| | |
---|
2021 | Tangible VR Multi-user Simulation Methodology for a Balanced Human System Integration López-Hernández, D.; Bloch, M.; Bielecki, K.; Schmidt, R.; Baltzer, M.C.A.; Flemisch, F. | Conference Paper |
2020 | "Get a Free Item Pack with Every Activation!". Do Incentives Increase the Adoption Rates of Two-Factor Authentication? Busse, K.; Amft, S.; Hecker, D.; Zezschwitz, E. von | Journal Article |
2020 | 3D lidar data segmentation using a sequential hybrid method Tuncer, M.A.C.; Schulz, D. | Conference Paper |
2020 | Accuracy study on shooter localization using incomplete acoustic measurements Still, L.; Oispuu, M.; Koch, W. | Conference Paper |
2020 | Adapting interaction to address critical user states of high workload and incorrect attentional focus - An evaluation of five adaptation strategies Fuchs, S.; Hochgeschurz, S.; Schmitz-Hübsch, A.; Thiele, L. | Conference Paper |
2020 | Advanced analysis of binary code Bergmann, Niklas | Book Article |
2020 | Airborne Beyond Line-of-Sight Communication Networks Rupar, M.A.; Larsen, E.; Saglam, H.B.; Savin, J.A.; Gurdil, B.; Lampe, T.A.; Bruck, N.; Peltotalo, S.; Blasco, R.B. | Journal Article |
2020 | Assessing the Security of OPC UA Deployments Roepert, Linus; Dahlmanns, Markus; Fink, Ina Berenice; Pennekamp, Jan; Henze, Martin | Conference Paper |
2020 | Autonomous Robot Exploration and Measuring in Disaster Scenarios using Behavior Trees Rosas, F.G.; Hoeller, F.; Schneider, F.E. | Conference Paper |
2020 | Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks Ohm, M.; Plate, H.; Sykosch, A.; Meier, M. | Conference Paper |
2020 | Challenges and Prospects of Emotional State Diagnosis in Command and Control Environments Schmitz-Hübsch, A.; Fuchs, S. | Conference Paper |
2020 | Challenges in automated HUMINT processing for situational assessment: Experiences from NATO CIMIC Joint Cooperation Nimier, V.; Rein, K.; Snidaro, L.; Biermann, J.; Garcia, J.; Krenc, K. | Conference Paper |
2020 | Closing the Gap of Creating Design Concepts for DSS by Applying the Situation Awareness Oriented Design Principles Dalinger, Elena; Feiser, Daniel | Conference Paper |
2020 | The Development From Adaptive to Cognitive Radar Resource Management Charlish, A.; Hoffmann, F.; Degen, C.; Schlangen, I. | Journal Article |
2020 | Einsatzunterstützungssystem für Feuerwehren zur Gefahrenbekämpfung auf Seeschiffen Feiser, Daniel | Journal Article |
2020 | Enhancing reality: Adaptation strategies for AR in the field Bielecki, K.; López Hernández, D.; Bloch, M.; Baltzer, M.; Schmidt, R.; Wasser, J.; Flemisch, F. | Conference Paper |
2020 | Federated Control of Distributed Multi-Partner Cloud Resources for Adaptive C2 in Disadvantaged Networks Bastiaansen, H.; Geest, J.V.D.; Broek, C.V.D.; Kudla, T.; Isenor, A.; Webb, S.; Suri, N.; Fogli, M.; Canessa, B.; Masini, A.; Goniacz, R.; Sliwa, J. | Journal Article |
2020 | Finding a line between trusted and untrusted information on tweets through sequence classification Pritzkau, Albert; Winandy, Steffen; Krumbiegel, Theresa | Conference Paper |
2020 | Fortschrittliche Analyse von Binärcode Bergmann, Niklas | Book Article |
2020 | From "knowing what" to "knowing when": Exploring a concept of situation awareness synchrony for evaluating SA dynamics in teams Prébot, B.; Schwarz, J.; Fuchs, S.; Claverie, B. | Conference Paper |
2020 | Generalizing the phishing principle: Analyzing user behavior in response to controlled stimuli for IT security awareness assessment Sykosch, A.; Doll, C.; Wübbeling, M.; Meier, M. | Conference Paper |
2020 | Graph-based model of smart grid architectures Klaer, B.; Sen, O.; Velde, D. van der; Hacker, I.; Andres, M.; Henze, M. | Conference Paper |
2020 | Guest Editorial: Agent and System Transparency Chen, J.Y.C.; Flemisch, F.O.; Lyons, J.B.; Neerincx, M.A. | Journal Article |
2020 | How to Securely Prune Bitcoin's Blockchain Matzutt, R.; Kalde, B.; Pennekamp, J.; Drichel, A.; Henze, M.; Wehrle, K. | Conference Paper |
2020 | The IEC 63047 Standard for Data Transmission in Radiological and Nuclear Robotics Applications Schneider, F.E.; Wildermuth, D.; Garcia Rosas, F.; Paepen, J.; Lutter, G. | Conference Paper |
2020 | Information security methodology, replication studies and information security education Wendzel, S.; Caviglione, L.; Checco, A.; Mileva, A.; Lalande, J.-F.; Mazurczyk, W. | Journal Article, Conference Paper |
2020 | Information Space Dashboard Krumbiegel, Theresa; Pritzkau, Albert; Schmitz, Hans-Christian | Conference Paper |
2020 | An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique Vogel, D.; Akhmedjanov, U.; Ohm, M.; Meier, M. | Conference Paper |
2020 | Is hybrid AI suited for hybrid threats? Insights from social media analysis Dragos, V.; Forrester, B.; Rein, K. | Conference Paper |
2020 | Joint Multitarget Tracking and Dynamic Network Localization in the Underwater Domain Mendrzik, R.; Brambilla, M.; Allmann, C.; Nicoli, M.; Koch, W.; Bauch, G.; LePage, K.; Braca, P. | Conference Paper |
2020 | Joint Registration and Fusion of an Infra-Red Camera and Scanning Radar in a Maritime Context Cormack, D.; Schlangen, I.; Hopgood, J.R.; Clark, D.E. | Journal Article |
2020 | Learning to close the gap: Combining task frame formalism and reinforcement learning for compliant vegetable cutting Padalkar, A.; Nieuwenhuisen, M.; Schneider, S.; Schulz, D. | Conference Paper |
2020 | Let’s get in touch again: Tangible AI and tangible XR for a more tangible, balanced human systems integration Flemisch, F.; Bielecki, K.; López Hernández, D.; Meyer, R.; Baier, R.; Herzberger, N.D.; Wasser, J. | Conference Paper |
2020 | Linear time Fourier transforms of Sn-k-invariant functions on the symmetric group Sn Clausen, M. | Journal Article |
2020 | A Mnemonic Kalman Filter for Non-Linear Systems with Extensive Temporal Dependencies Jung, S.; Schlangen, I.; Charlish, A. | Journal Article |
2020 | A neural network based on first principles Baggenstoss, P.M. | Conference Paper |
2020 | News Hawk - Beobachten und Analysieren im öffentlichen Informationsraum Winkelholz, Carsten; Schade, Ulrich | Journal Article |
2020 | Not all areas are equal: Analysis of citations in information security research Wendzel, Steffen; Lévy-Bencheton, Cedric; Caviglione, Luca | Journal Article |
2020 | On Conducting Security Developer Studies with CS Students: Examining a Password-Storage Study with CS Students, Freelancers, and Company Developers Naiakshina, A.; Danilova, A.; Gerlitz, E.; Smith, M. | Conference Paper |
2020 | On ethically aligned information fusion for defence and security systems Koch, W. | Conference Paper |
2020 | On the importance of adaptive operator training in human-swarm interaction Hasbach, J.D.; Witte, T.E.F.; Bennewitz, M. | Conference Paper |
2020 | Private multi-hop accountability for supply chains Pennekamp, J.; Bader, L.; Matzutt, R.; Niemietz, P.; Trauth, D.; Henze, M.; Bergs, T.; Wehrle, K. | Conference Paper |
2020 | The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation Henze, M. | Conference Paper |
2020 | Replication: On the ecological validity of online security developer studies: Exploring deception in a password-storage study with freelancers Danilova, A.; Naiakshina, A.; Deuter, J.; Smith, M. | Conference Paper |
2020 | Response to the Letter by Fred Daum Huizing, A.; Charlish, A.; Brüggenwirth, S. | Journal Article |
2020 | Rise of artificial intelligence in military weapons systems : Beyerer, Jürgen (Editor); Martini, Peter (Editor); Gabel, O. | Report |
2020 | Road Data Enrichment Framework Based on Heterogeneous Data Fusion for ITS Rettore, P.H.L.; Santos, B.P.; Lopes, R.R.F.; Maia, G.; Villas, L.A.; Loureiro, A.A.F. | Journal Article |
2020 | A Security Reference Model for Autonomous Vehicles in Military Operations Mancini, F.; Bruvoll, S.; Melrose, J.; Leve, F.; Mailloux, L.; Ernst, R.; Rein, K.; Fioravanti, S.; Merani, D.; Been, R. | Conference Paper |
2020 | Security, availability, and multiple information sources: Exploring update behavior of system administrators Tiefenau, C.; Häring, M.; Krombholz, K.; Zezschwitz, E. von | Conference Paper |
2020 | Security, Privacy, and Dependability Evaluation in Verification and Validation Life Cycles for Military IoT Systems Pradhan, M.; Noll, J. | Journal Article |
2020 | Sensor path planning using reinforcement learning Hoffmann, F.; Charlish, A.; Ritchie, M.; Griffiths, H. | Conference Paper |
2020 | Technik, die den Soldaten versteht: Das Diagnosewerkzeug "RASMUS" erfasst und bewertet Nutzerzustände in Echtzeit Schwarz, Jessica; Witt, Oliver | Book Article |
2020 | Technology that understands the soldier. The RASMUS diagnostic tool for recording and evaluating user states in real time Schwarz, Jessica; Witt, Oliver | Book Article |
2020 | Time-dependent state prediction for the kalman filter based on recurrent neural networks Jung, S.; Schlangen, I.; Charlish, A. | Conference Paper |
2020 | Towards a Truly Cooperative Guidance and Control: Generic Architecture for Intuitive Human-Machine Cooperation Usai, M.; Meyer, R.; Nagahara, H.; Takeda, Y.; Flemisch, F. | Conference Paper |
