piwik-script

Intern
    Graduate School Science and Technology

    Current Projects

    Current doctoral projects

    Doctoral Candidate

    Title of the doctoral research project

    Cooperating Institutions

    Philipp Koch

    Befahrbarkeitsanalyse in unwegsamem Gelände unter Berücksichtigung der kinematischen Konzepte mobiler Roboter

    TH Nürnberg,

    Uni Würzburg

    Andreas Schütz

    Effiziente und zielgerichtete Sensibilisierung der Mitarbeiter von kleinen und mittelständischen Unternehmen für Informationssicherheit

    FHWS Würzburg-Schweinfurt,

    FAU Erlangen-Nürnberg

    Markus Zoppelt IT-Security für das hochautomatisierte, autonome und vernetzte Fahren

    TH Nürnberg,

    FAU Erlangen-Nürnberg

    Gabriel Herl

     Multipositionale Computertomographie

    TH Deggendorf,

    FAU Erlangen-Nürnberg

    Thomas Schulz A Reference Architecture for Smart Mobility Platforms

    HS Neu-Ulm,

    TU München

    Daniel Vögele Kamerabasiertes System zur Ermittlung der realen Aufspannsituation auf Werkzeugmaschinen

    OTH Regensburg,

    Uni Passau

    Florian Olbrich Safety Systems for UAVs

    OTH Regensburg,

    TU München

    Bettina Kriegl Service Innovation at Healthcare`s Frontline

    TH Ingolstadt,

    Uni Bayreuth

    Katja Auernhammer Verfahren zum Einsatz sicheren maschinellen Lernens unter einer für Haftungsfragen zuverlässigen Einhaltung vorgegebener Rahmengrößen

    TH Nürnberg,

    FAU Erlangen-Nürnberg

    Hanning Liang On-the-Fly-Deflektometrie zur schnellen 3D Inline Inspektion in der Bewegung

    HAW Landshut,

    Uni Passau

    Manuel Fritsche Entwicklung eines kombinierten Auslegungsverfahrens für radiale Ventilatoren auf Basis eines mit theoretischen Ansätzen, digitalen CFD-Berechnungen und physischen Versuchen trainierten künstlichen neuronalen Netzes (Metamodell)

    HS Coburg,

    FAU Erlangen-Nürnberg

    Stefan Kerscher Robuste Prädiktion von Verkehrsteilnehmern in einer urbanen Umgebung

    TH Deggendorf,

    Uni Regensburg,

    Continental

    Tobias Fertig Messen der Information Security Awareness in KMUs

    FHWS Würzburg-Schweinfurt,

    FAU Erlangen-Nürnberg

    Helge Olberding Thematische Kartographie und 3D-Geovisualisierung in interaktiven VR-Anwendungen

    FHWS Würzburg-Schweinfurt,

    Uni Würzburg

    Simon Seibt Bildbasierte Medienproduktionskette

    TH Nürnberg,

    Uni Würzburg

    Sascha Lang Bedienerunterstützung für Produktionsmaschinen mittels fallbasiertem Schließen

    HS Hof,

    Uni Bamberg

    Markus Miller Auf künstliche Intelligenz basierende rekonstruktive Verfahren zur Umfeldmodellierung

    HAW München

    TU München

    Theresa Meyer Änderungsdetektion durch Analyse von Bildsequenzen und BIM-konformen

    FHWS Würzburg-Schweinfurt

    TU München

    Elisabeth Wittmann Exploring the power of AI in spectral analysis particularly leveraging simulation via transfer learning

    OTH Regensburg,

    TU München

    Stefan Böhm Untersuchung verschiedener Ansätze der künstlichen Intelligenz zur Optimierung der Prozessaubläufe und Mensch-Maschinen-Kollaboration in der I4.0-Produktion

    TH Rosenheim,

    TU München

    Peter Meier Real-Time Signal Processing Algorithms for Interactive Music Analysis Applications

    TH Deggendorf,

    FAU Erlangen-Nürnberg

    Markus Schmidtner Konzeption und Realisierung eines adaptiven Referenzmodells für agile und hybride Vorgehensmodelle im Produktentstehungsprozess der Automobilindustrie

    HAW Landshut,

    FAU Erlangen-Nürnberg

     

    Sina Zimmermann

    Incentives for Sustainable Tranportation Behaviour Enabled by Digital Mobility Platforms

