Current Projects
Doctoral Candidate | Title of the doctoral research project | Cooperating Institutions |
---|---|---|
Philipp Koch | Befahrbarkeitsanalyse in unwegsamem Gelände unter Berücksichtigung der kinematischen Konzepte mobiler Roboter | TH Nürnberg, Uni Würzburg |
Andreas Schütz | Effiziente und zielgerichtete Sensibilisierung der Mitarbeiter von kleinen und mittelständischen Unternehmen für Informationssicherheit | FHWS Würzburg-Schweinfurt, FAU Erlangen-Nürnberg |
Gabriel Herl | Multipositionale Computertomographie | TH Deggendorf, FAU Erlangen-Nürnberg |
Thomas Schulz | A Reference Architecture for Smart Mobility Platforms | HS Neu-Ulm, TU München |
Daniel Vögele | Kamerabasiertes System zur Ermittlung der realen Aufspannsituation auf Werkzeugmaschinen | OTH Regensburg, Uni Passau |
Florian Olbrich | Safety Systems for UAVs | OTH Regensburg, TU München |
Bettina Kriegl | Service Innovation at Healthcare`s Frontline | TH Ingolstadt, Uni Bayreuth |
Hanning Liang | Deflectometric Measurement of the Topography of Reflecting Freeform Surfaces in Motion | HAW Landshut, Uni Passau |
Manuel Fritsche | Entwicklung eines kombinierten Auslegungsverfahrens für radiale Ventilatoren auf Basis eines mit theoretischen Ansätzen, digitalen CFD-Berechnungen und physischen Versuchen trainierten künstlichen neuronalen Netzes (Metamodell) | HS Coburg, FAU Erlangen-Nürnberg |
Stefan Kerscher | Robuste Prädiktion von Verkehrsteilnehmern in einer urbanen Umgebung | TH Deggendorf, Uni Regensburg, Continental |
Tobias Fertig | Messen der Information Security Awareness in KMUs | FHWS Würzburg-Schweinfurt, FAU Erlangen-Nürnberg |
Helge Olberding | Thematische Kartographie und 3D-Geovisualisierung in interaktiven VR-Anwendungen | FHWS Würzburg-Schweinfurt, Uni Würzburg |
Simon Seibt | Bildbasierte Medienproduktionskette | TH Nürnberg, Uni Würzburg |
Markus Miller | Auf künstliche Intelligenz basierende rekonstruktive Verfahren zur Umfeldmodellierung | HAW München TU München |
Theresa Meyer | Änderungsdetektion durch Analyse von Bildsequenzen und BIM-konformen Innenraummodellen | FHWS Würzburg-Schweinfurt TU München |
Elisabeth Wittmann | Exploring the power of AI in spectral analysis particularly leveraging simulation via transfer learning | OTH Regensburg, TU München |
Stefan Böhm | Untersuchung verschiedener Ansätze der künstlichen Intelligenz zur Optimierung der Prozessaubläufe und Mensch-Maschinen-Kollaboration in der I4.0-Produktion | TH Rosenheim, TU München |
Peter Meier | Real-Time Signal Processing Algorithms for Interactive Music Analysis Applications | TH Deggendorf, FAU Erlangen-Nürnberg |
Markus Schmidtner | Konzeption und Realisierung eines adaptiven Referenzmodells für agile und hybride Vorgehensmodelle im Produktentstehungsprozess der Automobilindustrie | HAW Landshut, FAU Erlangen-Nürnberg
|
Sebastian Renner | Sichere leichtgewichtige authentifizierte Verschlüsselung für kritische Infrastrukturen im Internet der Dinge | OTH Regensburg, TU München |
Sina Zimmermann | Incentives for Sustainable Tranportation Behaviour Enabled by Digital Mobility Platforms | HS Neu-Ulm; TU München |
Nikolai Körber | Energy-Efficient Deep Learning-Based Image Compression for LPWANs on Resource-Constrainded AIoT | HAW Landshut; TU München |
