Diller, Florian; Püschel, Fabian; Stockemer, Julian et al.
Holistic Approach to Modular Open Educational Resources for Computer GraphicsEurographics Education Papers.
Mulawade, Raju N.; Garth, Christoph; Wiebel, Alexander et al.
Visual Analytics System for Understanding DeepRL-Based Charged Particle TrackingThe Visual Computer. Springer
Diller, Florian; Wiebel, Alexander; Scheuermann, Gerik
Automatic Viewpoint Selection for Interactive Motor Feedback Using Principal Component AnalysisProceedings of the 19th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - HUCAPP. Bd. 1. 2024 S. 350 - 361
Peuker, Andreas; Barton, Thomas
Comparison of Different Keyword Extractors for an Automated Literature ReviewStephan Böhm, Sid Suntrayuth (Hrsg). Proceedings of the IWEMB 2021 and 2022: Fifth and Sixth International Workshop on Entrepreneurship, Electronic and Mobile Business. Online: PubliQation 2024 S. 143 - 156
Wendzel, Steffen; Wressnegger, Christian; Hartmann, Laura et al.
Sicherheit 2024: Beiträge der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)Bonn. 2024 306 S. (LNI P-345)
Barton, Thomas; Müller, Christian
Apply Data ScienceWiesbaden: Springer Fachmedien 2023 232 S.
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech
Avoiding Research Tribal Wars Using TaxonomiesComputer. Bd. 56. H. 1. Institute of Electrical and Electronics Engineers (IEEE) 2023 S. 93 - 96 10008941
Kohler, Jens
Comparison of a FaaS- and SaaS-Based ETL Process in a Cloud Environment6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech). Bd. 11. IEEE 2023 S. 49 - 56
Barton, Thomas; Müller, Christian
Data Science: From Concept to ApplicationBarton, Thomas; Müller, Christian (Hrsg). Apply Data Science. Wiesbaden: Springer 2023 S. 3 - 9
Barton, Thomas; Peuker, Andreas
Extraktion und Analyse von Schlüsselwörtern für eine automatisierte Literaturauswertung zum Thema EmpfehlungssystemeHMD: Praxis der Wirtschaftsinformatik. Bd. 60. H. 6. Springer 2023 S. 1312 - 1327
Lilligreen, Gergana; Wiebel, Alexander
Near and Far Interaction for Outdoor Augmented Reality Tree Visualization and Recommendations on Designing Augmented Reality for Use in NatureSN Computer Science. Bd. 4. H. 3. Springer LLC 2023 S. 24801 - 24813
Peuker, Andreas; Barton, Thomas
Recommendation Systems and the Use of Machine Learning MethodsApply Data Science. Wiesbaden: Springer Fachmedien 2023 S. 79 - 93
Barton, Thomas; Kokoev, Arthur
Text Mining in Scientific Literature Evaluation: Extraction of Keywords for Describing ContentBarton, Thomas; Müller, Christian (Hrsg). Apply Data Science. Wiesbaden: Springer 2023 S. 181 - 187
Schilling, Alexander; Aehle, Max; Alme, Johan et al.
Uncertainty-aware spot rejection rate as quality metric for proton therapy using a digital tracking calorimeterPhysics in Medicine & Biology. Bd. 68. H. 19. IOP Publishing 2023 194001
Zillien, Sebastian; Wendzel, Steffen
Weaknesses of popular and recent covert channel detection methods and a remedyIEEE Transactions on Dependable and Secure Computing. Bd. 20. H. 6. Institute of Electrical and Electronics Engineers (IEEE) 2023 S. 5156 - 5157
Czarnecki, Christian; Barton, Thomas; G. Meister, Vera et al.
