Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Angewandte Informatik

Informatik / Hochschule Worms

Erenburgerstr. 19, 67549 Worms
  • 06241/509-128
Publikationen
Ergebnisse pro Seite:  100

Diller, Florian; Püschel, Fabian; Stockemer, Julian et al.

Holistic Approach to Modular Open Educational Resources for Computer Graphics

Eurographics Education Papers.


Wendzel, Steffen; Wressnegger, Christian; Hartmann, Laura et al.

Sicherheit 2024: Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)

Bonn. 2024 306 S. (LNI P-345)


Kohler, Jens

Comparison of a FaaS- and SaaS-Based ETL Process in a Cloud Environment

6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech). Bd. 11. IEEE 2023 S. 49 - 56


Lilligreen, Gergana; Wiebel, Alexander

Near and Far Interaction for Outdoor Augmented Reality Tree Visualization and Recommendations on Designing Augmented Reality for Use in Nature

SN Computer Science. Bd. 4. H. 3. Springer LLC 2023 S. 24801 - 24813


Lilligreen, Gergana; Henkel, Nico; Wiebel, Alexander

Near and Far Interaction for Augmented Reality Tree Visualization Outdoors

Proceedings of the 17th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications. Setúbal: Scitepress 2022 S. 27 - 35


Eschbach, Robin; Messerschmidt, Kai; Keidel, Ralf et al.

Semi-Automatic Particle Tracking for and Visualization of Particle Detector Data

Bender, Jan; Botsch, Mario; Keim, Daniel A. (Hrsg). Proceedings Vision, Modeling, and Visualization. Genf: The Eurographics Association 2022 8 S.


Diller, Florian; Scheuermann, Gerik; Wiebel, Alexander

Visual Cue Based Corrective Feedback for Motor Skill Training in Mixed Reality: A Survey

Transactions on Visualization and Computer Graphics. Bd. To Appear. IEEE 2022 S. 1


Samsami, Nima; Kurpjuweit, Stephan

A Reference Model for Dialog Management in Conversational Agents in High-Engagement Use Cases

Artificial Intellgence -- Application in Life Sciences and Beyond. The Upper Rhine Artificial Intelligence Symposium. Bd. UR-AI 2021. 2021 S. 167 - 174


Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.

A Revised Taxonomy of Steganography Embedding Patterns

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 12


Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura et al.

Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels

Computers & Security. Bd. 104. Elsevier BV 2021 S. 102207


Vrhovec, Simon; Caviglione, Luca; Wendzel, Steffen

Crème de la Crème: Lessons from Papers in Security Publications

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 9


Distante, Damiano; Faralli, Stefano; Rittinghaus, Steve et al.

DomainSenticNet: An Ontology and a Methodology Enabling Domain-Aware Sentic Computing

Cognitive Computation. Bd. 14. H. 1. Springer LLC 2021 S. 62 - 77


Faralli, Stefano; Rittinghaus, Steve; Samsami, Nima et al.

Emotional Intensity-based Success Prediction Model for Crowdfunded Campaigns

Information Processing & Management. Bd. 58. H. 1. Elsevier B.V. 2021 102394


Schmidbauer, Tobias; Wendzel, Steffen

Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 15


Pettersen, Helge Egil Seime; Aehle, Max; Alme, Johan et al.

Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks

Acta Oncologica. Bd. 60. H. 11. Taylor & Francis 2021 S. 1413 - 1418


Zillien, Sebastian; Wendzel, Steffen

Reconnection-based Covert Channels in Wireless Networks

Jøsang A. ; Futcher L. ; Hagen J. (Hrsg). ICT Systems Security and Privacy Protection : 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings. Cham: Springer International Publishing 2021 S. 118 - 133 (IFIP Advances in Information and Communication Technology, 1868-4238 ; 625)


Lilligreen, Gergana; Marsenger, Philipp; Wiebel, Alexander

Rendering Tree Roots Outdoors: A Comparison Between Optical See Through Glasses and Smartphone Modules for Underground Augmented Reality Visualization

Lecture Notes in Computer Science. Cham: Springer 2021 S. 364 - 380


Keller, Jörg; Wendzel, Steffen

Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains

Applied Sciences. Bd. 11. H. 2. Basel, Schweiz: MDPI 2021 S. 731 - 742


Mileva, Aleksandra; Caviglione, Luca; Velinov, Aleksander et al.

