesavento, M.
Conference Paper
2014Mobile taktische Kommunikation für Koalitionseinsätze
Antweiler, M.
Conference Paper
2014Mosaic-chart based visualization in building automation systems
Wendzel, Steffen; Herdin, Christian; Wirth, Roman; Masoodian, Masood; Luz, Santonio; Kaur, Jaspreet
Conference Paper
2014Multi-level fusion of hard and soft information
Biermann, J.; Garcia, J.; Krenc, K.; Nimier, V.; Rein, K.; Snidaro, L.
Conference Paper
2014N-Acyl-homoserine lactone primes plants for cell wall reinforcement and induces resistance to bacterial pathogens via the salicylic acid/oxylipin pathway
Schenk, S.; Hernández-Reyes, C.; Samans, B.; Stein, E.; Neumann, C.; Schikora, M.; Reichelt, M.; Mithöfer, A.l.; Becker, A.; Kogel, K.-H.; Schikora, A.
Journal Article
2014Network centric warfare in a coalition environment
Barz, C.; Antweiler, M.
Book Article
2014The nexus of human factors in cyber-physical systems. Ergonomics of eyewear for industrial applications
Theis, S.; Wille, M.; Alexander, T.
Conference Paper
2014Non-linear and non-Gaussian state estimation using log-homotopy based particle flow filters
Khan, M.A.; Ulmke, M.
Conference Paper
2014Notion and structure of sensor data fusion
Koch, W.
Book Article
2014Novel Transformations of Extrinsic Information Applied to Innovative BICM-ID Receivers. Fundamentals and Limits
Adrat, M.; Osten, T.; Tschauner, M.; Antweiler, M.; Lewandowsky, J.
Conference Paper
2014Now you see me, now you don't. Protecting smartphone authentication from shoulder surfers
Luca, A. de; Harbach, M.; Zezschwitz, E. von; Maurer, M.-E.; Slawik, B.; Hussmann, H.; Smith, M.
Conference Paper
2014On considering hierarchical modulation in the porting process of legacy waveforms to software defined radio
Adrat, M.; Osten, T.; Leduc, J.; Antweiler, M.; Elders-Boll, H.
Journal Article
2014On decorrelated track-to-track fusion based on accumulated state densities
Koch, W.; Govaers, F.
Conference Paper
2014On how the distributed Kalman filter is related to the federated Kalman filter
Govaers, F.; Charlish, A.; Koch, W.
Conference Paper
2014On recursive batch processing
Koch, W.
Book Article
2014On the implications, the identification and the mitigation of covert physical channels
Hanspach, Michael; Keller, Jörg
Conference Paper
2014On the superposition principle of linear Gaussian estimation - a physical analogy
Govaers, F.; Koch, W.
Conference Paper
2014Ontology On Demand. Vollautomatische Ontologieerstellung aus deutschen Texten mithilfe moderner Textmining-Prozesse
Haarmann, B.
Dissertation
2014Optimization of the stop-and-go- and dual-mode-algorithms for real-time baseband transmission
Meyer, S.
Conference Paper
2014Parameter estimation for non-cooperative multistatic sonar
Michaelis, M.; Brötje, M.; Ehlers, F.
Conference Paper
2014Passive Aufklärung mittels Mobilfunk-Basisstationen
Zemmari, R.; Koch, W.
Book Article
2014Passive emitter localization by direct position determination with moving array sensors
Oispuu, M.
Dissertation
2014Passive surveillance using base stations of cell phone networks
Zemmari, R.; Koch, W.
Book Article
2014Patchwork: Stitching against malware families with IDA Pro
Plohmann, D.
Abstract
2014Physiologische Auswirkungen der Langzeitnutzung von Head-Mounted Displays im industriellen Kontext
Theis, S.; Alexander, T.; Mertens, A.; Schlick, C.M.; Wille, M.
Conference Paper
2014Policy-driven pseudonymization
Sykosch, A.; Neff, R.; Meier, M.
Conference Paper
2014Probabilistic tracking with database systems
Schüller, G.
Dissertation
2014Prolonged work with head mounted displays
Wille, M.; Wischniewski, S.; Adolph, L.; Theis, S.; Grauel, B.; Alexander, T.
Conference Paper
2014Provisioning Graded Services for Dynamic Secure Wireless Networks in Coalition Environments
Salmanian, M.; Brown, J.D.; Mason, P.C.; Tang, H.; Song, R.; Simmelink, D.; Fongen, A.; Hunke, S.
Conference Paper
2014Recent developments in covert acoustical communications
Hanspach, Michael; Goetz, Michael
Conference Paper
2014Recherche-Unterstützung durch Ontologie-Visualisierung im EnArgus2-Projekt
Bense, H.; Schade, U.; Ohrem, F.; Sikorski, L.
Conference Paper
2014Reducing MANET neighborhood discovery overhead
Ernst, R.; Jopen, S.; Bartelt, T.
Conference Paper
2014A resource allocation model for the radar search function
Hoffmann, F.; Charlish, A.
Conference Paper
2014Resurrection: A carver for fragmented files
Lambertz, M.; Uetz, R.; Gerhards-Padilla, E.
Conference Paper
2014Robust detection and pattern extraction of repeated signal components using subband shift-ACF
Kurth, F.
Conference Paper
2014Robust F0 estimation in noisy speech signals using shift autocorrelation
Kurth, F.; Cornaggia-Urrigshardt, A.; Urrigshardt, S.
Conference Paper
2014Rough terrain motion planning for actuated, tracked robots
Brunner, M.; Brüggemann, B.; Schulz, D.
Conference Paper
2014Safety and IT-security: Transfer of methods, knowledge and lessons-learned?