Finn Reiche | Entwicklung eines Referenzmodells zur Plattformökonomie von Hochschulen | HAW Landshut, FAU Erlangen-Nürnberg |
Tobias Höfer | Vergleich unterschiedlicher Deep Learning Ansätze im Hinblick auf Genauigkeit, Stabilität, Effizienz und Interpretierbarkeit | HAW München, TU München |
Christian Sauer | Development, Simulation and Evaluation of Mobile Wireless Networks in Industrial Applications | FHWS Würzburg-Schweinfurt, Uni Würzburg |
Maximilian Hell | Synergetic use of Sentinel-1 and Sentinel-2 data for large-scale Land cover/Land use mapping | FHWS Würzburg Schweinfurt, Uni Würzburg |
Dominik Stecher | Fault Detection and Monitoring of District Heating Systems using Machine Learning | TH Rosenheim, FAU, Erlangen-Nürnberg |
Maximilian Karthan
| Adaptive Feedback for mHealth-Applications with Gamification and Serious Games | HAW Neu-Ulm, Uni Würzburg |
Ulrich Ludolfinger | Reinforcement Learning for Energy Management Systems | HAW Landshut, Uni Würzburg |
Franz Okyere | Slum mapping- the relationship between geometry and urban poverty in Ghana- a remote sensing and geographical information systems approach | Uni Bayreuth, FHWS Würzburg-Schweinfurt |
Tina Volkersdorfer | Modellierung von Security zum Testen von System-Modellen | TH Ingolstadt, Uni Passau
|
Alumni
Dr. Rainer Koch | Sensor fusion for precise mapping of transparent and specular reflective objects
| TH Nürnberg, Uni Würzburg
|
Prof. Dr. Christian Pfitzner | Visual body weight estimation with focus on clinical applications | TH Nürnberg, Uni Würzburg |
Dr.-Ing. Maria Chizhova | Virtuelle 3D-Rekonstruktion von zerstörten russisch-orthodoxen Kirchen aus unvollständigen Punktwolken | FHWS Würzburg-Schweinfurt, TU München |
Dr.-Ing. Matthias Niedermaier | Security Herausforderungen und Werkzeuge für robuste industrielle Systeme im Internet-der-Dinge | HAW Augsburg; TU München |
Dr. Markus Ring | Detektion sicherheitskritischer Ereignisse in Unternehmensnetzwerken mittels Data Mining | HS Coburg; Universität Würzburg |
Dr. Manuel Ciba | Messung der Synchronität und Abschätzung der Konnektivität von in-vitro Spike-Trains | TH Aschaffenburg; Universität Würzburg |
Dr.-Ing. Katja Auernhammer | Mask-Based Black-Box Attacks on Safety-Critical Systems thath use Maschine Learning | TH Nürnberg; FAU Erlangen-Nürnberg |
Dr.-Ing. Markus Zoppelt | Software Security Design for Cyber-Physical Systems | TH Nürnberg, Universität Würzburg |
Latest Publications
2022 [ nach oben ]
2021 [ nach oben ]
-
1.Koerber, N., Siebert, A., Hauke, S., Muelle-Gritschneder: Tiny Generative Image Compression for Bandwidth-Constrained Sensor Applications. IEEE International Conference on Machine Learning and Applications. (2021).
-
2.Schmidtner, M., Doering, C., Timinger, H.: Agile Working During COVID-19 Pandemic. IEEE Engineering Management Review. 49, 18–32 (2021).
-
3.Schmidtner, M., Doering, C., Hilpoltsteiner, D., Martens, M., Timinger, H.: A fractional 0–1 decision making approach for process variant management. 2021 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC). pp. 1–8 (2021).
-
4.Kerscher, S., Müller, N., Ludwig, B.: Assessing the lack of context knowledge for a pedestrian predicting neural network. International Journal of Intelligent Robotics and Applications. (2021).