Risks and Opportunities for Information Hiding in DICOM Standard

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 8


Rambach, Jason; Lilligreen, Gergana; Schäfer, Alexander et al.

A survey on applications of augmented, mixed and virtual reality for nature and environment

arXiv: Cornell University 2020 2008.12024


Hartmann, Laura; Wendzel, Steffen

Anomaly Detection in ICS based on Data-history Analysis

Proceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2


Wiebel, Alexander; Keuchel, Sascha; Eckenfels, Magnus et al.

Challenges of and Recommendations for Combining 6-DOF Spatial VR-Interaction with Spherical Videos

Institute of Electrical and Electronics Engineers (IEEE) (Hrsg). TechRxiv. Piscataway: Institute of Electrical and Electronics Engineers (IEEE) 2020 10 S.


Keller, Jörg; Wendzel, Steffen

Covert Channels in One-Time Passwords Based on Hash Chains

EICC 2020: Proceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2


Schmidbauer, Tobias; Wendzel, Steffen

Covert storage caches using the NTP protocol.

ARES. 2020 S. 67:1 - 67:10


Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.

Design and performance evaluation of reversible network covert channels.

ARES. 2020 S. 68:1 - 68:8


Wendzel, Steffen

Network Information Hiding: Terminology, Taxonomy, Methodology and Countermeasures

Hagen (FernUniversität in Hagen). 2020 244 S.


Wendzel, Steffen

Review of the book Future Automation: Changes to Lives and to Businesses by Carone, T. (World Scientific Publishing Co, Inc., 2018)

ACM (Hrsg). ACM Computing Reviews. New York City: ACM 2020 Review Item CR147026


Wendzel, Steffen; Caviglione, Luca; Checco, Alessandro et al.

Special Issue Editorial: Information Security Methodology, Replication Studies and Information Security Education

Journal of Universal Computer Science (J.UCS). Bd. 26. H. 7. Klagenfurt. 2020 S. 762 - 763


Drengner, Jan; Wiebel, Alexander

Virtuelle Realität im Veranstaltungsmanagement - Einsatz, Nutzen und Herausforderungen

Zanger, Cornelia (Hrsg). Events und Messen im digitalen Zeitalter. Wiesbaden: Springer Fachmedien 2020 S. 15 - 36


Bruckner, Stefan; Ropinski, Timo; Isenberg, Tobias et al.

A Model of Spatial Directness in Interactive Visualization

IEEE Transactions on Visualization and Computer Graphics. Bd. 25. H. 8. IEEE 2019 S. 2541 - 2528 Online as early access since June 2018


Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen

Advanced Information Hiding Techniques for Modern Botnets

Kambourakis, Georgios; Anagnostopoulos, Marios; Meng, Weizhi; Zhou, Peng (Hrsg). Botnets: Architectures, Countermeasures, and Challenges. 1. Aufl. Boca Raton, FL: Taylor & Francis Group / CRC Press 2019 S. 165 - 188 (CRC Series in Security, Privacy and Trust)


Lilligreen, Gergana; Keuchel, Sascha; Wiebel, Alexander

Augmented Reality in Higher Education: An Active Learning Approach for a Course in Audiovisual Production

16th EuroVR International Conference - EuroVR 2019. Tallin. 2019 S. 1 To appear


Lilligreen, Gergana; Wiebel, Alexander

Augmented Reality in Vorlesung und Übung: Lehre und Interaktion neu gedacht

Barton, Thomas ; Müller, Christian ; Seel, Christian (Hrsg). Hochschulen in Zeiten der Digitalisierung : Lehre, Forschung und Organisation. Wiesbaden: Springer Vieweg 2019 S. 221 - 238 (Angewandte Wirtschaftsinformatik)


Mazurczyk, Wojciech; Wendzel, Steffen; Chourib, Mehdi et al.

Countering adaptive network covert communication with dynamic wardens

Future Generation Computer Systems. Bd. 94. Elsevier BV 2019 S. 712 - 725


Velinov, Aleksandar; Wendzel, Steffen; Mileva, Aleksandra et al.

Covert Channels in the MQTT-Based Internet of Things

IEEE ACCESS. Bd. 7. IEEE 2019 S. 161899 - 161915


Wendzel, Steffen; Link, Florian; Eller, Daniela et al.