    HS Neu-Ulm;

    TU München

    Nikolai Körber Energy-Efficient Deep Learning-Based Image Compression for LPWANs on Resource-Constrainded AIoT

    HAW Landshut;

    TU München

    Finn Reiche Entwicklung eines Referenzmodells zur Plattformökonomie von Hochschulen

    HAW Landshut,

    FAU Erlangen-Nürnberg

    Alumni

    Dr. Rainer Koch

    Sensor fusion for precise mapping of transparent and specular reflective objects

     

    TH Nürnberg,

    Uni Würzburg

     

    Dr. Christian Pfitzner

    Visual body weight estimation with focus on clinical applications

    TH Nürnberg,

    Uni Würzburg

    Dr.-Ing. Maria Chizhova Virtuelle 3D-Rekonstruktion von zerstörten russisch-orthodoxen Kirchen aus unvollständigen Punktwolken 

    FHWS Würzburg-Schweinfurt,

    TU München

    Dr.-Ing. Matthias Niedermaier Security Herausforderungen und Werkzeuge für robuste industrielle Systeme im Internet-der-Dinge 

    HAW Augsburg;

    TU München

    Dr. Markus Ring

    Detektion sicherheitskritischer Ereignisse in Unternehmensnetzwerken mittels Data Mining

    HS Coburg;

    Universität Würzburg

    Dr. Manuel Ciba

    Messung der Synchronität und Abschätzung der Konnektivität von in-vitro Spike-Trains

    TH Aschaffenburg;

    Universität Würzburg

    Latest Publications

    [ 2021 ] [ 2020 ] [ 2019 ] [ 2018 ] [ 2017 ]

    2021 [ nach oben ]

    • 1.
      Weigl, S., Wittmann, E., Rück, T., Bierl, R., Matysik, F.-M.: Effects of ambient parameters and cross-sensitivities from O2, CO2 and H2O on the photoacoustic detection of acetone in the UV region. Sensors and Actuators B: Chemical. 328, (2021).
       

    2020 [ nach oben ]

    • 1.
      Schlör, D., Ring, M., Krause, A., Hotho, A.: Financial Fraud Detection with Improved Neural Arithmetic Logic Units. Springer (2020).
       
    • 2.
      Weiss, N., Renner, S., Mottok, J., Matousek, V.: Transport Layer Scanning for Attack Surface Detection in Vehicular Networks. Transport Layer Scanning for Attack Surface Detection in Vehicular Networks. pp. 1–8. ACM Computer Science in Cars Symposium (2020).
       
    • 3.
      Schmidtner, M., Timinger, H.: HyValue – a Hybrid Reference Model for the Automotive Product Development Process. IEEE TEMS Technology & Engineering Management Society (2020).
       
    • 4.
      Hilpoltsteiner, D., Schmidtner, M.: ADAMO - Echtzeit Kollaboration mit adaptiven Prozessmodellen (ADAMO - Real-Time Collaboration with Adaptive Process Models). In: Michael, J., Bork, D., Fill, H.-G., Fettke, P., Karagiannis, D., Köpke, J., Koschmider, A., Mayr, H.C., Rehse, J.-R., Reimer, U., Striewe, M., Tropmann-Frick, M., and Ullrich, M. (eds.) Modellierung (Companion). pp. 193–197. CEUR-WS.org (2020).
       
    • 5.
      Schmidtner, M., Timinger, H., Blust, M., Döring, C., Hilpoltsteiner, D.: Towards an adaptive reference model for agile and hybrid frameworks in automotive development. ICE/ITMC. pp. 1–10. IEEE (2020).
       
    • 6.
      Kriegl, B., Woratschek, H., Raab, A.: Physicians and Institutional Work: Unpacking the Black Box of Institutionalization at the Front Lines of Healthcare. Proceedings of the European Markting Academy (2020).
       
    • 7.
      Schulz, T., Böhm, M., Gewald, H.: Information Technology Choice in Mobility Service Ecosystems: A Qualitative Comparative Analysis. International Conference on Information Systems, ICIS 2020 Proceedings (2020).
       
    • 8.
      Schulz, T., Böhm, M., Gewald, H., Krcmar, H.: Smart mobility – an analysis of potential customers’ preference structures Electronic Markets. Electronic Markets. Springer (2020).
       