Wirtschaftsinformatik an Hochschulen Angewandter Wissenschaften (Workshop).GI-Jahrestagung. 2023 S. 147 - 148
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
A Generic Taxonomy for Steganography MethodsNew York: Institute of Electrical and Electronics Engineers (IEEE) 2022 (TechRxiv)
Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Analysis of Reversible Network Covert ChannelsIEEE Access. Bd. 10. Institute of Electrical and Electronics Engineers (IEEE) 2022 S. 41226 - 41238
Barton, Thomas; Peuker, Andreas
Analysis of Travel Blogs by Means of Bayesian Statistics: First Insights for Destinations in Australia and New ZealandBöhm, Stephan; Suntrayuth, Sid (Hrsg). Proceedings of the IWEMB 2020: Fourth International Workshop on Entrepreneurship in Electronic and Mobile Business. Norderstedt: PubliQation - Wissenschaft veröffentlichen 2022 S. 9 - 22
Hartmann, Laura; Wendzel, Steffen
Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project HistoryJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 13. H. 3. Innovative Information Science & Technology Research Group (ISYOU) 2022 S. 4 - 24
Schmidbauer, Tobias; Keller, Jörg; Wendzel, Steffen
Challenging Channels: Encrypted Covert Channels within Challenge-Response AuthenticationProceedings of the 17th International Conference on Availability, Reliability and Security. New York: ACM 2022 S. 1 - 10 50:1-10
Simon, Carlo; Zakfeld, Lara; Haag, Stefan
Das Process-Simulation: Center Prototyp eines Integrierten Managementsystems für Lehre, Forschung und PraxisEggert, Sandy; Lemke, Claudia; Majuntke, Verena; Malzahn, Birte; Meister, Vera G.; Simbeck, Katharina; Czarnecki, Christian; Wolf, Martin (Hrsg). AKWI-Tagungsband zur 35. AKWI-Jahrestagung. Berlin: GITO 2022 S. 344 - 351
Schmidbauer, Tobias; Wendzel, Steffen
Detection Of Computational Intensive Reversible Covert Channels Based On Packet RuntimeJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Bd. 13. H. 1. 2022 S. 137 - 166
Wendzel, Steffen; Schmidbauer, Tobias; Zillien, Sebastian et al.
Did You See That? A Covert Channel Exploiting Recent Legitimate TrafficCornell University: arXiv 2022 2212.11850
Simon, Carlo
Digitalisierung und Industrie 4.0Arnold, Christian; Günther, Jens (Hrsg). Arbeitsrecht 4.0. 2. Aufl. München: Beck 2022 S. 1 - 26
Wendzel, Steffen; Mazurczyk, Wojciech; Caviglione, Luca et al.
Emerging topics in defending networked systemsFuture Generation Computer Systems. Bd. 128. Elsevier B.V. 2022 S. 317 - 319
Copurkuyu, Mazlum; Barton, Thomas
Extraktion und Analyse von Schlüsselwörtern in einer Literaturrecherche zu Quantum ComputingEggert, Sandy; Lemke, Claudia; Majuntke, Verena; Malzahn, Birte; Meister, Vera G.; Simbeck, Katharina; Czarnecki, Christian; Wolf, Martin (Hrsg). Angewandte Forschung in der Wirtschaftsinformatik 2022. Berlin: GITO mbH Verlag 2022 S. 245 - 260 (Tagungsband zur 35. Jahrestagung des Arbeitskreises Wirtschaftsinformatik an Hochschulen für Angewandte Wissenschaften im deutschsprachigen Raum (AKWI) vom 11.09. bis 13.09.2022)
Copurkuyu, Mazlum; Barton, Thomas
Extraktion und Analyse von Schlüsselwörtern in einer Literaturrecherche zu Quantum Computing.GI-Jahrestagung. 2022 S. 897 - 911
Wendzel, Steffen; Caviglione, Luca; Mileva, Aleksandra et al.
Guest editorial: Information security methodology and replication studiesit - Information Technology. Bd. 64. H. 1-2. Walter de Gruyter GmbH 2022 S. 1 - 3
Zakfeld, Lara; Haag, Stefan; Simon, Carlo
Informal Ways to Educate About Formal Modeling and Simulation with Petri NetsHerrmann, Frank (Hrsg). SIMUL 2022 : The Fourteenth International Conference on Advances in System Simulation. Wilmington, DE, USA: ThinkMind 2022 S. 38 - 43
Mileva, Aleksandra; Velinov, Aleksandar; Dimitrova, Vesna et al.
Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based DetectionEntropy. Bd. 24. H. 2. MDPI 2022 S. 1 - 23 176
Lilligreen, Gergana; Henkel, Nico; Wiebel, Alexander
Near and Far Interaction for Augmented Reality Tree Visualization OutdoorsProceedings of the 17th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications. Setúbal: Scitepress 2022 S. 27 - 35
Mulawade, Raju Ningappa; Garth, Christoph; Wiebel, Alexander
Saliency Clouds. Visual Analysis of Point Cloud-oriented Deep Neural Networks in DeepRL for Particle PhysicsArchambault, D.; Peltonen, J.; Nabney I. (Hrsg). Proceedings of Machine Learning Methods in Visualisation for Big Data (2022). Genf: The Eurographics Association 2022
Caviglione, Luca; Wendzel, Steffen; Vrhovec, Simon et al.
Security and Privacy Issues of Home GlobalizationIEEE Security & Privacy. Bd. 20. H. 1. Institute of Electrical and Electronics Engineers (IEEE) 2022 S. 10 - 11
Eschbach, Robin; Messerschmidt, Kai; Keidel, Ralf et al.
Semi-Automatic Particle Tracking for and Visualization of Particle Detector DataBender, Jan; Botsch, Mario; Keim, Daniel A. (Hrsg). Proceedings Vision, Modeling, and Visualization. Genf: The Eurographics Association 2022 8 S.
Mayer, Nico; Wendzel, Steffen; Keller, Jörg
Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-PublikationenWressnegger, Christian u. a. (Hrsg). Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) : 5.-8. April 2022 in Karlsruhe. Bonn: Gesellschaft für Informatik e. V. 2022 S. 173 - 182 (GI-Edition. Proceedings ; 323)
Schmidbauer, Tobias; Wendzel, Steffen
SoK: A Survey Of Indirect Network-level Covert ChannelsProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (AsiaCCS). New York: ACM 2022 S. 546 - 560
Simon, Carlo; Haag, Stefan; Zakfeld, Lara
Stratification of Timed Petri Nets at the Example of a Production ProcessHameed, Ibrahim A.; Hasan, Agus; Alaliyat, Saleh A.-A. (Hrsg). Proceedings of the 36th ECMS International Conference on Modelling and Simulation (ECMS). Saarbrücken: Pirrot 2022 S. 128 - 134
Simon, Carlo; Haag, Stefan; Zakfeld, Lara
The Process-Simulation: CenterHerrmann, Frank (Hrsg). Special Tack at SIMUL 2022: The Fourteenth International Conference on Advances in System Simulation. Wilmington: ThinkMind 2022 S. 74 - 77 (SIM-SC)
Bub, Daniel; Hartmann, Laura; Bozakov, Zdravko et al.
Towards Passive Identification of Aged Android Devices in the Home NetworkEICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference. Barcelona, Spain: ACM 2022 S. 17 - 20
Diller, Florian; Scheuermann, Gerik; Wiebel, Alexander
Visual Cue Based Corrective Feedback for Motor Skill Training in Mixed Reality: A SurveyTransactions on Visualization and Computer Graphics. Bd. To Appear. IEEE 2022 S. 1
Samsami, Nima; Kurpjuweit, Stephan
A Reference Model for Dialog Management in Conversational Agents in High-Engagement Use CasesArtificial Intellgence -- Application in Life Sciences and Beyond. The Upper Rhine Artificial Intelligence Symposium. Bd. UR-AI 2021. 2021 S. 167 - 174
Wendzel, Steffen; Caviglione, Luca; Mazurczyk, Wojciech et al.
A Revised Taxonomy of Steganography Embedding PatternsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 12
Simon, Carlo; Haag, Stefan; Zakfeld, Lara
Anforderungen an hochintegrierte ManagementsystemeNees, Franz; Stengel, Ingo; Meister, Vera G.; Barton, Thomas; Herrmann, Frank; Müller, Christian; Wolf, Martin (Hrsg). Angewandte Forschung in der Wirtschaftsinformatik 2021 : Tagungsband zur 34. AKWI-Jahrestagung (Karlsruhe). Heide: mana-Buch 2021 S. 56 - 65
Nees, Franz; Stengel, Ingo; Meister, Vera G. et al.
Angewandte Forschung in der Wirtschaftsinformatik 2021Heide: mana-Buch 2021 100 S.
Barton, Thomas
Anwendungspotenziale für kausale Inferenz im Online-MarketingBarton,Thomas ; Müller, Christian (Hrsg). Künstliche Intelligenz in der Anwendung. Wiesbaden: Springer Fachmedien Wiesbaden 2021 S. 93 - 98 (Angewandte Wirtschaftsinformatik)
Simon, Carlo; Zakfeld, Lara; Jensen, Cecilie Elizabeth et al.