Detection of Size Modulation Covert Channels Using Countermeasure Variation

Journal of Universal Computer Science (JUCS). Bd. 25. H. 11. Klagenfurt: Universität Graz 2019 S. 1396 - 1416


Wendzel, Steffen; Plötner, Johannes

Einstieg in Linux : Linux lernen, verstehen und einsetzen, inkl. Einführung in die Linux-Shell. Das Buch für alle Linux-Anfänger

8., aktualisierte Auflage. Aufl. Bonn: Rheinwerk Computing 2019 410 S.


Wang, Qi; M. Alcaraz Calero, Jose; Ricart-Sanchez, Ruben et al.

Enable Advanced QoS-Aware Network Slicing in 5G Networks for Slice-Based Media Use Cases.

IEEE Trans. Broadcast. Bd. 65. H. 2. 2019 S. 444 - 453


Schmidbauer, Tobias; Wendzel, Steffen; Mileva, Aleksandra et al.

Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks

Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 10


Wendzel, Steffen; Lévy-Bencheton, Cédric; Caviglione, Luca

Not all areas are equal: analysis of citations in information security research

Scientometrics. Bd. 122. H. 1. Springer Science and Business Media LLC 2019 S. 267 - 286


Drengner, Jan; König, Werner; Wiebel, Alexander

Pervasive mobile Spiele und Virtual Reality als Instrumente der digitalen Ansprache von Veranstaltungsbesuchern: Auf schaz-Suche beim Rheinland-Pfalz-Tag 2018

Zanger, Cornelia (Hrsg). Eventforschung. Wiesbaden: Springer Fachmedien Wiesbaden 2019 S. 227 - 245


Wendzel, Steffen

Protocol-independent Detection of "Messaging Ordering" Network Covert Channels

Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 8


Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen

Recent Advancements in Digital Forensics, Part 2

IEEE Security & Privacy. Bd. 17. H. 1. 2019 S. 7 - 8


Lv, Zhihan; Mazurczyk, Wojciech; Wendzel, Steffen et al.

Recent Advances in Cyber-Physical Security in Industrial Environments

IEEE Transactions on Industrial Informatics. Bd. 2019. Institute of Electrical and Electronics Engineers (IEEE) 2019 S. 1


Mazurczyk, Wojciech; Szary, Przemysław; Wendzel, Steffen et al.

Towards Reversible Storage Network Covert Channels

Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19. New York: ACM Press 2019 S. 1 - 8


Zillien, Sebastian; Wendzel, Steffen

Detection of Covert Channels in TCP Retransmissions

Gruschka, Nils (Hrsg). Proc. 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Cham: Springer International Publishing 2018 S. 203 - 218 (LNCS 11252)


Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen et al.

Emerging and Unconventional: New Attacks and Innovative Detection Techniques

Security and Communication Networks. Bd. 2018. Hindawi Limited 2018 S. 1



Mazurczyk, Wojciech; Wendzel, Steffen

Information hiding: Challenges for forensic experts.

Commun. ACM. Bd. 61. H. 1. 2018 S. 86 - 94


Wendzel, Steffen; Olschewski, Detlef

Internet of Things und Smart Contracts: Risiken bei der Digitalisierung von Unternehmen

Barton, Thomas; Müller, Christian; Seel, Christian (Hrsg). Digitalisierung in Unternehmen. Wiesbaden: Springer-Vieweg 2018 S. 291 - 302 (Angewandte Wirtschaftsinformatik)


Wendzel, Steffen

IT-Sicherheit für TCP/IP- und IoT-Netzwerke : Grundlagen, Konzepte, Protokolle, Härtung

1. Aufl. Wiesbaden: Springer Fachmedien Wiesbaden GmbH, Springer Vieweg 2018 354 S.


Wendzel, Steffen; Eller, Daniela; Mazurczyk, Wojciech

One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels

Proceedings of the Central European Cybersecurity Conference 2018 - CECC 2018. New York, NY, USA: ACM Press 2018 S. 1 - 6



Cabaj, Krzysztof; Caviglione, Luca; Mazurczyk, Wojciech et al.

The New Threats of Information Hiding: The Road Ahead

IT Professional. Bd. 20. H. 3. Institute of Electrical and Electronics Engineers (IEEE) 2018 S. 31 - 39


Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof

Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.