-
5.Sauer, C., Lyczkowski, E., Schmidt, M., Nüchter, A., Hoßfeld, T.: Testing AGV Mobility Control Method for MANET Coverage Optimization using Procedural Generation. Proceedings of the ACM Conference MSWiM: Modeling, Analysis and Simulation of Wireless and Mobile Systems. , Alicante, Spain (2021).
-
6.Weiss, N., Renner, S., Mottok, J., Vaclav, M.: Automated Threat Evaluation of Automotive Diagnostic Protocols. 8th Embedded Security in Cars Conference (ESCAR USA) (2021).
-
7.Ulsamer, P., Schütz, A., Fertig, T., Keller, L.: Immersive Storytelling for Information Security Awareness Training in Virtual Reality. Proceedings of the 54th Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences (2021).
-
8.Schmidtner, M., Timinger, H.: HyValue – Ein adaptives Referenzmodell für den hybriden Produktentstehungsprozess in der Automobilindustrie. In: Lehmann L., E.D. (ed.) Kompetenzen für die digitale Transformation 2020 Digitalisierung der Arbeit - Kompetenzen - Nachhaltigkeit 1. Digitalkompetenz-Tagung. pp. 37–48. Springer Vieweg, Berlin, Heidelberg (2021).
-
9.Doering, C., Schmidtner, M., Timinger, H.: Collaboration for Innovation Between Universities and Smart Cities. 2021 IEEE European Technology and Engineering Management Summit (E-TEMS). pp. 82–86 (2021).
-
10.Herl, G., Hiller, J., Thies, M., Zaech, J., Unberath, M., Maier, A.: Task-Specific Trajectory Optimisation for Twin-Robotic X-Ray Tomography. IEEE Transactions on Computational Imaging. 7, 894–907 (2021).
-
11.Bergler, M., Tolvanen, J., Zoppelt, M., Tavakoli Kolagari, R.: Social Engineering Exploits in Automotive Software Security: Modeling Human-targeted Attacks with SAM. In: Castanier, B., Cepin, M., Bigaud, D., and Berenguer, C. (eds.) The 31st European Safety and Reliability Conference, Angers, France (2021).
-
12.Schulz, T., Zimmermann, S., Böhm, M., Gewald, H., Krcmar, H.: Value co-creation and co-destruction in service ecosystems: The case of the Reach Now app. Technological Forecasting and Social Change. 170, issue C, (2021).
-
13.Zimmermann, S., Wagner, H.-T., Rössler, P., Gewald, H., Krcmar, H.: The Role of Utilitarian vs. Hedonic Factors for the Adoption of AI-based Smart Speakers. (Proceedings of the) 27th Americas Conference on Information Systems (AMCIS) "Digital Innovation and Entrepreneurship" (2021).
-
14.Zimmermann, S., Hein, A., Schulz, T., Gewald, H., Krcmar, H.: Digital Nudging Toward Pro-Environmental Behavior: A Literature Review. Proceedings of the 25th Pacific Asia Conference on Information Systems (PACIS) (2021).
-
15.Miller, M., Nischwitz, A., Westermann, R.: Deep Light Direction Reconstruction from single RGB images. WSCG 2021: full papers proceedings: 29. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, p. 31-40. (2021).
-
16.Meyer, T., Brunn, A., Stilla, U.: Accuracy investigation on image-based change detection for BIM compliant indoor models. International Society for Photogrammetry and Remote Sensing. V-4-2021, 105–112 (2021).
-
17.Weigl, S., Wittmann, E., Rück, T., Bierl, R., Matysik, F.-M.: Effects of ambient parameters and cross-sensitivities from O2, CO2 and H2O on the photoacoustic detection of acetone in the UV region. Sensors and Actuators B: Chemical. 328, (2021).
-
18.Meier, P., Krump, G., Müller, M.: A Real-Time Beat Tracking System Based on Predominant Local Pulse Information. Demos and Late Breaking News of the InternationalSociety for Music Information Retrieval Conference (ISMIR) (2021).
2020 [ nach oben ]
-
1.Wunderlich, S., Ring, M., Landes, D., Hotho, A.: Comparison of System Call Representations for Intrusion Detection. Logic Journal of the IGPL. jzaa058, (2020).