2020 | Towards iteration by design: An interaction design concept for safety critical systems Witte, T.E.F.; Hasbach, J.; Schwarz, J.; Nitsch, V. | Conference Paper |
2020 | Towards robust speech interfaces for the ISS Schmitz, Hans-Christian; Kurth, Frank; Wilkinghoff, Kevin; Müllerschkowski, Uwe; Karrasch, Christian; Schmid, Volker | Conference Paper |
2020 | Track down identity leaks using threat intelligence Malderle, T.; Knauer, S.; Lang, M.; Wübbeling, M.; Meier, M. | Conference Paper |
2020 | Unveiling and Dedication of IEEE Radar Historic Milestone Griffiths, H.; Knott, P.; Koch, W. | Journal Article |
2020 | Verfahren zum Ermitteln einer Empfangsrichtung eines akustischen Signals, Auswertungsvorrichtung und System Wirth, Wulf-Dieter; Varela, Macarena; Oispuu, Marc | Patent |
2020 | Warning of Affected Users About an Identity Leak Malderle, T.; Wübbeling, M.; Knauer, S.; Meier, M. | Conference Paper |
2019 | "If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS Krombholz, K.; Busse, K.; Pfeffer, K.; Smith, M.; Zezschwitz, E. von | Conference Paper |
2019 | "If you want, I can store the encrypted password". A Password-Storage Field Study with Freelance Developers Naiakshina, A.; Danilova, A.; Gerlitz, E.; Zezschwitz, E. von; Smith, M. | Conference Paper |
2019 | Adaptive instructional systems. First International Conference, AIS 2019. Proceedings : Sottilare, Robert A.; Schwarz, Jessica | Conference Proceedings |
2019 | Affective Content Classification using Convolutional Neural Networks Claeser, Daniel | Conference Paper |
2019 | AMBOS unterstützt Kampf gegen Drohnen Stuch, Hans Peter | Journal Article |
2019 | An approach for solving real-time and synchronization issues in heterogeneous multi-processor software defined systems Troll, P.; Buchin, B.; Fazel, K.; Adrat, M. | Conference Paper |
2019 | Approaches to Prediction of Cyber Events: Report of the 2017 Specialist Meeting by the North Atlantic Treaty Organization (NATO) Research Group IST-145-RTG McCallam, Dennis; Braun, Tracy; Wunder, Michael; Santos, Eugene; Sommestad, Teodor; Elvira Arregi, Victor; Bugallo, Monica; Bowman, Elizabeth; Mittrick, Mark; Jackson, Marc; Delucia, Michael; Serban, Constantin; Sapello, Angello; Ghosh, Abhrajit; Chadha, Ritu; Llopis, Salvador; Kukkola, Juha; Nikkarila, Juha-Pekka; Ristolainen, Mari; Shearer, Greg; Leslie, Nandi; Ritchey, Paul; Nelson, Frederica; Yu, Ken | Report |
2019 | Beyond Anthropometry and Biomechanics: Digital Human Models for Modeling Realistic Behaviors of Virtual Humans Alexander, Thomas; Fromm, Lisa | Conference Paper |
2019 | A Box Particle Filter Method for Tracking Multiple Extended Objects Freitas, A. De; Mihaylova, L.; Gning, A.; Schikora, M.; Ulmke, M.; Angelova, D.; Koch, W. | Journal Article |
2019 | Christian Hülsmeyer: Invention and Demonstration of Radar, 1904 Griffiths, H.; Knott, P.; Koch, W. | Journal Article |
2019 | Cooperative automation and remote controllability of land-based weapon systems Baltzer, Marcel; Bielecki, Konrad; Flemisch, Frank; Adrat, Marc | Book Article |
2019 | Creating and Handling Ever-changing Communication Scenarios in Tactical Networks Lopes, R.R.F.; Balaraju, P.H.; Sevenich, P. | Conference Paper |
2019 | Derivation of a Model of Safety Critical Transitions between Driver and Vehicle in Automated Driving Herzberger, Nicolas D.; Voß, Gudrun M.I.; Becker, Fabian K.; Grazioli, Filippo; Altendorf, Eugen; Canpolat, Yigiterkut; Flemisch, Frank O.; Schwalm, Maximilian | Conference Paper |
2019 | Design and Evaluation of Information Bottleneck LDPC Decoders for Digital Signal Processors Lewandowsky, J.; Bauch, G.; Tschauner, M.; Oppermann, P. | Journal Article |
2019 | Development of an Air Operation eXtension with the (future) C2SIM Standard Dechand, Magdalena; Sikorski, Lukas; Trautwein, Irmtrud; Gautreau, Bruno; Bouvier, Eric; Khimeche, Lionel | Conference Paper |
2019 | Einsatzmöglichkeiten von Robotern in Brandbekämpfung und Katastrophenschutz Schneider, Frank E.; Wildermuth, Dennis; Barz, Thomas | Journal Article |
2019 | Ergonomische Gestaltung adaptierbarer Mensch-Computer-Interfaces für die Interaktion beim Gehen Conradi, Jessica | Dissertation |
2019 | Forschungsbeiträge für eine smarte Führungsunterstützung im 21. Jahrhundert: Neuronale Netze und Machine Learning für Advanced Data Analytics Geppert, Hanna; Gerz, Michael; Kurth, Frank | Journal Article |
2019 | Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie. Jahresbericht 2019/2020 | Annual Report |
2019 | Hidden in the Shadow: The Dark Web - A Growing Risk for Military Operations? Koch, R. | Conference Paper |
2019 | Human Autonomy Teaming using Cooperative Automation, Interaction Patterns and Image Schemes Baltzer, Marcel C.A.; López, Daniel; Flemisch, Frank | Conference Paper |
2019 | Human System Integration at System Limits and System Failure of Cooperatively Interacting Automobiles: Concept and First Results Flemisch, F.O.; Schwalm, M.; Meyer, R.; Altendorf, E.; Lennartz, T.; Schreck, C.; Bavendiek, J.; Herzberger, N.D. | Conference Paper, Journal Article |
2019 | In Encryption We Don't Trust: The Effect of End-to-End Encryption to the Masses on User Perception Dechand, S.; Naiakshina, A.; Danilova, A.; Smith, M. | Conference Paper |
2019 | Interaction Options for Wearables and Smart-Devices While Walking Conradi, J.; Westhoven, M.; Alexander, T. | Conference Paper |
2019 | Joining the blunt and the pointy end of the spear: Towards a common framework of joint action, human-machine cooperation, cooperative guidance and control, shared, traded and supervisory control Flemisch, F.; Abbink, D.A.; Itoh, M.; Pacaux-Lemoine, M.-P.; Weßel, G. | Journal Article |
2019 | KoGra-R: Standardisierte statistische Auswertung von Korpusrecherchen Hansen-Morath, Sandra; Schmitz, Hans-Christian; Schneider, Roman; Wolfer, Sascha | Book Article |
2019 | Kooperative Automation und Fernsteuerbarkeit von landgestützten Waffensystemen Baltzer, Marcel; Bielecki, Konrad; Flemisch, Frank | Book Article |
2019 | LEO: Liquid Exploration Online Höller, Frank; Javier Garcia Rosas, Francisco; Schulz, Dirk; Arya, Devvrat | Conference Paper |
2019 | Looking into the Future: Weaving the Threads of Vehicle Automation Borojeni, S.S.; Meschtscherjakov, A.; Pfleging, B.; Ju, W.; Flemisch, F.; Janssen, C.P.; Kun, A.L.; Riener, A. | Conference Paper |
2019 | Multifaktorielle Echtzeitdiagnose des Nutzerzustands in adaptiver Mensch-Maschine-Interaktion Schwarz, Jessica | Dissertation |
2019 | On the duality between belief networks and feed-forward neural networks Baggenstoss, Paul | Journal Article |
2019 | Probenahmevorrichtung für die mobile Manipulation Katorgin, Oleg; Schneider, Frank; Wolf, Benedikt | Patent |
2019 | Project-independent integration environment Geppert, Hanna | Book Article |
2019 | Projektunabhängige Integrationsumgebung Geppert, Hanna; Schulte, Thomas | Book Article |
2019 | Real-World Robotic Competitions for Radiological and Nuclear Inspection Tasks Schneider, F.E.; Wildermuth, D. | Conference Paper |
2019 | Recent Advancements in Digital Forensics, Pt.2 Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen | Journal Article |
2019 | Replication: No one can hack my mind revisiting a study on expert and non-expert security practices and advice Busse, K.; Schäfer, J.; Smith, M. | Conference Paper |
2019 | Roboter für Aufgaben mit Strahlenexposition Schneider, Frank E.; Wildermuth, Dennis | Journal Article |
2019 | Silent Battles: Towards Unmasking Hidden Cyber Attack Koch, R.; Golling, M. | Conference Paper |
2019 | Situational awareness, information exchange and operational control for civilian EU missions Schmitz, Hans-Christian; Deneckere, Matthias; De Zan, Tommaso; Gräther, Wolfgang | Journal Article |
2019 | Special issue on shared and cooperative control Flemisch, F.; Abbink, D.; Itoh, M.; Pacaux-Lemoine, M.P. | Journal Article |
2019 | Spline-based Robot Trajectory Generation using the Dynamic Window Approach Demir, Baran; Höller, Frank; Garcia Rosas, Francisco; Schulz, Dirk; Goerke, Nils | Conference Paper |
2019 | Syntactical Carving of PNGs and Automated Generation of Reproducible Datasets Hilgert, J.-N.; Lambertz, M.; Rybalka, M.; Schell, R. | Journal Article, Conference Paper |
2019 | Tactics for unmanned sensor platforms operating underwater with decentralised data fusion Nissen, Ivor; Goetz, Michael | Book Article |
2019 | Taktiken für unbemannte Sensorplattformen bei einer dezentralen Datenfusion unter Wasser Nissen, Ivor; Goetz, Michael | Book Article |
2019 | Towards an interaction pattern language for human machine cooperation and cooperative movement Baltzer, M.C.A.; Lopez, D.; Flemisch, F. | Journal Article |
2019 | Tracking von Objektgruppen und ausgedehnten Zielobjekten Feldmann, Michael : Hanebeck, U.D. | Dissertation |
2019 | A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right Tiefenau, C.; Zezschwitz, E. von; Häring, M.; Krombholz, K.; Smith, M. | Conference Paper |
2019 | Virtual and Augmented Reality: Innovation or Old Wine in New Bottles? Alexander, T. | Conference Paper |