    • 9.
      Brost, J., Egger, C., Lai, R.W.F., Schmid, F., Schröder, D., Zoppelt, M.: Threshold Password-Hardened Encryption Services. In: Ligatti, J., Ou, X., Katz, J., and Vigna, G. (eds.) ACM Conference on Computer and Communications Security. pp. 409–424. ACM (2020).
       
    • 10.
      Fertig, T., Schütz, A.E., Weber, K.: Current Issues Of Metrics For Information Security Awareness. In: Rowe, F., Amrani, R.E., Limayem, M., Newell, S., Pouloudi, N., van Heck, E., and Quammah, A.E. (eds.) ECIS (2020).
       
    • 11.
      Fertig, T., Schütz, A.E., Weber, K., Müller, N.H.: Towards an Information Security Awareness Maturity Model. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (26). pp. 587–599. Springer (2020).
       
    • 12.
      Ulsamer, P., Fertig, T., Pfeffel, K., Müller, N.H.: Motor Imagery to Control Mobile Applications - An fNIRS Study. In: Vogel, D., Shen, K.N., Ling, P.S., Hsu, C., Thong, J.Y.L., Marco, M.D., Limayem, M., and Xu, S.X. (eds.) PACIS. p. 56 (2020).
       
    • 13.
      Auernhammer, K., Freiling, F., Tavakoli Kolagari, R.: Efficient Black-Box Search for Adversarial Examples using Relevance Masks. In DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security (DYNAMICS) Workshop (2020).
       
    • 14.
      Ciba, M., Bestel, R., Nick, C., de Arruda, G.F., Peron, T.K.D.M., Comin, C.H., da Fontoura Costa, L., Rodrigues, F.A., Thielemann, C.: Comparison of Different Spike Train Synchrony Measures Regarding Their Robustness to Erroneous Data From Bicuculline-Induced Epileptiform Activity. Neural Comput. 32, 887–911 (2020).
       
    • 15.
      Herl, G., Hiller, J., Maier, A.: Scanning trajectory optimisation using a quantitative Tuybased local quality estimation for robot-based X-ray computed tomography. Nondestructive Testing and Evaluation. 35, 287–303 (2020).
       
    • 16.
      Böhm, S.-A.: AI Approaches to Optimize Human-Machine Collaboration in Manufacturing Facilities with IoT-Ready Machinery. In: Davidsson, P., Langheinrich, M., Linde, P., Mayer, S., Casado-Mansilla, D., Spikol, D., Kraemer, F.A., and Russo, N.L. (eds.) IOT Companion. pp. 23:1–23:5. ACM (2020).
       
    • 17.
      Liang, H., Sauer, T., Faber, C.: Using wavelet transform to evaluate single-shot phase measuring deflectometry data. SPIE Proceedings. SPIE The international society for optics and photonics (2020).
       
    • 18.
      Renner, S., Pozzobon, E., Mottok, J.: A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers. ICICS. pp. 495–509. Springer (2020).
       
    • 19.
      Wunderlich, S., Ring, M., Landes, D., Hotho, A.: Comparison of System Call Representations for Intrusion Detection. Logic Journal of the IGPL. jzaa058, (2020).
       
    • 20.
      Wolf, M., Ring, M., Landes, D.: Impact of Generative Adversarial Networks on NetFlow-Based Traffic Classification. In: Herrero, Álvaro, Cambra, C., Urda, D., Sedano, J., Quintián, H., and Corchado, E. (eds.) CISIS. pp. 393–404. Springer (2020).
       
    • 21.
      Schlör, D., Ring, M., Krause, A., Hotho, A.: Financial Fraud Detection with Improved Neural Arithmetic Logic Units. Presented at the (2020).
       
    • 22.
      Tritscher, J., Ring, M., Schlör, D., Hettinger, L., Hotho, A.: Evaluation of Post-hoc XAI Approaches Through Synthetic Tabular Data. In: Helic, D., Leitner, G., Stettinger, M., Felfernig, A., and Ras, Z.W. (eds.) ISMIS. pp. 422–430. Springer (2020).
       
    • 23.
      Schlör, D., Ring, M., Hotho, A.: iNALU: Improved Neural Arithmetic Logic Unit. Frontiers in Artificial Intelligence. 3, 71 (2020).
       