-
2.Doering, C., Schmidtner, M., Maerz, J., Mueller, V., Timinger, H.: Agile working during COVID-19 pandemic. Research Notes on Data and Process Science. issue 1, (2020).
-
3.Auernhammer, K., Freiling, F., Tavakoli Kolagari, R.: Efficient Black-Box Search for Adversarial Examples using Relevance Masks. In DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security (DYNAMICS) Workshop (2020).
-
4.Schmidtner, M., Timinger, H.: HyValue – a Hybrid Reference Model for the Automotive Product Development Process. IEEE TEMS Technology & Engineering Management Society (2020).
-
5.Kriegl, B., Woratschek, H., Raab, A.: Physicians and Institutional Work: Unpacking the Black Box of Institutionalization at the Front Lines of Healthcare. Proceedings of the European Markting Academy (2020).
-
6.Schulz, T., Böhm, M., Gewald, H., Krcmar, H.: Smart mobility – an analysis of potential customers’ preference structures Electronic Markets. Electronic Markets. Springer (2020).
-
7.Ulsamer, P., Fertig, T., Pfeffel, K., Müller, N.H.: Motor Imagery to Control Mobile Applications - An fNIRS Study. In: Vogel, D., Shen, K.N., Ling, P.S., Hsu, C., Thong, J.Y.L., Marco, M.D., Limayem, M., and Xu, S.X. (eds.) PACIS. p. 56 (2020).
-
8.Fertig, T., Schütz, A.E., Weber, K.: Current Issues Of Metrics For Information Security Awareness. In: Rowe, F., Amrani, R.E., Limayem, M., Newell, S., Pouloudi, N., van Heck, E., and Quammah, A.E. (eds.) ECIS (2020).
-
9.Fertig, T., Schütz, A.E., Weber, K., Müller, N.H.: Towards an Information Security Awareness Maturity Model. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (26). pp. 587–599. Springer (2020).
-
10.Müller-Wuttke, M., Schütz, A.E., Franz, F., Müller, N.H.: Proactive Smart City Interactions. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (26). pp. 615–624. Springer (2020).
-
11.Schlör, D., Ring, M., Krause, A., Hotho, A.: Financial Fraud Detection with Improved Neural Arithmetic Logic Units. Springer (2020).
-
12.Stock, A., Herl, G., Sauer, T., Hiller, J.: Edge-preserving compression of CT scans using wavelets. Insight- Non-Destructive Testing and Condition Monitoring. 62, 345–351 (7) (2020).
-
13.Schmidtner, M., Timinger, H., Blust, M., Döring, C., Hilpoltsteiner, D.: Towards an adaptive reference model for agile and hybrid frameworks in automotive development. ICE/ITMC. pp. 1–10. IEEE (2020).
-
14.Schulz, T., Böhm, M., Gewald, H.: Information Technology Choice in Mobility Service Ecosystems: A Qualitative Comparative Analysis. International Conference on Information Systems, ICIS 2020 Proceedings (2020).
-
15.Schulz, T., Gewald, H., Böhm, M., Krcmar, H.: Smart Mobility: Contradictions in Value Co-Creation. Information Systems Frontiers. 22, (2020).
-
16.Böhm, S.-A.: AI Approaches to Optimize Human-Machine Collaboration in Manufacturing Facilities with IoT-Ready Machinery. In: Davidsson, P., Langheinrich, M., Linde, P., Mayer, S., Casado-Mansilla, D., Spikol, D., Kraemer, F.A., and Russo, N.L. (eds.) IOT Companion. pp. 23:1–23:5. ACM (2020).
-
17.Ciba, M., Bestel, R., Nick, C., de Arruda, G.F., Peron, T.K.D.M., Comin, C.H., da Fontoura Costa, L., Rodrigues, F.A., Thielemann, C.: Comparison of Different Spike Train Synchrony Measures Regarding Their Robustness to Erroneous Data From Bicuculline-Induced Epileptiform Activity. Neural Comput. 32, 887–911 (2020).