2019 | Wir sind eine nette Gesellschaft Schade, Ulrich; Seitz, Josef | Journal Article |
2018 | 10 Jahre AFCEA Bonn e.V. Studienpreis Wunder, Michael | Book Article |
2018 | Accurately capturing speech feature distributions by extending supervectors for robust speaker recognition Wilkinghoff, Kevin | Conference Paper |
2018 | Acoustic event classification using multi-resolution HMM Baggenstoss, Paul | Conference Paper |
2018 | AFCEA 2018. Fraunhofer FKIE | Book |
2018 | AI research in the context of security Schade, Ulrich; Kurth, Frank | Book Article |
2018 | Anmerkungen zu KI im militärischen Bereich Schade, Ulrich | Journal Article |
2018 | Anmerkungen zu KI-Anwendungen Schade, Ulrich | Journal Article |
2018 | Anwendungen der Künstlichen Intelligenz in der einsatzbezogenen IT Gerz, Michael | Book Article |
2018 | Application of IoT in military operations in a smart city Johnsen, Frank T.; Zielinski, Zbigniew; Wrona, Konrad; Suri, Niranjan; Fuchs, Christoph; Pradhan, Manas; Furtak, Janusz; Vasilache, Bogdan; Pellegrini, Vincenzo; Dyk, Michał; Marks, Michał; Krzyszton, Mateusz | Conference Paper |
2018 | An approach to measurement-based tactical radio modeling and real time emulation Barz, C.; Fuchs, C.; Kirchhoff, J.; Krzyzek, M.; Brück, N. | Conference Paper |
2018 | Assessment of cognitive radio networks through military capability development viewpoint Tuukkanen, Topi; Couturier, Stefan; Buchin, Boyd; Bräysy, Timo; Krygier, Jaroslaw; Verheul, Erik; Nir, Vincent le; Smit, Niels | Conference Paper |
2018 | Assistenzsystem zu Ähnlichkeiten in Programmen zur Unterstützung von Täterattributen bei Malware Zwanger, Viviane | Book Article |
2018 | Auswertung von Social Media Schade, Ulrich | Book Article |
2018 | Automotive UI for controllability and safe transitions of control Borojeni, S.S.; Flemisch, F.; Baltzer, M.; Boll, S. | Conference Paper |
2018 | Bedeutung von KI und Big Data für die NATO Science & Technology Organization Wunder, Michael | Book Article |
2018 | Behaviour adaptation using interaction patterns with augmented reality elements Baltzer, M.C.A.; Lassen, C.; Lopez, D.; Flemisch, F. | Conference Paper |
2018 | Beyond Moments: Extending the Maximum Entropy Principle to Feature Distribution Constraints Baggenstoss, P.M. | Journal Article |
2018 | Beyond Situation Awareness: Considerations for Sense-Making in Complex Intelligence Operations Rein, K.; Biermann, J. | Conference Paper |
2018 | Bit-interleaved polar coded modulation with iterative decoding Saha, S.; Tschauner, M.; Adrat, M.; Schmitz, T.; Jax, P.; Vary, P. | Conference Paper |
2018 | Classification Assisted Tracking for Autonomous Driving Domain Haag, S.; Duraisamy, B.; Koch, W.; Dickmann, J. | Conference Paper |
2018 | A classify-while-track approach using dynamical tensors Govaers, F. | Conference Paper |
2018 | Click & Grasp: Assistiertes Greifen beliebiger Objekte mittels Robot Vision Schulz, Dirk | Book Article |
2018 | A cloud-based architecture for an interoperable, resilient, and scalable C2 information system Bau, Nico; Endres, Sven; Gerz, Michael; Gökgöz, Fahrettin | Conference Paper |
2018 | Consolidating principles and patterns for human-centred usable security research and development Lo Iacono, L.; Smith, Matthew; Zezschwitz, Emanuel von; Gorski, Peter Leo; Nehren, Peter | Conference Paper |
2018 | Counter drones: Tensor decompostion-based data fusion and systems design aspects Koch, W.; Govaers, F. | Conference Paper |
2018 | Cyber defence: Visualizing and analyzing netflow log-files Winkelholz, Carsten | Report |
2018 | Cyber Security of Smart Buildings Wendzel, Steffen; Tonejc, Jernej; Kaur, Jaspreet; Kobekova, Alexandra | Book Article |
2018 | Deception Task Design in Developer Password Studies: Exploring a Student Sample Naiakshina, Alena; Danilova, Anastasia; Tiefenau, Christian; Smith, Matthew | Conference Paper |
2018 | Deep Learning zur Erschließung von Massendaten für die signalbasierte Aufklärung Kurth, Frank | Book Article |
2018 | Detection of covert channels in TCP retransmissions Zillien, Sebastian; Wendzel, Steffen | Conference Paper |
2018 | Distinguishing Wanted and Unwanted Targets Using Point Processes Schlangen, I.; Degen, C.; Charlish, A. | Conference Paper |
2018 | Einsatz von Virtual Reality zur Immersionssteigerung für Hubschrauberbesatzungen - Eine empirische Vorstudie Kaufeld, Mara; Alexander, Thomas | Conference Paper |
2018 | Emerging and unconventional: New attacks and innovative detection techniques. Editorial Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian | Journal Article |
2018 | End-to-end optimization for tactical cognitive radio networks Couturier, Stefan; Bräysy, Timo; Buchin, Boyd; Krygier, Jaroslaw; Nir, Vincent le; Smit, Niels; Tuukkanen, Topi; Verheul, Erik | Conference Paper |
2018 | Entscheidungsunterstützung zur Bewertung von Domänen Albertsson, Tobias | Book Article |
2018 | Evaluation of decision making processes in critical situations Fromm, L.; Zerbes, G.; Plegge, C.; Alexander, T. | Conference Paper |
2018 | Exploiting smart city IoT for disaster recovery operations Suri, N.; Zielinski, Z.; Tortonesi, M.; Fuchs, C.; Pradhan, M.; Wrona, K.; Furtak, J.; Vasilache, D.B.; Street, M.; Pellegrini, V.; Benincasa, G.; Morelli, A.; Stefanelli, C.; Casini, E.; Dyk, M. | Conference Paper |
2018 | FKIE - verlässlicher Partner im Hintergrund Martini, Peter | Journal Article |
2018 | Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit Hilgert, Jan-Niclas; Lambertz, Martin; Yang, Shuijan | Journal Article, Conference Paper |
2018 | A framework for the segmentation and classification of 3D point clouds using temporal, spatial and semantic information Tuncer, M.A.C.; Schulz, D. | Conference Paper |
2018 | From situation awareness to intelligence: Increasing complexity in fusion models for sense-making Krenc, Ksawery; Nimier, Vincent; Rein, Kellyn; Snidaro, Lauro; Biermann, Joachim; García, Jesús | Conference Paper |
2018 | Fused Single Sensor Emitter Localization Using Time-Multiplex AOA and S4TDOA Measurements Steffes, Christian; Allmann, Clemens; Oispuu, Marc | Conference Paper |
2018 | Gathering and analyzing identity leaks for a proactive warning of affected users Malderle, Timo; Wübbeling, Matthias; Knauer, Sven; Meier, Michael | Conference Paper |
2018 | Gaussian Mixture Based Target Tracking Combining Bearing-Only Measurements and Contextual Information Ulmke, M.; Govaers, F. | Conference Paper |
2018 | A general approach to health monitoring & fault diagnosis of unmanned ground vehicles Youssef, Mahmoud Youssef; Ota, Daniel | Conference Paper |
2018 | General-Purpose Audio Tagging by Ensembling Convolutional Neural Networks based on Multiple Features Wilkighoff, Kevin | Conference Paper |
2018 | Generating natural language texts Bense, Hermann; Schade, Ulrich; Dembach, Michael | Book Article |
2018 | Gesture-based vehicle control in partially and highly automated driving for impaired and non-impaired vehicle operators: A pilot study Meyer, R.; Spee, R. von; Altendorf, E.; Flemisch, F.O. | Conference Paper |
2018 | Get Me Cited, Scotty! Analysis of Citations in Covert Channel/Steganography Research Wendzel, Steffen | Conference Paper |
2018 | Grand defence-technological challenges for Europe post-2020 : Beyerer, Jürgen (Editor); Martini, Peter (Editor) | Report |
2018 | Guest Editorial: Cognitive Radar Charlish, A.; Goodman, N.; Bell, K.; Smith, G.E. | Journal Article |
2018 | Handling vulnerabilities with mobile agents in order to consider the delay and disruption tolerant characteristic of military networks Aurisch, T.; Jacke, A. | Conference Paper |
2018 | Hunting observable objects for indication of compromise Sykosch, Arnold; Ohm, Marc; Meier, Michael | Conference Paper |
2018 | IMU based gesture recognition for mobile robot control using Online Lazy Neighborhood Graph search Kulkarni, P.; Illing, B.; Gaspers, B.; Brüggemann, B.; Schulz, D. | Conference Paper |
2018 | Information hiding. Challenges for forensic experts Mazurczyk, Wojciech; Wendzel, Steffen | Journal Article |
2018 | Informationsüberlegenheit durch taktisches Manned-Unmanned Teaming Lassen, Christian | Journal Article |
2018 | Introduction to semantic applications Bartussek, Wolfram; Bense, Hermann; Hoppe, Thomas; Humm, Bernhard G.; Reibold, Anatol; Schade, Ulrich; Siegel, Melanie; Walsh, Paul | Book Article |
2018 | IT-Sicherheit für TCP/IP- und IoT-Netzwerke Wendzel, Steffen | Book |
2018 | KI im Einsatz-Advanced Analytics & Machine Learning für sicherheitskritische Anwendungen Martini, Peter | Book Article |
2018 | KI-Forschung im Sicherheitskontext Schade, Ulrich; Kurth, Frank | Book Article |
2018 | Knowledge based anomaly detection for ground moving targets Katsilieris, F.; Charlish, A. | Conference Paper |
2018 | Kognitive Modelle für die Gestaltung und Entwicklung von Benutzungsschnittstellen Winkelholz, Carsten | Book Article |
2018 | Konzeption eines Systems zur netzwerkgestützten Ausbildung mit Mixed Reality Technologien Ripkens, A.; Alexander, T. | Conference Paper |
2018 | Künstliche Intelligenz im wehrtechnischen Umfeld - eine kritische Reflexion Govaers, Felix | Book Article |