Can simulation prevent companies from the bullwhip trap? New approaches to model the bullwhip effect with the aid of Excel and high-level Petri netsHerrmann, Frank; Popescu, Manuela; Audette, Michel (Hrsg). Special Tack at SIMUL 2021: The Thirteenth International Conference on Advances in System Simulation. Wilmington: ThinkMind 2021 S. 31 - 37 (SIM-SC)
Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura et al.
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channelsComputers & Security. Bd. 104. Elsevier BV 2021 S. 102207
Vrhovec, Simon; Caviglione, Luca; Wendzel, Steffen
Crème de la Crème: Lessons from Papers in Security PublicationsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 9
Barton, Thomas; Müller, Christian
Data Science anwenden : Einführung, Anwendungen und ProjekteWiesbaden: Springer Fachmedien Wiesbaden GmbH 2021 249 S.
Barton, Thomas; Müller, Christian
Data Science: Vom Begriff zur AnwendungBarton, Thomas ; Müller, Christian (Hrsg). Data Science anwenden. Wiesbaden: Springer Fachmedien GmbH 2021 S. 3 - 9 (Data Science anwenden)
Hartmann, Laura; Wendzel, Steffen
Detection of Anomalous Values within TIA Project Data History for Industrial Control SystemsProceedings of the European Interdisciplinary Cybersecurity Conference - Doctoral Symposium. New York: ACM 2021 S. 1 - 6
Distante, Damiano; Faralli, Stefano; Rittinghaus, Steve et al.
DomainSenticNet: An Ontology and a Methodology Enabling Domain-Aware Sentic ComputingCognitive Computation. Bd. 14. H. 1. Springer LLC 2021 S. 62 - 77
Faralli, Stefano; Rittinghaus, Steve; Samsami, Nima et al.
Emotional Intensity-based Success Prediction Model for Crowdfunded CampaignsInformation Processing & Management. Bd. 58. H. 1. Elsevier B.V. 2021 102394
Peuker, Andreas; Barton, Thomas
Empfehlungssysteme und der Einsatz maschineller LernverfahrenBarton, Thomas u. a. (Hrsg). Data Science anwenden. Wiesbaden: Springer Fachmedien GmbH 2021 S. 85 - 100
Hartmann, Laura; Wendzel, Steffen
How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world DataKulyk, Oksana u. a. (Hrsg). EICC: European Interdisciplinary Cybersecurity Conference. New York: ACM 2021 S. 83 - 84
Schmidbauer, Tobias; Wendzel, Steffen
Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert ChannelsARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 15
Pettersen, Helge Egil Seime; Aehle, Max; Alme, Johan et al.
Investigating particle track topology for range telescopes in particle radiography using convolutional neural networksActa Oncologica. Bd. 60. H. 11. Taylor & Francis 2021 S. 1413 - 1418
Barton, Thomas; Müller, Christian
Künstliche Intelligenz in der Anwendung : Rechtliche Aspekte, Anwendungspotentiale und EinsatzszenarienWiesbaden: Springer Fachmedien Wiesbaden GmbH - Springer Vieweg 2021 (Angewandte Wirtschaftsinformatik)
Barton, Thomas; Müller, Christian
Potenziale für Künstliche Intelligenz und ihre AnwendungBarton,Thomas ; Müller, Christian (Hrsg). Künstliche Intelligenz in der Anwendung : Rechtliche Aspekte, Anwendungspotentiale und Einsatzszenarien. Wiesbaden: Springer Fachmedien Wiesbaden GmbH - Springer Vieweg 2021 S. 3 - 6 (Angewandte Wirtschaftsinformatik)
Zillien, Sebastian; Wendzel, Steffen
Reconnection-based Covert Channels in Wireless NetworksJøsang A. ; Futcher L. ; Hagen J. (Hrsg). ICT Systems Security and Privacy Protection : 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings. Cham: Springer International Publishing 2021 S. 118 - 133 (IFIP Advances in Information and Communication Technology, 1868-4238 ; 625)
