Simon, Carlo; Haag, Stefan
Simulation vertikaler Integration: Vom Top-Floor zum Shop-Floor und zurückBarton, Thomas; Herrmann, Frank; Meister, Vera G.; Müller, Christian; Seel, Christian; Steffens, Ulrike (Hrsg). Angewandte Forschung in der Wirtschaftsinformatik 2018 : Tagungsband zur 31. AKWI-Jahrestagung (Hamburg). Heide: mana-Buch 2018 S. 104 - 113
Wang, Qi; M. Alcaraz Calero, José; Barros Weiss, Maria et al.
SliceNet: End-to-End Cognitive Network Slicing and Slice Management Framework in Virtualised Multi-Domain, Multi-Tenant 5G Networks.BMSB. 2018 S. 1 - 5
Cabaj, Krzysztof; Caviglione, Luca; Mazurczyk, Wojciech et al.
The New Threats of Information Hiding: The Road AheadIT Professional. Bd. 20. H. 3. Institute of Electrical and Electronics Engineers (IEEE) 2018 S. 31 - 39
Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.ARES. 2018 S. 10:1 - 10:10
Simon, Carlo
Web-Based Simulation Of Production Schedules With High-Level Petri NetsNolle, Lars; Burger, Alexandra; Tholen, Christoph; Werner, Jens; Wellhausen, Jens (Hrsg). Proceedings of the 32nd ECMS International Conference on Modelling and Simulation, ECMS 2018. Saarbrücken: Pirrot 2018 S. 275 - 281
Keidel, Ralf; Wendzel, Steffen; Zillien, Sebastian et al.
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms.J. Univers. Comput. Sci. Bd. 24. H. 5. 2018 S. 556 - 576
Santos, Ricardo; Bozakov, Zdravko; Mangiante, Simone et al.
A NEAT framework for application-awareness in SDN environments.Networking. 2017 S. 1 - 2
Bozakov, Zdravko; Mangiante, Simone; Hernandez Benet, Cristian et al.
A NEAT framework for enhanced end-host integration in SDN environments.NFV-SDN. 2017 S. 1 - 7
Weinrank, Felix; Grinnemo, Karl-Johan; Bozakov, Zdravko et al.
A NEAT Way to Browse the Web.ANRW. 2017 S. 33 - 34
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen
Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators.IEEE Symposium on Security and Privacy Workshops. 2017 S. 17 - 22