2018 | Künstliche Intelligenz und der Faktor Mensch Alexander, Thomas | Book Article |
2018 | Learning from the best - naturalistic arbitration for cooperative driving Weßel, G.; Schreck, C.; Altendorf, E.; Canpolat, Y.; Flemisch, F. | Conference Paper |
2018 | Life-long privacy in the IoT? Measuring privacy attitudes throughout the life-cycle of IoT devices Railean, A.; Reinhardt, D. | Conference Paper |
2018 | Linear Subspaces of the Appearance Space Mylo, M.; Klein, R. | Journal Article |
2018 | Measuring the coverage of requirements through enterprise architecture models Apelt, S.; Geppert, H.; Hasso, H.; Kudla, T. | Conference Paper |
2018 | Modular verification and validation for NATO generic vehicle architecture-based land platforms Ota, Daniel; Pradhan, Manas | Conference Paper |
2018 | Multilingual named entity recognition on spanish-english code-switched tweets using support vector machines Claeser, Daniel; Kent, Samantha; Felske, Dennis | Conference Paper |
2018 | Multisensor Data Fusion for UAV Detection and Tracking Jovanoska, S.; Brötje, M.; Koch, W. | Conference Paper |
2018 | The new threats of information hiding: The road ahead Cabaj, Krzysztof; Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen; Woodward, Alan; Zander, Sebastian | Journal Article |
2018 | A newsfeed for C2 situational awareness Schmitz, Hans-Christian; Bau, Nico; Endres, Sven; Gerz, Michael; Käthner, Sylvia; Mück, Daniel | Conference Paper |
2018 | Not on my phone: Exploring users conception of related permissions Muszynska, M.; Michels, D.; Zezschwitz, E. von | Conference Paper |
2018 | On a CPD Decomposition of a Multi-Variate Gaussian Govaers, F. | Conference Paper |
2018 | On Anti-symmetry in Multiple Target Tracking Koch, W. | Conference Paper |
2018 | On Canonical Polyadic Decomposition of Non-Linear Gaussian Likelihood Functions Govaers, F. | Conference Paper |
2018 | One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels Wendzel, Steffen; Eller, Daniela; Mazurczyk, Wojciech | Conference Paper |
2018 | Parameter state estimation for bistatic sonar systems Broetje, Martina; Broetje, Lars; Ehlers, Frank | Journal Article |
2018 | Pick Me Up and I Will Tell You Who You Are: Analyzing Pick-Up Motions to Authenticate Users Haring, M.; Reinhardt, D.; Omlor, Y. | Conference Paper |
2018 | Quantum Field Theory and Tracking of Indistinguishable Targets Ulmke, M. | Conference Paper |
2018 | A queuing mechanism for delivering QoS-constrained web services in tactical networks Lopes, Roberto Rigolin F.; Viidanoja, Antti; Lhotellier, Maximilien; Diefenbach, Anne; Jansen, Norman; Ginzler, Tobias | Conference Paper |
2018 | Radar and Lidar Target Signatures of Various Object Types and Evaluation of Extended Object Tracking Methods for Autonomous Driving Applications Haag, S.; Duraisamy, B.; Koch, W.; Dickmann, J. | Conference Paper |
2018 | Readers' perception of computer-generated news: Credibility, expertise, and readability Graefe, Andreas; Haim, Mario; Haarmann, Bastian; Brosius, Hans-Bernd | Journal Article |
2018 | Realizing overlay Xcast in a tactical service infrastructure: An approach based on a service-oriented architecture Diefenbach, Anne; Lopes, Roberto Rigolin F.; Lampe, Thorsten A.; Prasse, Christoph; Śliwa, Joanna; Goniacz, Robert; Viidanoja, Antti | Conference Paper |
2018 | Research on NLP for RE at Fraunhofer FKIE: A report on grouping requirements Toews, D.; Heuss, T. | Conference Paper |
2018 | Resurrecting Portable Network Graphics using Block Generators Lambertz, Martin; Hilgert, Jan-Niclas; Schell, Roman | Journal Article, Conference Paper |
2018 | Robust detection of jittered multiply repeating audio events using iterated time-warped ACF Kurth, Frank; Wilkinghoff, Kevin | Conference Paper |
2018 | Robust speaker identification by fusing classification scores with a neural network Wilkinghoff, Kevin; Baggenstoss, Paul M.; Cornaggia-Urrigshardt, Alessia; Kurth, Frank | Conference Paper |
2018 | SAD THUG: Structural Anomaly Detection for Transmissions of High-Value Information Using Graphics Chapman, Jonathan | Conference Paper |
2018 | Sammlung geleakter Identitätsdaten zur Vorbereitung proaktiver Opfer-Warnung Malderle, Timo; Wübbeling, Matthias; Meier, Michael | Conference Paper |
2018 | Security from the core: Design of a next generation cyber resilient architecture Löw, A.; Maybaum, M. | Conference Paper |
2018 | Sequential Quantum Monte-Carlo for Tracking of Indistinguishable Targets Ulmke, M. | Conference Paper |
2018 | Session overview: Adaptation strategies and adaptation management Fuchs, S. | Conference Paper |
2018 | SLAM-based return to take-off point for UAS Bender, D.; Koch, W.; Cremers, D. | Conference Paper |
2018 | Softwareliste. Verwundbarkeiten im Unternehmen finden und verwalten Uetz, Rafael; Benthin Sanguino, Luis Alberto; Ernst, Raphael | Journal Article |
2018 | Sprachsignalverarbeitung für den Einsatz: Aktuelle Möglichkeiten und Grenzen von KI-Methoden Kurth, Frank; Zeddelmann, Dirk von | Book Article |
2018 | A Study on the Human and the Automation in Automated Driving: Getting to Know Each Other Altendorf, E.; Schütz, R.; Canpolat, Y.; Weßel, G.; Flemisch, F. | Conference Paper |
2018 | A survey of applicability of military data model architectures for smart city data consumption and integration Pradhan, Manas; Fuchs, Christoph; Johnsen, Frank T. | Conference Paper |
2018 | A survey of smart city assets for future military usage Pradhan, Manas | Conference Paper |
2018 | Time evolution for dynamic probabilistic tensors in hierarchical tucker decomposition form Govaers, F. | Conference Paper |
2018 | Toward an architecture and data model to enable interoperability between federated mission networks and IoT-enabled smart city environments Pradhan, Manas; Suri, Niranjan; Fuchs, Christoph; Bloebaum, Trude Hafsøe; Marks, Michał | Journal Article |
2018 | Towards deriving insights into data hiding methods using pattern-based approach Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof | Conference Paper |
2018 | Tracking uncertainty propagation from model to formalization: Illustration on trust assessment Dragos, V.; Dezert, J.; Rein, K. | Journal Article |
2018 | Trade-off between mental map and aesthetic criteria in simulated annealing based graph layout algorithms Slopek, A.J.; Winkelholz, C.; Varga, M. | Conference Paper |
2018 | Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services Gruss, D.; Schwarz, M.; Wübbeling, M.; Guggi, S.; Malderle, T.; More, S.; Lipp, M. | Conference Paper |
2018 | Virtual and Augmented Reality (VR/AR) in the Bundeswehr - a human-centred approach focusing on military applications Alexander, Thomas | Book Article |
2018 | Virtual Reality und Augmented Reality in der Bundeswehr - Einsatz mit dem Soldaten im Mittelpunkt Alexander, Thomas | Book Article |
2018 | Virtual tele-cooperation: Applying AR and VR for cooperative tele-maintenance and advanced distance learning Alexander, T.; Ripkens, A.; Westhoven, M.; Kleiber, M.; Pfendler, C. | Conference Paper |
2018 | Vision and driving support for shielded vehicles - implementation and test of an electronic vision replacement system with augmented reality Lopez, D.; Baltzer, M.C.A.; Lassen, C.; Flemisch, F. | Conference Paper |
2018 | Von KI zum teilautomatisierten, hochautomatisierten oder autonomen Fahren? Flemisch, Frank; Baltzer, Marcel | Book Article |
2018 | Ein Werkzeug zur automatisierten Analyse von Identitätsdaten-Leaks Malderle, Timo; Wübbeling, Matthias; Knauer, Sven; Meier, Michael | Conference Paper |
2018 | WoDiCoF - a testbed for the evaluation of (parallel) covert channel detection algorithms Keidel, Ralf; Wendzel, Steffen; Zillien, Sebastian; Conner, Eric S.; Haas, Georg | Journal Article |
2017 | Das (unheimliche und) unsichere Tal der Assistenz und Automation - Beschreibung und Absicherungsmöglichkeiten Flemisch, F.O.; Altendorf, E.; Canpolat, Y.; Weßel, G.; Baltzer, M.; Lopez, D.; Herzberger, N.D.; Voß, G.M.I.; Schwalm, M. | Journal Article |
2017 | Accumulated State Densities and Their Applications in Object Tracking Koch, W. | Book Article |
2017 | Analysis and test framework for the integration of ICT systems in the tactical domain Angelstorf, F.; Becker, A.; Jansen, N.; Noth, F. | Conference Paper |
2017 | Analysis of log-homotopy based particle flow filters Altamash Khan, M.; Ulmke, Martin; Koch, Wolfgang | Journal Article |
2017 | Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen | Conference Paper |
2017 | Approach towards achieving an interoperable C4ISR infrastructure Pradhan, M.; Tiderko, A.; Ota, D. | Conference Paper |
2017 | Approach towards achieving interoperability between military land vehicle and robotic systems Pradhan, Manas; Tiderko, Alexander; Ota, Daniel | Conference Paper |
2017 | APRIM: An account and personal information manager Hartlage, C.; Reinhardt, D. | Conference Paper |
2017 | ARC24 - A double-arch positioner for bistatic RCS measurements with four degrees of freedom Röding, M.; Sommerkorn, G.; Häfner, S.; Ihlow, A.; Jovanoska, S.; Thomä, R.S. | Conference Paper |
