Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen

Angewandte Informatik

Informatik / Hochschule Worms

Erenburgerstr. 19, 67549 Worms
  • 06241/509-128
Publikationen
PDF | RTF
Ergebnisse pro Seite:  10

Wendzel, Steffen; Keller, Jörg

Hidden and under control - A survey and outlook on covert channel-internal control protocols.

Ann. des Télécommunications. Bd. 69. H. 7-8. 2014 S. 417 - 430


Wendzel, Steffen; Herdin, Christian; Wirth, Roman et al.

Mosaic-chart based Visualization in Building Automation Systems

Proceedings Future Security 2014. Berlin: Fraunhofer Verlag 2014 S. 687 - 690


Mazurczyk, Wojciech; Wendzel, Steffen; Azagra Villares, Ignacio et al.

On Importance of Steganographic Cost For Network Steganography.

CoRR. Bd. abs/1406.2519. 2014


Hlawitschka, Mario; Hotz, Ingrid; Kratz, Andrea et al.

Top Challenges in the Visualization of Engineering Tensor Fields.

Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data. 2014 S. 3 - 15


Bozakov, Zdravko; Papadimitriou, Panagiotis

Towards a scalable software-defined network virtualization platform.

NOMS. 2014 S. 1 - 8


Szlósarczyk, Sebastian; Wendzel, Steffen; Kaur, Jaspreet et al.

Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet.

Sicherheit. 2014 S. 407 - 418


Stoppel, Sergej; Hege, Hans-Christian; Wiebel, Alexander

Visibility-Driven Depth Determination of Surface Patches in Direct Volume Rendering

EuroVis Short Papers 2014. Swansea: Eurographics Association 2014 S. 97 - 101


Rizk, Amr; Bozakov, Zdravko; Fidler, Markus

Estimating traffic correlations from sampling and active network probing.

Networking. 2013 S. 1 - 9


Lalande, Jean-François; Wendzel, Steffen

Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels.

ARES. 2013 S. 701 - 710


Kahler, Benjamin; Wendzel, Steffen

How to own a Building? Wardriving gegen die Gebäude-Automation

Tagungsband des 20. DFN Workshop „Sicherheit in vernetzten Systemen“. Hamburg. 2013 S. 1 - 13