-
18.Fertig, T., Schütz, A.: About the Measuring of Information Security Awareness: A Systematic Literature Review. 53rd Hawaii International Conference on System Sciences (2020).
-
19.Brost, J., Egger, C., Lai, R.W.F., Schmid, F., Schröder, D., Zoppelt, M.: Threshold Password-Hardened Encryption Services. In: Ligatti, J., Ou, X., Katz, J., and Vigna, G. (eds.) ACM Conference on Computer and Communications Security. pp. 409–424. ACM (2020).
-
20.Schütz, A., Fertig, T., Weber, K.: Analyze Before You Sensitize: Preparation of a Targeted ISA Training. 53rd Hawaii International Conference on System Sciences (2020).
-
21.Fischer, F., Niedermaier, M., Hanka, T., Knauer, P., Merli, D.: Analysis of Industrial Device Architectures for Real-Time Operations under Denial of Service Attacks. CoRR. abs/2007.08885, (2020).
-
22.Tritscher, J., Ring, M., Schlör, D., Hettinger, L., Hotho, A.: Evaluation of Post-hoc XAI Approaches Through Synthetic Tabular Data. In: Helic, D., Leitner, G., Stettinger, M., Felfernig, A., and Ras, Z.W. (eds.) ISMIS. pp. 422–430. Springer (2020).
-
23.Schlör, D., Ring, M., Krause, A., Hotho, A.: Financial Fraud Detection with Improved Neural Arithmetic Logic Units. Presented at the (2020).
-
24.Wolf, M., Ring, M., Landes, D.: Impact of Generative Adversarial Networks on NetFlow-Based Traffic Classification. In: Herrero, Álvaro, Cambra, C., Urda, D., Sedano, J., Quintián, H., and Corchado, E. (eds.) CISIS. pp. 393–404. Springer (2020).
-
25.Schlör, D., Ring, M., Hotho, A.: iNALU: Improved Neural Arithmetic Logic Unit. Frontiers in Artificial Intelligence. 3, 71 (2020).
-
26.Renner, S., Pozzobon, E., Mottok, J.: A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers. ICICS. pp. 495–509. Springer (2020).
-
27.Weiss, N., Renner, S., Mottok, J., Matousek, V.: Transport Layer Scanning for Attack Surface Detection in Vehicular Networks. Transport Layer Scanning for Attack Surface Detection in Vehicular Networks. pp. 1–8. ACM Computer Science in Cars Symposium (2020).
-
28.Liang, H., Sauer, T., Faber, C.: Using wavelet transform to evaluate single-shot phase measuring deflectometry data. SPIE Proceedings. SPIE The international society for optics and photonics (2020).
-
29.Herl, G., Hiller, J., Maier, A.: Scanning trajectory optimisation using a quantitative Tuybased local quality estimation for robot-based X-ray computed tomography. Nondestructive Testing and Evaluation. 35, 287–303 (2020).
-
30.Hilpoltsteiner, D., Schmidtner, M.: ADAMO - Echtzeit Kollaboration mit adaptiven Prozessmodellen (ADAMO - Real-Time Collaboration with Adaptive Process Models). In: Michael, J., Bork, D., Fill, H.-G., Fettke, P., Karagiannis, D., Köpke, J., Koschmider, A., Mayr, H.C., Rehse, J.-R., Reimer, U., Striewe, M., Tropmann-Frick, M., and Ullrich, M. (eds.) Modellierung (Companion). pp. 193–197. CEUR-WS.org (2020).
2019 [ nach oben ]
-
1.Liang, H., Zimmermann, A., Kickingereder, R., Faber, C.: Eine neue Methode zur Lösung des Höhenproblems in der Deflektometrie. Deutsche Gesellschaft für angewandte Optik e.V (2019).
-
2.Niedermaier, M., Striegel, M., Sauer, F., Merli, D., Sigl, G.: Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices. Computing Research Repository CoRR. abs/1908.03964, (2019).