ARES. 2018 S. 10:1 - 10:10


Keidel, Ralf; Wendzel, Steffen; Zillien, Sebastian et al.

WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms.

J. UCS. Bd. 24. H. 5. 2018 S. 556 - 576


Santos, Ricardo; Bozakov, Zdravko; Mangiante, Simone et al.

A NEAT framework for application-awareness in SDN environments.

Networking. 2017 S. 1 - 2


Bozakov, Zdravko; Mangiante, Simone; Hernandez Benet, Cristian et al.

A NEAT framework for enhanced end-host integration in SDN environments.

NFV-SDN. 2017 S. 1 - 7


Weinrank, Felix; Grinnemo, Karl-Johan; Bozakov, Zdravko et al.

A NEAT Way to Browse the Web.

ANRW. 2017 S. 33 - 34


Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen

Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators.

IEEE Symposium on Security and Privacy Workshops. 2017 S. 17 - 22


Wendzel, Steffen; Tonejc, Jernej; Kaur, Jaspreet et al.

Cyber Security of Smart Buildings

H. Song, G. Fink, S. Jeschke (Hrsg). Security and Privacy in Cyber-Physical Systems: Foundations and Applications. 1. Aufl. Hoboken: Wiley-IEEE 2017 S. 327 - 352 Chapter 16


Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg

Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems.

IEEE Symposium on Security and Privacy Workshops. Bd. 1. San Jose, CA, USA. 2017 S. 29 - 34


Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen

Enhanced Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic PRNGs

Journal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 147 - 170


Lehner, Florian; Mazurczyk, Wojciech; Keller, Jörg et al.

Inter-protocol Steganography for Real-time Services and Its Detection Using Traffic Coloring Approach

Proc. 42th IEEE Local Computer Networks (LCN) Conference. Singapore: IEEE 2017 S. 78 - 85


Khademi, Naeem; Ros, David; Welzl, Michael et al.

NEAT: A Platform- and Protocol-Independent Internet Transport API.

IEEE Commun. Mag. Bd. 55. H. 6. 2017 S. 46 - 54


Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.

Network Information Hiding and Science 2.0: Can it be a Match?

Int. Journal of Electronics and Communications. Bd. 63. H. 2. 2017 S. 217 - 222


Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen

Recent Advancements in Digital Forensics.

IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 10 - 11


Wendzel, Steffen

Review of `Out-of-band Covert Channels--A Survey'

ACM Computing Reviews. Bd. 58. H. 1. ACM 2017 S. 49


Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg

Steganography for Cyber-physical Systems

Journal of Cyber Security and Mobility (JCSM). Bd. 6. H. 2. River Publishers 2017 S. 105 - 126


Caviglione, Luca; Wendzel, Steffen; Mazurczyk, Wojciech

The Future of Digital Forensics: Challenges and the Road Ahead.

IEEE Security & Privacy. Bd. 15. H. 6. 2017 S. 12 - 17


Kobekova, Alexandra; Bültermann, Lennart; Tonejc, Jernej et al.

Was bedeutet das IT-Sicherheitsgesetz für Smart Buildings? Konzepte des sicheren Alterns der Gebäude-IT

Tagungsband zum 15. Deutscher IT-Sicherheitskonress des BSI. Bonn: SecuMedia Verlags-GmbH 2017 S. 515 - 526


Koch, Stefan; Kasten, Jens; Wiebel, Alexander et al.

2D Vector field approximation using linear neighborhoods.

The Visual Computer. Bd. 32. H. 12. 2016 S. 1563 - 1578


Kaur, Jaspreet; Wendzel, Steffen; Eissa, Omar et al.

Covert channel-internal control protocols: attacks and defense

Security and Communication Networks. Bd. 9. H. 15. Wiley-Blackwell 2016 S. 2986 - 2997


Wendzel, Steffen; Plötner, Johannes

Einstieg in Linux:Linux verstehen und einsetzen

7., aktualisierte Auflage. Aufl. Bonn: Rheinwerk 2016 409 S.


Wendzel, Steffen

How to increase the security of smart buildings?

Commun. ACM. Bd. 59. H. 5. 2016 S. 47 - 49


Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian et al.

Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications

1. Aufl. New York, NY: John Wiley & Sons 2016 288 S. (IEEE Press Series on Information and Communication Networks Security)


Wendzel, Steffen; Kasem-Madani, Saffija

IoT Security: The Improvement-Decelerating 'Cycle of Blame'

Journal of Cyber Security and Mobility (JCSM), 'Opinion'-Beitrag. Gistrup/Delft: River Publishers 2016


Bozakov, Zdravko; Rizk, Amr; Bhat, Divyashri et al.

Measurement-based flow characterization in centrally controlled networks.

INFOCOM. 2016 S. 1 - 9


Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.

Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions

Security and Communication Networks. Bd. 9. H. 15. 2016 S. 2972 - 2985


Mazurczyk, Wojciech; Wendzel, Steffen; Azagra Villares, Ignacio et al.

On importance of steganographic cost for network steganography.

Security and Communication Networks. Bd. 9. H. 8. 2016 S. 781 - 790


Wendzel, Steffen; Mazurczyk, Wojciech

POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns.

ACM Conference on Computer and Communications Security. 2016 S. 1739 - 1741


Wendzel, Steffen; Keller, Jörg

Security, Privacy and Reliability of Smart Buildings.

J. UCS. Bd. 22. H. 9. 2016 S. 1201 - 1202



Eberle, Martin; König, Werner; Drengner, Jan

Storytelling App – jüdische Geschichte mobil erleben

Hess, Stefan; Fischer, Holger (Hrsg). UP 2016. Aachen: Gesellschaft für Informatik e.V. und die German UPA e.V 2016


Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian

Unified Description for Network Information Hiding Methods.

J. UCS. Bd. 22. H. 11. 2016 S. 1456 - 1486


Schneider, Florian; König, Werner; Keßler, Thomas

Vinocheck App – UX Konzept und Realisierung

Hess, Stefan; Fischer, Holger (Hrsg). UP 2016. Aachen: Gesellschaft für Informatik e.V. und die German UPA e.V 2016



Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen

"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography.

CoRR. Bd. abs/1508.04978. 2015


Szczypiorski, Krzysztof; Janicki, Artur; Wendzel, Steffen

“The Good, The Bad and The Ugly”: Evaluation of Wi-Fi Steganography

JCM (Journal of Communications). Bd. 10. H. 10. Engineering and Technology Publishing 2015 S. 747 - 752


Caviglione, Luca; Lalande, Jean-François; Mazurczyk, Wojciech et al.

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.

HCI (22). 2015 S. 165 - 177


Anhaus, Eva Maria; Wendzel, Steffen

BACtag: Data Leakage Protection für Gebäude

Tagungsband der D-A-CH Security 2015. St. Augustin. 2015 S. 1 - 12


Kaur, Jaspreet; Wendzel, Steffen; Meier, Michael

Countermeasures for Covert Channel-Internal Control Protocols.

ARES. 2015 S. 422 - 428


Wendzel, Steffen; Palmer, Carolin

Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research.

J. UCS. Bd. 21. H. 12. 2015 S. 1684 - 1705


Wiebel, Alexander; Bruckner, Stefan; Ropinski, Timo

Direct Volume Interaction for Visual Data Analysis

IEEE VIS 2015 Conference (Tutorials). Chicago. 2015


Naumann, Matthias; Wendzel, Steffen; Mazurczyk, Wojciech et al.

Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions.

CoRR. Bd. abs/1505.07757. 2015


Kaur, Jaspreet; Herdin, Christian; Tonejc, Jernej et al.

Novel Approaches for Security in Building Automation Systems

Tagungsband des 14. Sicherheitskongress des BSI. Bonn. 2015 S. 145 - 158


Wendzel, Steffen; Zander, Sebastian; Fechner, Bernhard et al.

Pattern-Based Survey and Categorization of Network Covert Channel Techniques.

ACM Comput. Surv. Bd. 47. H. 3. 2015 S. 50


Kaur, Jaspreet; Tonejc, Jernej; Wendzel, Steffen et al.

Securing BACnet's Pitfalls.

SEC. 2015 S. 616 - 629


Wiebel, Alexander; Isenberg, Tobias; Bruckner, Stefan et al.

Tools and Techniques for Direct Volume Interaction.

Eurographics (Tutorials). 2015


Wendzel, Steffen; Mazurczyk, Wojciech; Zander, Sebastian

Unified Description for Network Information Hiding Methods.

CoRR. Bd. abs/1512.07438. 2015