Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen

Informatik

Hochschule Worms

Erenburger Str. 19, 67549 Worms
  • 06241/509-128/103
  • 06241/509-221
Publikationen
PDF | RTF
Ergebnisse pro Seite:  10

Wendzel, Steffen; Zwanger, Viviane; Meier, Michael et al.

Envisioning Smart Building Botnets.

Sicherheit. 2014 S. 319 - 329


Bredel, Michael; Bozakov, Zdravko; Barczyk, Artur et al.

Flow-based load balancing in multipathed layer-2 networks using OpenFlow and multipath-TCP.

HotSDN. 2014 S. 213 - 214


Wendzel, Steffen; Mazurczyk, Wojciech; Caviglione, Luca et al.

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.

ISSE. 2014 S. 123 - 133


Wendzel, Steffen; Keller, Jörg

Hidden and under control - A survey and outlook on covert channel-internal control protocols.

Ann. des Télécommunications. Bd. 69. H. 7-8. 2014 S. 417 - 430


Wendzel, Steffen; Herdin, Christian; Wirth, Roman et al.

Mosaic-chart based Visualization in Building Automation Systems

Proceedings Future Security 2014. Berlin: Fraunhofer Verlag 2014 S. 687 - 690


Mazurczyk, Wojciech; Wendzel, Steffen; Azagra Villares, Ignacio et al.

On Importance of Steganographic Cost For Network Steganography.

CoRR. Bd. abs/1406.2519. 2014


Barton, Thomas; Erdlenbruch, Burkhard; Herrmann, Frank et al.

Prozesse, Technologie, Anwendungen, Systeme und Management: Tagungsband zur AKWI-Fachtagung vom 07. bis 10.09.2014 an der OTH Regensburg

Berlin: Verlag News & Media 2014 388 S.


Hlawitschka, Mario; Hotz, Ingrid; Kratz, Andrea et al.

Top Challenges in the Visualization of Engineering Tensor Fields.

Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data. 2014 S. 3 - 15


Bozakov, Zdravko; Papadimitriou, Panagiotis

Towards a scalable software-defined network virtualization platform.

NOMS. 2014 S. 1 - 8


Szlósarczyk, Sebastian; Wendzel, Steffen; Kaur, Jaspreet et al.

Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet.

Sicherheit. 2014 S. 407 - 418