-
3.Zoppelt, M., Kolagari, R.T.: What Today’s Serious Cyber Attacks on Cars Tell Us: Consequences for Automotive Security and Dependability. In: Papadopoulos, Y., Aslansefat, K., Katsaros, P., and Bozzano, M. (eds.) IMBSA. pp. 270–285. Springer (2019).
-
4.Zoppelt, M., Tavakoli Kolagari, R.: UnCle SAM : Modeling Cloud Attacks with the Automotive Security Abstraction Model. In CLOUD COMPUTING 2019. CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization, At Venice, Italy (2019).
-
5.Ring, M., Wunderlich, S., Scheuring, D., Landes, D., Hotho, A.: A survey of network-based intrusion detection data sets. In Computers and Security 86, 2019, 147-167, DOI:. Computers and Security. pp. 147–167 (2019).
-
6.Fertig, T., Schütz, A.E., Weber, K., Müller, N.H.: Measuring the Impact of E-Learning Platforms on Information Security Awareness. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (25). pp. 26–37. Springer (2019).
-
7.Schütz, A., Tobias, F., Kristin, W., Nicholas, M.: How E-Learning can Faciliate Information Security Awareness. Learning and Collaboration Technologies. (2019).
-
8.Franz, F., Fertig, T., Schütz, A.E., Vu, H.: Towards Human-readable Smart Contracts. IEEE ICBC. pp. 38–42. IEEE (2019).
-
9.Kerscher, S., Ludwig, B., Müller, N.: Investigating the Added Value of Combining Regression Results from Different Window Lengths. AIKE. pp. 128–135. IEEE (2019).
-
10.Koch, P., May, S., Engelhardt, H., Ziegler, J., Nüchter, A.: Signed Distance Based Reconstruction for Exploration and Change Detection in Underground Mining Disaster Prevention. SSRR. pp. 1–2. IEEE (2019).
-
11.Niedermaier, M., Hanka, T., Plaga, S., von Bodisco, A., Merli, D.: Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation. Computing Research Repository CoRR. abs/1904.04271, (2019).
-
12.Weber, K., Saueressig, G., Schütz, A.: Informationssicherheit und Datenschutz an Hochschulen organisieren. Angewandte Forschung in der Wirtschaftsinformatik. (2019).
-
13.Liang, H., Zimmermann, A., Reiner, K., Christian, F.: A new method for solving the height problem in deflectometry. Proceedings Applied Optical Metrology III (2019).
-
14.Herl, G., Hiller, J., Kasperl, S., Maier, A.: Reduktion von Metallartefakten durch multipositionale Datenfusion in der industriellen Röntgen-Computertomographie. de Gruyter, tm-Technisches Messen. (2019).
-
15.Sauer, F., Niedermaier, M., Kießling, S., Merli, D.: LICSTER - A Low-cost ICS Security Testbed for Education and Research. Computing Research Repository CoRR. abs/1910.00303, (2019).
-
16.Herl, G., Hiller, J., Sauer, T.: Artifact reduction in X-ray computed tomography by multipositional data fusion using local image quality measures. Proceedings of the 9th Conference on Industrial Computed Tomography, Padova, Italy (iCT 2019) (2019).
-
17.Schütz, A.E., Fertig, T., Weber, K., Müller, N.H.: How E-Learning Can Facilitate Information Security Awareness. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (25). pp. 390–401. Springer (2019).
-
18.Niedermaier, M., Fischer, F., Merli, D., Sigl, G.: Network Scanning and Mapping for IIoT Edge Node Device Security. Computing Research Repository CoRR. abs/1910.07622, (2019).
-
19.Niedermaier, M., Merli, D., Georg, S.: A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices. Mediterranean Conference on Embedded Computing (MECO); IEEE. (2019).
-
20.Koch, P., May, S., Engelhardt, H., Ziegler, J., Nüchter, A.: Signed Distance Based Reconstruction for Exploration and Change Detection in Underground Mining Disaster Prevention. IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR ’19). pp. 1–2 (2019).