Lilligreen, Gergana; Marsenger, Philipp; Wiebel, Alexander
Rendering Tree Roots Outdoors: A Comparison Between Optical See Through Glasses and Smartphone Modules for Underground Augmented Reality VisualizationLecture Notes in Computer Science. Cham: Springer 2021 S. 364 - 380
Simon, Carlo; Haag, Stefan; Zakfeld, Lara
Requirements for Highly Integrated Management Systems: Simulation Expands Past-oriented Documentation to Future-oriented OptimizationHerrmann, Frank; Popescu, Manuela; Audette, Michel (Hrsg). The Thirteenth International Conference on Advances in System Simulation (SIMUL). Barcelona: IARIA 2021 S. 58 - 64
Simon, Carlo; Haag, Stefan; Zakfeld, Lara
Research-Agenda for Process Simulation DashboardsAl-Begain, Khalid ; Iacono, Mauro ; Campanile, Lelio ; Bargiela, Andrzej (Hrsg). Proceedings of the 35th ECMS International Conference on Modelling and Simulation, ECMS 2021 : May 31st-June 2nd, 2021, United Kingdom. Saarbrücken: Pirrot 2021 S. 243 - 249 (Communications of the ECMS ; volume 35, issue 1 (June 2021))
Hartmann, Laura; Zillien, Sebastian; Wendzel, Steffen
Reset- and Reconnection-based Covert Channels in CoAPKulyk, Oksana u. a. (Hrsg). EICC: European Interdisciplinary Cybersecurity Conference. New York: ACM 2021 S. 66 - 71
Keller, Jörg; Wendzel, Steffen
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash ChainsApplied Sciences. Bd. 11. H. 2. Basel, Schweiz: MDPI 2021 S. 731 - 742
Mileva, Aleksandra; Caviglione, Luca; Velinov, Aleksander et al.
Risks and Opportunities for Information Hiding in DICOM StandardARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 8
Simon, Carlo; Haag, Stefan; Zakfeld, Lara
Showing the Advantages of Pull over Push Production with the Aid of Petri NetsEMISA Forum: Proceedings of the SIG Enterprise Modelling and Information Systems Architectures of the German Informatics Society. Bd. 41. H. 1. Tutzing: Gesellschaft für Informatik e.V. 2021 S. 29 - 30
Simon, Carlo; Haag, Stefan; Zakfeld, Lara
Simulation of Push- and Pull-Processes in Logistics: Usage, Limitations, and Result Presentation of Clock Pulse and Event Triggered ModelsInternational Journal On Advances in Software. Bd. 14. H. 1-2. Wilmington: IARIA 2021 S. 88 - 106
Simon, Carlo; Haag, Stefan; Zakfeld, Lara
Simulation taktgesteuerter Modelle von Push- und Pull-Prozessen in der LogistikAnwendungen und Konzepte in der Wirtschaftsinformatik. Bd. 13. Luzern, CHE: AKWI 2021 S. 27 - 33
Barton, Thomas; Kokoev, Arthur
Text Mining bei einer wissenschaftlichen Literaturauswertung: Extraktion von Schlüsselwörtern zur Beschreibung von InhaltenBarton, Thomas u. a. (Hrsg). Data Science anwenden. Wiesbaden: Springer Fachmedien GmbH 2021 S. 193 - 199
Peuker, Andreas; Barton, Thomas
Wissenschaftliche Literaturauswertung mit Hilfe von Text Mining am Beispiel von EmpfehlungssystemenNees, Franz ; Stengel, Ingo ; Meister, Vera G. ; Barton, Thomas ; Herrmann, Frank ; Müller, Christian ; Wolf, Martin (Hrsg). Angewandte Forschung in der Wirtschaftsinformatik 2021. Heide: mana-Buch 2021 S. 44 - 54
Simon, Carlo; Haag, Stefan
A Case-Study to Teach Process-Aware Information SystemsProceedings of the SIG Enterprise Modelling and Information Systems Architectures of the German Informatics Society (EMISA Forum). Bd. 40. H. 1. Tutzing: Gesellschaft für Informatik e.V. 2020 S. 9 - 10
Rambach, Jason; Lilligreen, Gergana; Schäfer, Alexander et al.