2017 | Architekturübergreifende Detektion von Sicherheitslücken in Software Padilla, E.; Ernst, R. | Book Article |
2017 | Array radar resource management Charlish, Alexander; Katsilieris, Fotios | Book Article |
2017 | Automated detection and closing of holes in aerial point clouds using an UAS Fiolka, T.; Rouatbi, F.; Bender, D. | Conference Paper |
2017 | Bayesian processing of big data using log homotopy based particle flow filters Khan, M.A.; Freitas, A. de; Mihaylova, L.; Ulmke, M.; Koch, W. | Conference Paper |
2017 | Bearing of unmanned aerial vehicles by a volumetric microphone array Haege, Miriam; Oispuu, Marc | Journal Article |
2017 | Bearings-only tracking and doppler-bearing tracking with inequality constraint Lai, Hoe Chee; Yang, Rong; Ng, Gee Wah; Govaers, Felix; Ulmke, Martin; Koch, Wolfgang | Conference Paper |
2017 | Benchmark of 6D SLAM (6D simultaneous localisation and mapping) algorithms with robotic mobile mapping systems Bedkowski, Janusz; Röhling, Timo; Höller, Frank; Schulz, Dirk; Schneider, Frank E. | Journal Article |
2017 | Der Bezug der Sprache auf die Welt Schmitz, Hans-Christian; Zimmermann, Thomas Ede | Book Article |
2017 | Bi- and monostatic SAR-GMTI Walterscheid, Ingo; Cristallini, Diego; Kohlleppel, Robert | Book Article |
2017 | The challenge of preparing teams for the European robotics league: Emergency Röning, J.; Kauppinen, M.; Pitkänen, V.; Kemppainen, A.; Tikanmäki, A.; Furci, M.; Palau Franco, M.; Winfield, A.; Stengler, E.; Brueggemann, B.; Schneider, F.; Castro, A.; Cordero Limon, M.; Viguria, A.; Ferri, G.; Ferreira, F.; Liu, X.; Petillot, Y.; Sosa, D. | Conference Paper |
2017 | Characterization of discrete linear shift-invariant systems Clausen, M.; Kurth, F. | Conference Paper |
2017 | CIMIC Information Management Database (CIMD) - Information and process management in Civil-Military Cooperation (CIMIC) Kaster, Jürgen; Austen, Hubert | Book Article |
2017 | Cognitive and Cooperative Assistance System (COGAS): An innovative concept to support air target identification onboard ships of the German Navy Özyurt, Emre; Kaster, Annette | Book Article |
2017 | Cognitive radar management Charlish, Alexander; Hoffmann, Folker | Book Article |
2017 | Cooperative guidance and control in highly automated convoys - StrAsRob Baltzer, Marcel; Rudolph, Claudia; Lopez Hernandez, Daniel; Flemisch, Frank | Conference Paper |
2017 | Correlation based classification of complex PRI modulation types Katsilieris, F.; Apfeld, S.; Charlish, A. | Conference Paper |
2017 | Cyber-warface-vulnerabilities of modern devices Weidenbach, Peter | Conference Paper |
2017 | Design and Analysis of Hierarchically Modulated BICM-ID Receivers With Low Inter-Layer Interferences Tschauner, M.; Oshim, M.F.T.; Adrat, M.; Antweiler, M.; Eschbach, B.; Vary, P. | Journal Article |
2017 | Detecting zero-day attacks using context-aware anomaly detection at the application-layer Duessel, Patrick; Gehl, Christian; Flegel, Ulrich; Dietrich, Sven; Meier, Michael | Journal Article |
2017 | Development and analysis of an anti-jam preprocessor for satellite navigation receivers Engel, Ulrich | Dissertation |
2017 | Distributed and collaborative malware analysis with MASS Rump, F.; Behner, T.; Ernst, R. | Conference Paper |
2017 | EnArgus 2.0 - Zentrales Informationssystem Energieforschungsförderung. Schlussbericht Oppermann, Leif; Hirzel, Simon; Krassowski, Joachim; Heiwolt, Karoline; Ruland, Rudolf; Koch, Thomas | Report |
2017 | euRathlon and ERL emergency: A multi-domain multi-robot grand challenge for search and rescue robots Winfield, Alan F.T.; Franco, Marta Palau; Brüggemann, Bernd; Castro, Ayoze; Ferri, Gabriele; Ferreira, Fausto; Liu, Xingcun; Petillot, Yvan; Roning, Juha; Schneider, Frank; Stengler, Erik; Sosa, Dario; Viguria, Antidio | Conference Paper |
2017 | Evaluating the RBM without integration using PDF projection Baggenstoss, Paul | Conference Paper |
2017 | Evaluation of the scalability of OLSRv2 in an emulated realistic military scenario Marcus, K.; Barz, C.; Kirchhoff, J.; Rogge, H.; Nilsson, J.; Velt, R. in t'; Suri, N.; Hansson, A.; Sterner, U.; Hauge, M.; Lee, K.; Holtzer, A.; Buchin, B.; Peuhkuri, M.; Misirlioglu, L. | Conference Paper |
2017 | Exploiting structural signal information in passive emitter localization Steffes, Christian | Dissertation |
2017 | Exploring Design Directions for Wearable Privacy Krombholz, Katharina; Dabrowski, Adrian; Smith, Matthew; Weippl, Edgar | Conference Paper |
2017 | Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis Hilgert, J.-N.; Lambertz, M.; Plohmann, D. | Journal Article, Conference Paper |
2017 | Finite point processes and their application to target tracking Degen, Christoph | Dissertation |
2017 | Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie. Jahresbericht 2016/2017 | Annual Report |
2017 | Future army electronic warfare - challenges for realistic training and exercise Rehbein, Berthold | Conference Paper |
2017 | The Future of Digital Forensics: Challenges and the Road Ahead Caviglione, Luca; Wendzel, Steffen; Mazurczyk, Wojciech | Journal Article |
2017 | GazeTouchPIN: Protecting sensitive data on mobile devices using secure multimodal authentication Khamis, M.; Hassib, M.; Zezschwitz, E. von; Bulling, A.; Alt, F. | Conference Paper |
2017 | Glottal Mixture Model (GLOMM) for speaker identification on telephone channels Baggenstoss, Paul; Wilkinghoff, K.; Kurth, F. | Conference Paper |
2017 | Heterogeneous tactical radio networks with flexible IP-waveforms Barz, C.; Fuchs, C.; Kirchhoff, J.; Niewiejska, J.; Rogge, H. | Conference Paper |
2017 | Hierarchical salient object detection for assisted grasping Klein, D.A.; Illing, B.; Gaspers, B.; Schulz, D.; Cremers, A.B. | Conference Paper |
2017 | A hybrid method using temporal and spatial information for 3D lidar data segmentation Tuncer, M.A.C.; Schulz, D. | Conference Paper |
2017 | Implementing human centred design in the context of a graphical user interface redesign for ship manoeuvring Costa, N.A.; Holder, E.; MacKinnon, S.N. | Journal Article |
2017 | Implementing Information and Communication Technology Onboard: An Example for the Integration of Information Received via Communication Equipment with Onboard Navigation Systems Holder, E.; Motz, F. | Book Article |
2017 | Influence of letter size on word reading performance during walking Conradi, J. | Conference Paper |
2017 | Information form distributed Kalman filtering (IDKF) with explicit inputs Pfaff, F.; Noack, B.; Hanebeck, U.D.; Govaers, F.; Koch, W. | Conference Paper |
2017 | Information management in a civilian mission EUCAP Somalia case study Schmitz, Hans-Christian; Pienemann, Reinout; Deneckere, Matthias | Conference Paper |
2017 | Inter-Protocol Steganography for Real-Time Services and its Detection Using Traffic Coloring Approach Lehner, Florian; Mazurczyk, Wojciech; Keller, Jörg; Wendzel, Steffen | Conference Paper |
2017 | Interaction patterns for cooperative guidance and control Baltzer, M.C.A.; Lopez, D.; Flemisch, F.; Weßel, G. | Conference Paper |
2017 | Interface conformance testing for future military land platforms Ota, Daniel; Hazizi, Ditmir | Conference Paper |
2017 | Interference of simulated IEEE 802.11 links with directional antennas Rademacher, M.; Jonas, K. | Conference Paper |
2017 | Introduction to real aperture array radar Nickel, Ulrich | Book Article |
2017 | Introduction to the Proceedings of the 2017 NATO Workshop on Cyber Resilience Madahar, B.; ÖZSAVAŞ, E.E.; Moller, A.; Schmidt, H.; McCallam, D.; Lorents, P.; Raugas, M. | Conference Paper |
2017 | Introductory remarks on tracking- and fusion-driven radar systems technology Koch, Wolfgang | Book Article |
2017 | Linear time fourier transforms of Sn-k-invariant functions on the symmetric group Sn Clausen, M.; Hühne, P. | Conference Paper |
2017 | Malpedia: A collaborative effort to inventorize the malware landscape Plohmann, Daniel; Clauß, Martin; Enders, Steffen; Padilla, Elmar | Presentation |
2017 | Map-based drone homing using shortcuts Bender, Daniel; Koch, Wolfgang; Cremers, Daniel | Conference Paper |
2017 | Maximum entropy PDF projection: A review Baggenstoss, P.M. | Conference Paper |
2017 | Menu styles of mobile devices and their influence on gaze behavior while walking Conradi, Jessica; Nord, Bjoern; Alexander, Thomas | Conference Paper |
2017 | Militärische Aspekte künstlicher Intelligenz Koch, Wolfgang | Journal Article |
2017 | Multidimensional real-time assessment of user state and performance to trigger dynamic system adaptation Schwarz, Jessica; Fuchs, Sven | Conference Paper |
2017 | Multiple sensor data fusion for drone defence Koch, W.; Antweiler, M. | Book Article |
2017 | Multisensorielle Drohnenabwehr Koch, W.; Antweiler, M. | Book Article |
2017 | Multistatic tracking for passive radar applications Brötje, Martina; Koch, Wolfgang | Book Article |
2017 | Network management issues in military cognitive radio networks Bräysyi, Timo; Tuukkanen, Topi; Couturier, Stefan; Verheul, Erik; Smit, Niels; Buchin, Boyd; Nir, Vincent le; Krygier, Jaroslaw | Conference Paper |