-
21.Reinker, F., Wagner, R., Hasselmann, K., aus der Wiesche, S., Fritsche, M., Epple, P., Rußwurm, H.J.: Testing, modeling and simulation of fans working with organic vapors. Proceedings of 13th European Conference on Turbomachinery Fluid dynamics & Thermodynamics (2019).
-
22.Auernhammer, K., Tavakoli Kolagari, R., Zoppelt, M.: Attacks on Machine Learning: Lurking Danger for Accountability. Proceedings of the Association for the Advancement of Artificial Intelligence AAAI Workshop on Artificial Intelligence Safety 2019 (2019).
-
23.aus der Wiesche, S., Reinker, F., Wagner, R., Epple, P., Fritsche, M., Russwurm, H.J.: An Accurate Thermal Measurement Approach for Determining Fan Efficiencies Based on System Identification. ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference (2019).
-
24.Fritsche, M., Epple, P., Hasselmann, K., Reinker, F., Wagner, R., aus der Wiesche, S., Russwurm, H.: CFD-Simulation of Centrifugal Fan Performance Characteristics Using Ideal and Real Gas Models for Air and Organic Fluids. ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference (2019).
-
25.Epple, P., Steppert, M., Malcherek, A., Fritsche, M.: Theoretical and Numerical Analysis of the Pressure Distribution and Discharge Velocity in Flows Under Inclined Sluice Gates. ASME-JSME_KSME 2019 8th Joint Fluids Engineering Conference. (2019).
-
26.von Rymon Lipinski, B., Seibt, S., Roth, J., Abé, D.: Level Graph - Incremental Procedural Generation of Indoor Levels using Minimum Spanning Trees. CoG. pp. 1–7. IEEE (2019).
2018 [ nach oben ]
-
1.Kasperl, S., Hanke, R., Oeckl, S., Schmitt, P., Uhlmann, N., Heinz, D., Herl, G., Hiller, J., Kämmler, A., Miller, T., Stock, A.M., Sauer, T.: Digitization, Data Processing and Analysis of Industrial and Cultural Objects: Creating Additional Value from Big Data. Proceedings of the 12th, European Conference on Non-Destructive Testing (ECNDT) 2018, Gothenburg-Sweden (2018).
-
2.Pfitzner, C., May, S., Nüchter, A.: Body Weight Estimation for Dose-Finding and Health Monitoring of Lying, Standing and Walking Patients Based on RGB-D Data. Sensors. 18, (2018).
-
3.Ring, M., Schlör, D., Landes, D., Hotho, A.: Flow-based Network Traffic Generation using Generative Adversarial Networks. Computing Research Repository CoRR. abs/1810.07795, (2018).
-
4.Schütz, A.E., Fertig, T., Weber, K., Vu, H., Hirth, M., Tran-Gia, T.: Vertrauen ist gut, Blockchain ist besser - Einsatzmöglichkeiten von Blockchain für Vertrauensprobleme im Crowdsourcing. HMD Prax. der Wirtschaftsinformatik. 55, 1155–1166 (2018).
-
5.Kasperl, S., Hanke, R., Oeckl, S., Schmitt, P., Uhlmann, N., Heinz, D., Herl, G., Hiller, J., Kämmler, A., Miller, T., Stock, A., Sauer, T.: Digitalisierung, Verarbeitung und Analyse kultureller und industrieller Objekte: Wertschöpfung aus großen Datenmengen. Jahrestagung für zerstörungsfreie Prüfung (2018), Deutsche Gesellschaft DGZfP (2018).
-
6.Stock, M., Herl, G., Sauer, T., Hiller, J.: Edge Preserving Compression of CT Scans using Wavelets. Proceedings of the Structural Health Monitoring, International Symposium Nondestructive Testing 4-5 October 2018, Saarbruecken, Germany (2018).