A survey on applications of augmented, mixed and virtual reality for nature and environmentarXiv: Cornell University 2020 2008.12024
Barton, Thomas; Graf, Marco; Özünlü, Fahri
Analysis and Visualization of Travel Blogs by Means of NoSQL Techniques: Set Up and ResultsBöhm, Stephan ; Suntrayuth, Sid (Hrsg). Proceedings of the IWEMB 2019 : Third International Workshop on Entrepreneurship in Electronic and Mobile Business. Norderstedt: PubliQation 2020 S. 9 - 18
Nees, Franz; Stengel, Ingo; Meister, Vera G. et al.
Angewandte Forschung in der Wirtschaftsinformatik 2020 : Tagungsband zur 33. AKWI-Jahrestagung am 14.09.2020, ausgerichtet von der Hochschule Karlsruhe - Wirtschaft und TechnikHeide: mana-Buch 2020 147 S.
Hartmann, Laura; Wendzel, Steffen
Anomaly Detection in ICS based on Data-history AnalysisProceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2
Wiebel, Alexander; Keuchel, Sascha; Eckenfels, Magnus et al.
Challenges of and Recommendations for Combining 6-DOF Spatial VR-Interaction with Spherical VideosInstitute of Electrical and Electronics Engineers (IEEE) (Hrsg). TechRxiv. Piscataway: Institute of Electrical and Electronics Engineers (IEEE) 2020 10 S.
Simon, Carlo; Haag, Stefan; Zakfeld, Lara
Clock Pulse Modeling and Simulation of Push and Pull Processes in LogisticsHerrmann, Frank; Parra, Lorena; Popescu, Manuela (Hrsg). SIMUL 2020 : the Twelfth International Conference on Advances in System Simulation : October 18-22, 2020. Wilmington, DE, USA: IARIA 2020 S. 31 - 36
Barton, Thomas
Cloud Computing / Anything as a Service (XaaS)Lang, Michael ; Müller, Michaela (Hrsg). Von Augmented Reality bis KI : die wichtigsten IT-Themen, die Sie für Ihr Unternehmen kennen müssen. München: Hanser 2020 S. 27 - 40 (Wissen für Entscheider)
Keller, Jörg; Wendzel, Steffen
Covert Channels in One-Time Passwords Based on Hash ChainsEICC 2020: Proceedings of the European Interdisciplinary Cybersecurity Conference. New York City: ACM 2020 S. 1 - 2
Schmidbauer, Tobias; Wendzel, Steffen
Covert storage caches using the NTP protocol.ARES. 2020 S. 67:1 - 67:10
Szary, Przemyslaw; Mazurczyk, Wojciech; Wendzel, Steffen et al.
Design and performance evaluation of reversible network covert channels.ARES. 2020 S. 68:1 - 68:8
Simon, Carlo; Haag, Stefan
Digitale Zwillinge modellieren und verstehen: Eine Fallstudie zum problembasierten und forschenden LernenMichael, Judith ; Bork, Dominik ; Rehse, Jana-Rebecca ; Striewe, Michael ; Ullrich, Meike (Hrsg). Modellierung-C 2020: Modellierung 2020 short, workshop and tools & demo papers : companion proceedings of Modellierung 2020 short, workshop and tools & demo papers, co-located with Modellierung 2020 : Vienna, Austria, February 19-21, 2020. Aachen: CEUR-WS 2020 S. 101 - 112 (CEUR workshop proceedings ; vol-2542)
Haag, Stefan; Zakfeld, Lara; Simon, Carlo et al.
Event Triggered Simulation of Push and Pull ProcessesHerrmann, Frank ; Parra, Lorena ; Popescu, Manuela (Hrsg). SIMUL 2020 : the Twelfth International Conference on Advances in System Simulation : October 18-22, 2020. Wilmington, DE, USA: IARIA 2020 S. 68 - 73
Wendzel, Steffen
Network Information Hiding: Terminology, Taxonomy, Methodology and CountermeasuresHagen (FernUniversität in Hagen). 2020 244 S.