2017 | A new method and results for analyzing decision-making processes in automated driving on highways Altendorf, Eugen; Schreck, Constanze; Flemisch, Frank | Conference Paper |
2017 | Novel radar techniques and applications. Vol.1: Real aperture array radar, imaging radar, and passive and multistatic radar : Klemm, Richard; Nickel, Ulrich; Gierull, Christoph; Lombardo, Pierfrancesco; Griffiths, Hugh; Koch, Wolfgang | Book |
2017 | Novel radar techniques and applications. Vol.2: Waveform diversity and cognitive radar, and target tracking and data fusion : Klemm, Richard; Griffiths, Hugh; Koch, Wolfgang | Book |
2017 | Obstacles to the Adoption of Secure Communication Tools Abu-Salma, Ruba; Sasse, M. Angela; Bonneau, Joseph; Danilova, Anastasia; Naiakshina, Alena; Smith, Matthew | Conference Paper |
2017 | Online 3D LIDAR Monte Carlo localization with GPU acceleration Bedkowski, J.M.; Röhling, T. | Journal Article |
2017 | Passenger safety during rescue and evacuation from passenger vessels: A holistic concept for the integration of technical assistance Höckling, S.; Kunz, A.; Motz, F. | Conference Paper |
2017 | People tracking and data fusion for UWB radar applications Jovanovska, Snezhana; Govaers, Felix; Thomä, Reiner | Book Article |
2017 | Persistent maritime traffic monitoring for the Canadian Arctic Ulmke, Martin; Battistello, Giulia; Biermann, Joachim; Mohrdieck, Camilla; Pelot, Ronald; Koch, Wolfgang | Conference Paper |
2017 | Preface. Detection of Intrusions and Malware, and Vulnerability Assessment Polychronakis, M.; Meier, M. | Conference Paper |
2017 | Quality of service resource management for search strategy design in electronic support Apfeld, S.; Charlish, A.; Koch, W. | Conference Paper |
2017 | Quantum suite - a look inside the NSA toolbox Wübbeling, Matthias; Sykosch, Arnold; Meier, Michael | Conference Paper |
2017 | Quincy: Detecting host-based code injection attacks in memory dumps Barabosch,Thomas; Bergmann, Nikla; Padilla, Elmar; Dombeck, Adrian | Conference Paper |
2017 | Reactive/proactive connectivity management in a tactical service-oriented infrastructure Lopes, R.R.F.; Nieminen, M.; Viidanoja, A.; Wolthusen, S.D. | Conference Paper |
2017 | Realtime Hierarchical Clustering Based on Boundary and Surface Statistics Klein, D.A.; Schulz, D.; Cremers, A.B. | Conference Paper |
2017 | Recent Advancements in Digital Forensics. Pt.1 Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen | Journal Article |
2017 | Reclaim your prefix: Mitigation of prefix hijacking using IPsec tunnels Wübbeling, Matthias; Meier, Michael | Conference Paper |
2017 | Requirements view for enterprise architectures. A pragmatic extension to the NATO Architecture Framework Apelt, S.; Buga, I.; Geppert, H.; Hasso, H.; Kudla, T. | Conference Paper |
2017 | Robots for radiation Schneider, Frank; Gaspers, Bastian; Wildermuth, Dennis | Journal Article |
2017 | Sensor data fusion for automated threat recognition in manned-unmanned infantry platoons Wildt, J.; Varela, M.; Ulmke, M.; Brüggermann, B. | Conference Paper |
2017 | Sensor management for radar networks Charlish, Alexander; Nadjiasngar, R. | Book Article |
2017 | Shared and cooperative control of ground and air vehicles. Introduction and general overview Flemisch, F.; Canpolat, Y.; Altendorf, E.; Weßel, G.; Itoh, M.; Baltzer, M.; Pacaux-Lemoine, M.-P.; Abbink, D.; Schutte, P. | Conference Paper |
2017 | Shared information space. A solution outline for a global information grid Angelstorf, Fabian; Apelt, Stefan; Bau, Nico; Jansen, Norman; Käthner, Sylvia | Conference Paper |
2017 | Single tree detection in agro-silvo-pastoral systems from high resolution digital surface models obtained from UAV- and gyrocopter-based RGB-imaging Bareth, Georg; Bolten, Andreas; Bongartz, Jens; Jenal, Alexander; Kneer, Caspar; Lussem, Ulrike; Waldhoff, Guido; Weber, Immanuel | Poster |
2017 | Software security: Cross-platform vulnerability detection Padilla, E.; Ernst, R. | Book Article |
2017 | Software vulnerability analysis using CPE and CVE Benthin Sanguino, Luis Alberto; Uetz, Rafael | Report |
2017 | Software-Defined Wireless Mesh Networking Rademacher, M.; Jonas, K.; Siebertz, F.; Rzyska, A.; Schlebusch, M.; Kessel, M. | Journal Article |
2017 | Special issue on increasing flexibility in wireless software defined radio systems Singh, Sarvpreet; Adrat, Marc; Ulbricht, Gerald | Journal Article |
2017 | Spherical near-field scanning with pointwise probe correction Cornelius, R.; Heberling, D. | Journal Article |
2017 | Standardization to deal with multilingual information in social media during large-scale crisis situations using crisis management language Rein, Kellyn; Coote, Ravi; Sikorski, Lukas; Schade, Ulrich | Book Article |
2017 | Steganography for Cyber-physical Systems Wendzel, S.; Mazurczyk, W.; Haas, G. | Journal Article |
2017 | Target parameter estimation and array features Nickel, Ulrich | Book Article |
2017 | TDOA/TOA-based geolocation using ADS-B transponder signals - experimental results Steffes, C.; Konle, W.; Koch, W. | Conference Paper |
2017 | A Technical Review of SCA Based Software Defined Radios: Vision, Reality and Current Status Adrat, M.; Bernier, S.; Buchin, B.; Dingman, K.; Kovarik, V.; Marks, J.; Miller, S.; Muralidharan, R.; Nicollet, E.; Pucker, L.; Quintana, A.; Turner, M. | Journal Article |
2017 | Test-retest stability of EEG and eye tracking metrics as indicators of variations in user state - an analysis at a group and an individual level Schwarz, J.; Fuchs, S. | Conference Paper |
2017 | Token level code-switching detection using Wikipedia as a lexical resource Claeser, Daniel; Felske, Dennis; Kent, Samantha | Conference Paper |
2017 | Towards a dynamic selection and configuration of adaptation strategies in augmented cognition Fuchs, Sven; Schwarz, Jessica | Conference Paper |
2017 | Towards a toolkit for utility and privacy-preserving transformation of semi-structured data using data pseudonymization Kasem-Madani, Saffija; Meier, Michael; Wehner, Martin | Conference Paper |
2017 | Towards a verification and validation test framework for open system architectures Ota, Daniel; Charchalakis, Periklis; Stipidis, Elias | Conference Paper |
2017 | Trade-off analysis of a service-oriented and hierarchical queuing mechanism Lopes, Roberto Rigolin F.; Viidanoja, Antti; Lhotellier, Maximilien; Mazurkiewicz, Michal; Melis, Giampaolo; Diefenbach, Anne; Ginzler, Tobias; Jansen, Norman | Conference Paper |
2017 | UI-design and evaluation for human-robot-teaming in infantry platoons Westhoven, Martin; Lassen, Christian; Trautwein, Irmtrud; Remmersmann, Thomas; Brüggemann, Bernd | Conference Paper |
2017 | Understanding shoulder surfing in the wild: Stories from users and observers Eiband, M.; Khamis, M.; Zezschwitz, E. von; Hussmann, H.; Alt, F. | Conference Paper |
2017 | Uniform Manifold Sampling (UMS): Sampling the maximum entropy PDF Baggenstoss, Paul | Journal Article |
2017 | Using robots for firefighters and first responders: Scenario specification and exemplary system description Schneider, F.E.; Wildermuth, D. | Conference Paper |
2017 | Verfahren und Vorrichtung zur Separation und Peilung von überlagerten Signalkomponenten basierend auf einem von einem Array aus Elementen aus Sensoren oder Antennen erhaltenen Mehrkanalsignal Hermanns, Frank | Patent |
2017 | Verfahren zur Prädiktion der Wahrscheinlichkeitsdichte zumindest einer kinematischen Zustandsgröße eines sich bewegenden Objekts und Zielverfolgungsvorrichtung Demissie, Bruno | Patent |
2017 | A VHF waveform for the CORASMA simulator Couturier, Stefan; Bettinger, Olaf; Keip, Cédric | Conference Paper |
2017 | Virtual environments for competency-oriented education and training Alexander, T.; Westhoven, M.; Conradi, J. | Conference Paper |
2017 | Welcome Message from the Program Committee Chairs Sabelfeld, A.; Smith, M. | Conference Paper |
2017 | What’s going on in energy efficiency research? A platform to enhance the transparency of energy research funding in Germany Hirzel, Simon; Plötz, Patrick; Rohde, Clemens; Teufel, Benjamin; Krassowski, Joachim; Beier, Carsten; Rauscher, Thomas; Frick, Jürgen; Schreiner, Michael; Wagner, Hermann-Josef; Flamme, Stefan; Pöstges, Arne; Oppermann, Leif; Heiwolt, Karoline; Ruland, Rudolf; Sikorski, Lukas; Seier, Maximilian; Frietsch, Oliver; Koch, Thomas | Conference Paper |
2017 | Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study Naiakshina, Alena; Danilova, Anastasia; Tiefenau, Christian; Herzog, Marco; Smith, Matthew | Conference Paper |
2017 | WS-notification case study and experiment Johnsen, Frank T.; Bloebaum, Trude H.; Alcaraz Calero, Jose Maria; Wang, Qi; Nightingale, James; Manso, Marco; Jansen, Norman | Conference Paper |
2016 | "Integration - vernetzt denken, Technik verbinden" - Ideen und Denkanstöße aus der Wissenschaft Wunder, M. | Book Article |
2016 | An adaptable multimodal crew assistance system for NATO generic vehicle architecture Pradhan, M.; Ota, D. | Conference Paper |
2016 | An adaptive receiver search strategy for electronic support Apfeld, S.; Charlish, A.; Koch, W. | Conference Paper |