Alexander, T.; Tölle, J.
Conference Paper
2014Second international workshop on self-adaptive and self-organising socio-technical systems (SASOST 2014)
Anders, G.; Botev, J.; Esch, M.
Conference Paper
2014Semi-automatic extraction of ship lanes and movement corridors from AIS data
Gonzalez, J.; Battistello, G.; Schmiegelt, P.; Biermann, J.
Conference Paper
2014Semi-automatic sea lane extraction combining Particle Filtering (PF) and Geographic Information Systems (GIS)
Tzavella, K.; Ulmke, M.
Conference Paper
2014Sensordatenfusionstechnologie - Anwendungen bei Aufklärung, Schutz und Wirkung
Koch, W.
Conference Paper
2014Sequential track extraction
Koch, W.
Book Article
2014Special Issue "Beyond Human-Centred Automation"
: Flemisch, F.; Bengler, B.; Bubb, H.; Winner, H.; Bruder, R.
Journal Issue
2014State dependent mode transition probabilities with an application to acceleration dependency
Michaelis, M.; Govaers, F.; Koch, W.
Conference Paper
2014Strategic planning in dynamic urban operations. Problem solving under time constraints
Klaproth, O.W.
Conference Paper
2014Strategie- und Positionspapier Cyber-Sicherheit 2020: Herausforderungen für die IT-Sicherheitsforschung
: Neugebauer, Reimund (Hrsg.); Jarke, M. (Hrsg.); Thoma, K. (Hrsg.); Beyerer, Jürgen (Red.); Eckert, Claudia (Red.); Martini, P. (Red.); Waidner, Michael (Red.)
Report
2014Tactical communication systems based on civil standards: Modeling in the MiXiM framework
Argumanez, H.E.; Tschauner, M.
Conference Paper
2014Testbeds for IT systems in tactical environments
Jansen, N.; Krämer, D.; Spielmann, M.
Conference Paper
2014Towards a more holistic view on user state assessment in adaptive human-computer interaction
Schwarz, J.; Fuchs, S.; Flemisch, F.
Conference Paper
2014Towards autonomous robotic systems for remote gas leak detection and localization in industrial environments
Soldan, S.; Welle, J.; Barz, T.; Kroll, A.; Schulz, D.
Conference Paper
2014Towards cognitive tools: Systems engineering aspects for public safety and security
Koch, W.
Journal Article
2014Towards cooperative guidance and control of highly automated vehicles: H-Mode and Conduct-by-Wire
Flemisch, F.; Bengler, B.; Bubb, H.; Winner, H.; Bruder, R.
Journal Article
2014Towards suppressing attacks on and improving resilience of building automation systems - an approach exemplified using BACnet
Szlosarczyk, Sebastian; Wendzel, Steffen; Kaur, Jaspreet; Meier, Michael; Schubert, Frank
Conference Paper
2014Tracking and Sensor Data Fusion
Koch, Wolfgang
Book
2014Tracking targets with multiple measurements per scan
Degen, C.; Govaers, F.; Koch, W.
Conference Paper
2014TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications
Christin, D.; Pons-Sorolla, D.R.; Hollick, M.; Kanhere, S.S.
Conference Paper
2014Two steps back for one step forward: Revisiting augmented cognition principles from a perspective of (social) system theory
Fuchs, Sven; Schwarz, Jessica; Flemisch, Frank O.
Conference Paper
2014Untersuchungen zur kooperativen Prozessführung mit Hilfe des Assistenzsystems COGAS
Özyurt, E.; Döring, B.; Flemisch, F.
Conference Paper
2014Usable privacy for mobile sensing applications
Christin, D.; Engelmann, F.; Hollick, M.
Conference Paper
2014Use of generic security event data for specific threat monitoring
Elsner, T.; Meier, M.
Conference Paper
2014Using personal examples to improve risk communication for security & privacy decisions
Harbach, M.; Hettig, M.; Weber, S.; Smith, M.
Conference Paper
2014Utilization of traceroutes to improve cooperative detection of internet routing anomaly detection
Wübbeling, M.; Meier, M.
Conference Paper
2014Verfahren zur Hervorhebung und Detektion wiederholter Nutzsignalkomponenten innerhalb eines Quellsignals
Kurth, Frank
Patent
2014Verfahren zur Verarbeitung von Datenpaketen in einem Kommunikationsknoten
Nissen, Ivor; Goetz, Michael
Patent
2014Vernetzte Operationsführung im Koalitionsumfeld
Barz, C.; Antweiler, M.
Book Article
2014Vessel route prediction for maritime surveillance
Battistello, G.; Gonzalez, J.; Ulmke, M.
Conference Paper
2014Visualization for Cyber Situation Awareness
Varga, M.; Winkelholz, C.; Träber, S.; Varga, C.
Conference Paper
2014Vom passiven Werkzeug zum sozialen Akteur: Ansatz einer ganzheitlicheren Betrachtung adaptiver automatisierter Systeme
Fuchs, S.; Schwarz, J.
Conference Paper
2014Workshop on inconspicuous interaction
Marques, D.; Maes, P.; Carriço, L.; Muslukhov, I.; Guerreiro, T.; Oakley, I.; Luca, A. de; Zezschwitz, E. von
Conference Paper
2014Younger beginners, older retirees: Head-mounted displays and demographic change
Theis, S.; Alexander, T.; Wille, M.; Mertens, A.; Schlick, C.M.
Conference Paper
2014Zur landwirtschaftlichen Nutzung der Datenfusion. Probleme und Lösungsansätze
Heinskill, J.; Koch, W.; Krozer, V.; Schikora, M.; Schikora, A.
Conference Paper

 

<