Wendzel, Steffen
Review of the book Future Automation: Changes to Lives and to Businesses by Carone, T. (World Scientific Publishing Co, Inc., 2018)ACM (Hrsg). ACM Computing Reviews. New York City: ACM 2020 Review Item CR147026
Simon, Carlo; Haag, Stefan
Simulatable Reference Models to Transform Enterprises for the Digital Age - A Case StudySteglich, Mike; Müller, Christian; Neumann, Gaby; Walther, Mathias (Hrsg). Proceedings of the 34th International ECMS Conference on Modelling and Simulation, ECMS 2020 : June 2020, United Kingdom. Saarbrücken: Pirrot 2020 S. 294 - 300 (Communications of the ECMS ; volume 34, issue 1 (June 2020))
Wendzel, Steffen; Caviglione, Luca; Checco, Alessandro et al.
Special Issue Editorial: Information Security Methodology, Replication Studies and Information Security EducationJournal of Universal Computer Science (J.UCS). Bd. 26. H. 7. Klagenfurt. 2020 S. 762 - 763
Drengner, Jan; Wiebel, Alexander
Virtuelle Realität im Veranstaltungsmanagement - Einsatz, Nutzen und HerausforderungenZanger, Cornelia (Hrsg). Events und Messen im digitalen Zeitalter. Wiesbaden: Springer Fachmedien 2020 S. 15 - 36
Bruckner, Stefan; Ropinski, Timo; Isenberg, Tobias et al.
A Model of Spatial Directness in Interactive VisualizationIEEE Transactions on Visualization and Computer Graphics. Bd. 25. H. 8. IEEE 2019 S. 2541 - 2528 Online as early access since June 2018
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen
Advanced Information Hiding Techniques for Modern BotnetsKambourakis, Georgios; Anagnostopoulos, Marios; Meng, Weizhi; Zhou, Peng (Hrsg). Botnets: Architectures, Countermeasures, and Challenges. 1. Aufl. Boca Raton, FL: Taylor & Francis Group / CRC Press 2019 S. 165 - 188 (CRC Series in Security, Privacy and Trust)
Drengner, Jan; König, Werner
Agiles Projektmanagement als Instrument der kooperativen Dienstleistungsentwicklung am Beispiel einer destinationsspezifischen Spiele-AppKooperative Dienstleistungen: Spannungsfelder zwischen Service Cooperation und Service Coopetition. Wiesbaden: Springer Fachmedien Wiesbaden 2019 S. 449 - 473
Barton, Thomas; Graf, Marco
Analysis of travel blogs by means of NoSQL techniques: First ResultsBöhm, Stephan ; Suntrayuth, Sid (Hrsg). Proceedings of the IWEMB 2018 : Second International Workshop on Entrepreneurship in Electronic and Mobile Business, Wiesbaden, September 24-25, 2018. Norderstedt: PubliQation 2019 S. 35 - 47
Wolf, Martin R.; Barton, Thomas; Herrmann, Frank et al.
Angewandte Forschung in der Wirtschaftsinformatik 20191. Aufl. Heide, Holst: mana-Buch 2019 256 S.
Lilligreen, Gergana; Keuchel, Sascha; Wiebel, Alexander
Augmented Reality in Higher Education: An Active Learning Approach for a Course in Audiovisual Production16th EuroVR International Conference - EuroVR 2019. Tallin. 2019 S. 1 To appear
Lilligreen, Gergana; Wiebel, Alexander
Augmented Reality in Vorlesung und Übung: Lehre und Interaktion neu gedachtBarton, Thomas ; Müller, Christian ; Seel, Christian (Hrsg). Hochschulen in Zeiten der Digitalisierung : Lehre, Forschung und Organisation. Wiesbaden: Springer Vieweg 2019 S. 221 - 238 (Angewandte Wirtschaftsinformatik)
Mazurczyk, Wojciech; Wendzel, Steffen; Chourib, Mehdi et al.
Countering adaptive network covert communication with dynamic wardensFuture Generation Computer Systems. Bd. 94. Elsevier BV 2019 S. 712 - 725
Velinov, Aleksandar; Wendzel, Steffen; Mileva, Aleksandra et al.
Covert Channels in the MQTT-Based Internet of ThingsIEEE ACCESS. Bd. 7. IEEE 2019 S. 161899 - 161915
Wendzel, Steffen; Link, Florian; Eller, Daniela et al.
Detection of Size Modulation Covert Channels Using Countermeasure VariationJournal of Universal Computer Science (JUCS). Bd. 25. H. 11. Klagenfurt: Universität Graz 2019 S. 1396 - 1416