2016 | Advances in wireless community networks with the community-lab testbed Navarro, L.; Vinas, R.B.; Barz, C.; Bonicioli, J.; Braem, B.; Freitag, F.; Vilata-I-Balaguer, I. | Journal Article |
2016 | Analysis of BICM-ID receivers exploiting transformations of extrinsic information Adrat, M.; Lewandowsky, J.; Tschauner, M.; Antweiler, M. | Journal Article |
2016 | Analysis of sigmoid-based blind equalizer algorithms Meyer, S. | Conference Paper |
2016 | Analyzing the Spanish strip cipher by combining combinatorial and statistical methods Sanguino, L.A.B.; Leander, G.; Paar, C.; Esslinger, B.; Niebel, I. | Journal Article |
2016 | Approach towards application of commercial off-the-shelf internet of things devices in the military domain Pradhan, M.; Gökgöz, F.; Bau, N.; Ota, D. | Conference Paper |
2016 | Arms control in cyberspace - architecture for a trust-based implementation framework based on conventional arms control methods Maybaum, M.; Tölle, J. | Conference Paper |
2016 | Assessing the search and rescue domain as an applied and realistic benchmark for robotic systems Schneider, Frank E.; Wildermuth, Dennis | Conference Paper |
2016 | Automated driving using shared and cooperative guidance and control: Revisiting past research with a new model Altendorf, E.; Baltzer, M.; Canpolat, Y.; Lopez, D.; Schreck, C.; Weßel, G.; Flemisch, F. | Journal Article, Conference Paper |
2016 | A bayesian classification approach using class-specific features for text categorization Tang, B.; He, H.B.; Baggenstoss, P.M.; Kay, S. | Journal Article |
2016 | CIMIC Information Management Database (CIMD) - Informations- und Wissensmanagement in der Zivil-Militärischen Zusammenarbeit Kaster, Jürgen; Austen, Hubert | Book Article |
2016 | Class-specific model mixtures for the classification of acoustic time series Baggenstoss, Paul M.; Harrison, Brian F. | Journal Article |
2016 | Combining log-homotopy flow with tensor decomposition based solution for Fokker-Planck equation Altamash Khan, M.; Ulmke, M.; Demissie, B.; Govaers, F.; Koch, W. | Conference Paper |
2016 | Combining the glottal mixture model (GLOMM) with UBM for speaker recognition Baggenstoss, P.M. | Conference Paper |
2016 | Comparing single task assignments control with supervisory control through automated plan generation Remmersmann, T.; Schade, U.; Schlick, C.M. | Conference Paper |
2016 | A comprehensive measurement study of domain generating malware Plohmann, D.; Yakdan, K.; Klatt, M.; Bader, J.; Gerhards-Padilla, E. | Conference Paper |
2016 | Considerations for enhancing situation assessment through multi-level fusion of hard and soft data Garcia, J.; Rein, K.; Biermannn, J.; Krenc, K.; Snidaro, L. | Conference Paper |
2016 | Context exploitation for target tracking Battistello, Giulia; Mertens, M.; Ulmke, M.; Koch, W. | Book Article |
2016 | Cooperative guidance, control, and automation Flemisch, F.; Winner, H.; Bruder, R.; Bengler, K. | Book Article |
2016 | Corporate Semantic Web - Applications, Technology, Methodology: Summary of the Dagstuhl Workshop 2015 Hoppe, T.; Humm, B.; Schade, U.; Heuss, T.; Hemmje, M.; Vogel, T.; Gernhardt, B. | Journal Article |
2016 | Covert channel-internal control protocols: attacks and defense Kaur, J.; Wendzel, S.; Eissa, O.; Tonejc, J.; Meier, M. | Journal Article |
2016 | Debunking security-usability tradeoff myths Sasse, M.A.; Smith, M.; Herley, C.; Lipford, H.; Vaniea, K. | Journal Article |
2016 | Decentralized cluster detection in distributed systems based on self-organized synchronization Singh, V.; Esch, M.; Scholtes, I. | Conference Paper |
2016 | Detecting anomalous electrical appliance behavior based on motif transition likelihood matrices Reinhardt, A.; Reinhardt, D. | Conference Paper |
2016 | Developers are not the enemy!: The need for usable security APIs Green, M.; Smith, M. | Journal Article |
2016 | DGArchive - Schäden durch Schadsoftware verhindern Jopen, S. | Conference Paper |
2016 | Direct position determination for TDOA-Based single sensor localization Steffes, C.; Oispuu, M. | Journal Article |
2016 | E-Navigation Bergmann, M.; Callsen-Bracker, H.-H.; Motz, F. | Book Article |
2016 | EEF: Exponentially Embedded Families with Class-Specific Features for Classification Tang, B.; Kay, S.; He, H.; Baggenstoss, P.M. | Journal Article |
2016 | An empirical study of textual key-fingerprint representations Dechand, S.; Schürmann, D.; Busse, K.; Acar, Y.; Fahl, S.; Smith, M. | Conference Paper |
2016 | euRathlon 2015: A multi-domain multi-robot grand challenge for search and rescue robots Winfield, A.F.T.; Franco, M.P.; Brueggemann, B.; Castro, A.; Limon, M.C.; Ferri, G.; Ferreira, F.; Liu, X.; Petillot, Y.; Roning, J.; Schneider, F.; Stengler, E.; Sosa, D.; Viguria, A. | Conference Paper |
2016 | Evaluation of GSM passive radar data and its use in multistatic tracking Broetje, M.; Knoedler, B.; Koch, W. | Conference Paper |
2016 | Extending OLSRv2 for tactical applications Barz, C.; Fuchs, C.; Kirchhoff, J.; Niewiejska, J.; Rogge, H. | Conference Paper |
2016 | Fast classification of accessible terrain with a 3D laser range finder Röhling, T. | Conference Paper |
2016 | Fast moving pedestrian detection based on motion segmentation and new motion features Zhang, S.; Klein, D.A.; Bauckhage, C.; Cremers, A.B. | Journal Article |
2016 | Future digital forensics in an advanced trusted environment Maybaum, M.; Toelle, J. | Conference Paper |
2016 | GazeTouchPass: Multimodal authentication using gaze and touch on mobile devices Khamis, M.; Alt, F.; Hassib, M.; Zezschwitz, E. von; Hasholzner, R.; Bulling, A. | Conference Paper |
2016 | Ground target tracking with RCS estimation based on signal strength measurements Mertens, M.; Ulmke, M.; Koch, W.G. | Journal Article |
2016 | GSM passive coherent location signal processing: Impact on system performance Zemmari, Reda : Thomä, Reiner S.; Koch, Wolfgang; Heuberger, Albert | Dissertation |
2016 | Guest Editorial: Evolutionary advancements in wireless software defined radio systems Singh, S.; Adrat, M.; Marabissi, D.; Armani, C. | Journal Article |
2016 | H-Mode - A Haptic-Multimodal Interaction Concept for Cooperative Guidance and Control of Partially and Highly Automated Vehicles Altendorf, Eugen; Baltzer, Marcel; Heesen, Matthias; Kienle, Martin; Meier, Sonja; Weißgerber, Thomas; Flemisch, Frank | Book Article |
2016 | Head turn scaling below the threshold of perception in immersive virtual environments Westhoven, M.; Paul, D.; Alexander, T. | Conference Paper |
2016 | Head-Mounted Displays - Bedingungen des sicheren und beanspruchungsoptimalen Einsatzes. Physische Beanspruchung beim Einsatz von HMDs Theis, S.; Pfendler, C.; Alexander, T.; Mertens, A.; Brandl, C.; Schlick, C.M. | Report |
2016 | Helping Johnny to analyze malware: A usability-optimized decompiler and malware analysis user study Yakdan, K.; Dechand, S.; Gerhards-Padilla, E.; Smith, M. | Conference Paper |
2016 | A hierarchical framework to analyze shared control conflicts between human and machine Itoh, M.; Flemisch, F.; Abbink, D. | Journal Article, Conference Paper |
2016 | How to increase the security of smart buildings? Wendzel, S. | Journal Article |
2016 | Improved calculation of aS resilience against IP prefix hijacking Wübbeling, Matthias; Meier, Michael | Conference Paper |
2016 | Information hiding in communication networks : Fundamentals, mechanisms, and applications Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian; Houmansadr, Amir; Szczypiorski, Krzysztof | Book |
2016 | Integrated object segmentation and tracking for 3D LIDAR data Tuncer, M.A.C.; Schulz, D. | Conference Paper |
2016 | Interaction dialog design for the use of mobile devices while walking Conradi, Jessica; Nord, Bjoern; Alexander, Thomas | Conference Paper |
2016 | Job alerts in the wild: Study of expectations and effects of location-based notifications in an existing mobile crowdsourcing application Reinhardt, D.; Michalak, M.; Lokaiczyk, R. | Conference Paper |
2016 | Joint protection of a military formation using heterogeneous sensors in a mobile ad hoc network: Concept and field tests Hörst, J.; Govaers, F.; Rehbein, B.; Barz, C.; Sevenich, P. | Conference Paper |
2016 | Kalkuliertes Risiko. Marktübersicht Sandboxes als Komplettsysteme Clauß, Martin; Ernst, Raphael | Journal Article |
2016 | Key factors in industrial control system security Chapman, J.P.; Ofner, S.; Pauksztelo, P. | Conference Paper |
2016 | Kognitives und kooperatives Assistenzsystem COGAS: Ein innovatives Konzept zur Unterstützung der Luftzielidentifizierung an Bord von Marineschiffen Özyurt, Emre; Kaster, Annette | Book Article |
2016 | Konzeption und Entwicklung eines kognitiven und kooperativen Assistenzsystems zur interaktiven Unterstützung bei sicherheitskritischen Aufgaben Özyurt, Emre | Dissertation |
2016 | Layers of shared and cooperative control, assistance and automation Pacaux-Lemoine, M.-P.; Flemisch, F. | Journal Article, Conference Paper |
2016 | A Log homotopy based Particle Flow Solution for Mixture of Gaussian Prior Densities Khan, M.A.; Ulmke, M.; Koch, W. | Conference Paper |