-
7.Herl, G., Rettenberger, S., Hiller, J., Sauer, T.: Metal artifact reduction by fusion of CT scans from different positions using the unfiltered backprojection. Proceedings of the 8th Conference on Industrial Computed Tomography, Wels, Austria (iCT 2018) (2018).
-
8.Niedermaier, M., Malchow, J.-O., Fischer, F., Marzin, D., Merli, D., Roth, V., von Bodisco, A.: You Snooze, You Lose: Measuring PLC Cycle Times under Attacks. In: Rossow, C. and Younan, Y. (eds.) WOOT @ USENIX Security Symposium. USENIX Association (2018).
-
9.Ring, M., Landes, D., Hotho, A.: Detection of slow port scans in flow-based network traffic. PLOS ONE. 13, 1–18 (2018).
-
10.Schulz, T., Überle, M.: How Institutional Arrangements impede Realization of Smart Ecosystems: the Case of Door-to-Door Mobility integrators. In: Bednar, P.M., Frank, U., and Kautz, K. (eds.) Proceedings of the European Conference on Information Systems (ECIS 2018), Portsmouth, UK, 2018. p. 135 (2018).
-
11.Schütz, A., Fertig, T., Weber, K., Vu, H., Hirth, M., Tran-Gia, T.: Vertrauen ist gut, Blockchain ist besser - Einsatzmöglichkeiten von Blockchain für Vertrauensprobleme im Crowdsourcing. HMD Praxis der Wirtschaftsinformatik. (2018).
-
12.Stieler, M., Kriegl, B.: How do consumers experience the emotional rollercoaster? A smartphone app to measure emotions continously, transfer. Werbeforschung & Praxis. 64, 43–53 (2018).
2017 [ nach oben ]
-
1.Koch, R., May, S., Nüchter, A.: Detection and Purging of Specular Reflective and Transparent Object Influences in 3D Range Measurements. Proceedings of the 7th International Society for Photogrammetry and Remote Sensing, ISPRS International Workshop 3D-ARCH 2017: "3D Virtual Reconstruction and Visualization of Complex Architectures". pp. 377–384. , Nafplio, Greece (2017).
-
2.Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: Creation of Flow-Based Data Sets for Intrusion Detection. Journal of Information Warfare. 16, 41–54 (2017).
-
3.Ring, M., Landes, D., Dallmann, A., Hotho, A.: IP2Vec: Learning Similarities Between IP Addresses. 2017 IEEE International Conference on Data Mining Workshops (ICDMW). pp. 657–666 (2017).
-
4.Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: A Toolset for Intrusion and Insider Threat Detection. In: Palomares Carrascosa, I., Kalutarage, H.K., and Huang, Y. (eds.) Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications. pp. 3–31. Springer International Publishing, Cham (2017).
-
5.Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: Flow-based benchmark data sets for intrusion detection. Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS). pp. 361–369. ACPI (2017).
-
6.Pfitzner, C., May, S., Nüchter, A.: Evaluation of Features from RGB-D Data for Human Body Weight Estimation. International Federation of Automatic Control. , Toulouse, France (2017).
-
7.Marc Philipp Dietrich, G.W.: Towards EEG-Based Eye-Tracking for Interaction Design in Head-Mounted Devices. Proceedings of the 7th International Conference on Consumer Electronics Berlin (ICCE-Berlin), 2017 IEEE (2017).
-
8.Koch, R., Böttcher, L., Jahrsdörfer, M., Maier, J., Trommer, M., May, S., Nüchter, A.: Out of lab calibration of a rotating 2D scanner for 3D mapping. Proceedings of the International Society for Optics and Photonics SPIE optical metrology, Videometrics, Range Imaging, and Applications. pp. 10332 – 10332 . , Munich, Germany (2017).
-
9.Koch, R., May, S., Nüchter, A.: Effective Distinction Of Transparent And Specular Reflective Objects In Point Clouds Of A Multi-Echo Laser Scanner. Proceedings of the 18th IEEE International Conference on Advanced Robotics (ICAR ’17). pp. 566–571. , Hong Kong, China (2017).