2016 | Machine learning methods for anomaly detection in BACnet networks Tonejc, J.; Güttes, S.; Kobekova, A.; Kaur, J. | Journal Article |
2016 | Maximum entropy feature fusion Baggenstoss, P.M. | Conference Paper |
2016 | Message from the Program Chairs Tölle, J.; Akkaya, K. | Conference Paper |
2016 | Methoden und Systeme zur effizienten HF-Breitbandaufklärung Kurth, F. | Conference Paper |
2016 | Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions Naumann, M.; Wendzel, S.; Mazurczyk, W.; Keller, J. | Journal Article |
2016 | Micro-Doppler based detection and tracking of UAVs with multistatic radar Hoffmann, F.; Ritchie, M.; Fioranelli, F.; Charlish, A.; Griffiths, H. | Conference Paper |
2016 | Modellierung und Simulation des Menschen bei Sicherheitsaufgaben Alexander, Thomas | Book Article |
2016 | Multi-level fusion of hard and soft information for intelligence Biermann, Joachim; García, Jesús; Krenc, Ksawery; Nimier, Vincent; Rein, Kellyn; Snidaro, Lauro | Book Article |
2016 | Multi-sensor maritime monitoring for the Canadian Arctic: Case studies Battistello, G.; Gonzalez, J.; Ulmke, M.; Koch, W.; Mohrdieck, C. | Conference Paper |
2016 | Multisensorielle Drohnenabwehr. Forschungsaspekte einer Herausforderung Koch, Wolfgang | Journal Article |
2016 | Multisensorielle UAS-Abwehr - Forschungsaspekte einer technologischen Herausforderung Koch, W. | Conference Paper |
2016 | My scrawl hides it all: Protecting text messages against shoulder surfing with handwritten fonts Eiband, M.; Zezschwitz, E. von; Buschek, D.; Hußmann, H. | Conference Paper |
2016 | Nonlinear filter design using Fokker-Planck propagator in Kronecker tensor format Demissie, B.; Khan, M.A.; Govaers, F. | Conference Paper |
2016 | Observability analysis for heterogeneous passive sensors exploiting signal propagation velocities Hörst, J.; Koch, W. | Conference Paper |
2016 | On angle estimation in GSM passive coherent location systems Zemmari, R.; Knoedler, B.; Nickel, U. | Conference Paper |
2016 | On box-operations for L-values and their applicability to soft-decision algorithms Adrat, M.; Tschauner, M.; Bebawi, N.; Antweiler, M.; Eschbach, B.; Vary, P. | Conference Paper |
2016 | On importance of steganographic cost for network steganography Mazurczyk, Wojciech; Wendzel, Steffen; Azagra Villares, Ignacio; Szczypiorski, Krzysztof | Journal Article |
2016 | On quantifying the effective password space of grid-based unlock gestures Zezschwitz, E. von; Eiband, M.; Buschek, D.; Oberhuber, S.; Luca, A. de; Alt, F.; Hussmann, H. | Conference Paper |
2016 | On the detection of small UAV using a GSM passive coherent location system Knoedler, B.; Zemmari, R.; Koch, W. | Conference Paper |
2016 | OP4: An OPPortunistic Privacy-Preserving Scheme for Crowdsensing Applications Reinhardt, D.; Manyugin, I. | Conference Paper |
2016 | PASSAGES - a system for improved safety and security of maritime operations in arctic areas Biermann, J. | Conference Paper |
2016 | A population based ACO algorithm for the combined tours TSP problem Clauss, M.; Lotzmann, L.; Middendorf, M. | Conference Paper |
2016 | A position free boresight calibration for INS-camera systems Bender, D.; Cremers, D.; Koch, W. | Conference Paper |
2016 | POSTER: An educational network protocol for covert channel analysis using patterns Wendzel, S.; Mazurczyk, W. | Conference Paper |
2016 | Posture based recognition of the visual focus of attention for adaptive mobile information systems Westhoven, M.; Plegge, C.; Henrich, T.; Alexander, T. | Conference Paper |
2016 | Privacy in mobile participatory sensing: Current trends and future challenges Christin, D. | Journal Article |
2016 | Product Development Projects. Dynamics and Emergent Complexity Schlick, Christopher Marc; Demissie, Bruno | Book |
2016 | Prozesskette automatisierte Auflärung (PAA) - Unbemannte Fahrzeuge zur Aufklärungsunterstützung für einen abgesessenen Zug Brüggemann, B. | Conference Paper |
2016 | Ressourcenmanagement - Schlüsseltechnologie für Überwachung und Aufklärung Koch, W. | Conference Paper |
2016 | Robust compressive shift retrieval in linear time Clausen, M.; Kurth, F. | Conference Paper |
2016 | Robust detection of multiple bioacoustic events with repetitive structures Kurth, F. | Conference Paper |
2016 | Robust features for representing structured signal components Kurth, F. | Journal Article |
2016 | The ROS multimaster extension for simplified deployment of multi-robot systems Tiderko, A.; Höller, F.; Röhling, T. | Book Article |
2016 | Sandbox evasion the easy way - evading major commercial sandboxes Clauß, Martin; Ernst, Raphael | Conference Paper |
2016 | Scaling the world of monocular SLAM with INS-measurements for UAS navigation Bender, D.; Rouatbi, F.; Schikora, M.; Cremersy, D.; Koch, W. | Conference Paper |
2016 | Search and retrieval of human casualties in outdoor environments with unmanned ground systems - system overview and lessons learned from ELROB 2014 Brüggemann, Bernd; Wildermuth, Dennis; Schneider, Frank E. | Conference Paper |
2016 | Second IEEE workshop on pervasive energy services 2016 - Welcome and committees Reinhardt, A.; Reinhardt-Christin, D.; Duerr, F. | Conference Paper |
2016 | Security, privacy and reliability of smart buildings Wendzel, S.; Keller, J. | Journal Article |
2016 | The security-usability tradeoff myth Sasse, M.A.; Smith, M. | Journal Article |
2016 | Sense-making for intelligence analysis on social media data Pritzkau, A. | Conference Paper |
2016 | Sequential distance dependent Chinese Restaurant Processes for motion segmentation of 3D LIDAR data Tuncer, M.A.C.; Schulz, D. | Conference Paper |
2016 | Shared control is the sharp end of cooperation: Towards a common framework of joint action, shared control and human machine cooperation Flemisch, F.; Abbink, D.; Itoh, M.; Pacaux-Lemoine, M.-P.; Weßel, G. | Journal Article, Conference Paper |
2016 | Sicherheit 2016. Sicherheit, Schutz und Zuverlässigkeit : Meier, Michael; Reinhardt, Delphine; Wendzel, Steffen | Conference Proceedings |
2016 | Situationsanalyse durch multispektrale Sensordatenfusion - Architekturen und Experimente Koch, W. | Conference Paper |
2016 | SnapApp: Reducing authentication overhead with a time-constrained fast unlock option Buschek, D.; Hartmann, F.; Zezschwitz, E. von; Luca, A. de; Alt, F. | Conference Paper |
2016 | SoK: Lessons Learned from Android Security Research For Appified Software Platforms Acar, Yasemin; Backes, Michael; Bugiel, Sven; Fahl, Sascha; McDaniel, Patrick; Smith, Matthew | Conference Paper |
2016 | Survey-based exploration of attitudes to participatory sensing tasks in location-based gaming communities Reinhardt, D.; Heinig, C. | Journal Article |
2016 | TACTICS TSI architecture: A European reference architecture for tactical SOA Diefenbach, A.; Ginzler, T.; McLaughlin, S.; Sliwa, J.; Lampe, T.A.; Prasse, C. | Conference Paper |
2016 | Testing trajectories against pre-defined scenarios Krause, T.; Govaers, F.; Koch, W. | Conference Paper |
2016 | Time and frequency synchronization characteristics in rapid prototyping environments Schmidt, Philip; Meyer, Stephan; Bögel, Gerd vom; Grabmaier, Anton | Conference Paper |
2016 | Towards duty - BML communication enables a multi-robot system supporting an infantry platoon Remmersmann, T.; Trautwein, I.; Schade, U.; Brüggemann, B.; Lassen, C.; Westhoven, M.; Wolski, M. | Conference Paper |
2016 | Tracking and counting multiple people using distributed seismic sensors Damarla, T.; Oispuu, M.; Schikora, M.; Koch, W. | Conference Paper |
2016 | Tracking and Data Fusion for Ground Surveillance Mertens, M.; Feldmann, M.; Ulmke, M.; Koch, W. | Book Article |
2016 | Trajectory optimization for multi-platform bearing-only tracking with ghosts Hoffmann, F.; Charlish, A.; Koch, W. | Conference Paper |
2016 | Tutorial on prototyping the HMI for autonomous vehicles: A human centered design approach Gowda, N.; Sirkin, D.; Ju, W.; Baltzer, M. | Conference Paper |
2016 | Unbemannte Systeme zur Unterstützung eines Infanteriezuges Brüggemann, Bernd; Schade, Ulrich; Schulz, Lothar | Journal Article |
2016 | Unified description for network information hiding methods Wendzel, S.; Mazurczyk, W.; Zander, S. | Journal Article |
2016 | Unmanned systems for radiological and nuclear measuring and mapping Schneider, Frank E.; Gaspers, Bastian; Tiderko, Alexander; Katorgin, Oleg; Wildermuth, Dennis | Conference Paper |
2016 | Usable Security - The Source Awakens Smith, Matthew | Non Book Material |
2016 | Using probabilistic multipath routing to improve route stability in MANETs Rump, F.; Jopen, S.A.; Frank, M. | Conference Paper |
2016 | Vorrichtung und Verfahren zum Einschränken einer Ursprungsmenge von Programmfragmenten auf eine Teilmenge von Programmfragmenten Eschweiler, Sebastian | Patent |
2016 | What's in a message? Exploring dimensions of trust in reported information Dragos, V.; Rein, K. | Conference Paper |
2016 | You can't watch this! Privacy-respectful photo browsing on smartphones Zezschwitz, E. von; Ebbinghaus, S.; Hussmann, H.; Luca, A. de | Conference Paper |