    • 24.
      Schulz, T., Gewald, H., Böhm, M., Krcmar, H.: Smart Mobility: Contradictions in Value Co-Creation. Information Systems Frontiers. 22, (2020).
       
    • 25.
      Fischer, F., Niedermaier, M., Hanka, T., Knauer, P., Merli, D.: Analysis of Industrial Device Architectures for Real-Time Operations under Denial of Service Attacks. CoRR. abs/2007.08885, (2020).
       
    • 26.
      Schütz, A., Fertig, T., Weber, K.: Analyze Before You Sensitize: Preparation of a Targeted ISA Training. 53rd Hawaii International Conference on System Sciences (2020).
       
    • 27.
      Fertig, T., Schütz, A.: About the Measuring of Information Security Awareness: A Systematic Literature Review. 53rd Hawaii International Conference on System Sciences (2020).
       
    • 28.
      Müller-Wuttke, M., Schütz, A.E., Franz, F., Müller, N.H.: Proactive Smart City Interactions. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (26). pp. 615–624. Springer (2020).
       
    • 29.
      Doering, C., Schmidtner, M., Maerz, J., Mueller, V., Timinger, H.: Agile working during COVID-19 pandemic. Research Notes on Data and Process Science. issue 1, (2020).
       

    2019 [ nach oben ]

    • 1.
      Liang, H., Zimmermann, A., Kickingereder, R., Faber, C.: Eine neue Methode zur Lösung des Höhenproblems in der Deflektometrie. Deutsche Gesellschaft für angewandte Optik e.V (2019).
       
    • 2.
      Niedermaier, M., Fischer, F., Merli, D., Sigl, G.: Network Scanning and Mapping for IIoT Edge Node Device Security. Computing Research Repository CoRR. abs/1910.07622, (2019).
       
    • 3.
      Niedermaier, M., Hanka, T., Plaga, S., von Bodisco, A., Merli, D.: Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation. Computing Research Repository CoRR. abs/1904.04271, (2019).
       
    • 4.
      Zoppelt, M., Kolagari, R.T.: What Today’s Serious Cyber Attacks on Cars Tell Us: Consequences for Automotive Security and Dependability. In: Papadopoulos, Y., Aslansefat, K., Katsaros, P., and Bozzano, M. (eds.) IMBSA. pp. 270–285. Springer (2019).
       
    • 5.
      Zoppelt, M., Tavakoli Kolagari, R.: UnCle SAM : Modeling Cloud Attacks with the Automotive Security Abstraction Model. In CLOUD COMPUTING 2019. CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization, At Venice, Italy (2019).
       
    • 6.
      von Rymon Lipinski, B., Seibt, S., Roth, J., Abé, D.: Level Graph - Incremental Procedural Generation of Indoor Levels using Minimum Spanning Trees. CoG. pp. 1–7. IEEE (2019).
       
    • 7.
      Weber, K., Saueressig, G., Schütz, A.: Informationssicherheit und Datenschutz an Hochschulen organisieren. Angewandte Forschung in der Wirtschaftsinformatik. (2019).
       
    • 8.
      Franz, F., Fertig, T., Schütz, A.E., Vu, H.: Towards Human-readable Smart Contracts. IEEE ICBC. pp. 38–42. IEEE (2019).
       
    • 9.
      Kerscher, S., Ludwig, B., Müller, N.: Investigating the Added Value of Combining Regression Results from Different Window Lengths. AIKE. pp. 128–135. IEEE (2019).
       
    • 10.
      Koch, P., May, S., Engelhardt, H., Ziegler, J., Nüchter, A.: Signed Distance Based Reconstruction for Exploration and Change Detection in Underground Mining Disaster Prevention. SSRR. pp. 1–2. IEEE (2019).
       
    • 11.
      Schütz, A., Tobias, F., Kristin, W., Nicholas, M.: How E-Learning can Faciliate Information Security Awareness. Learning and Collaboration Technologies. (2019).
       
    • 12.
      Fertig, T., Schütz, A.E., Weber, K., Müller, N.H.: Measuring the Impact of E-Learning Platforms on Information Security Awareness. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (25). pp. 26–37. Springer (2019).
       
    • 13.
      Ring, M., Wunderlich, S., Scheuring, D., Landes, D., Hotho, A.: A survey of network-based intrusion detection data sets. In Computers and Security 86, 2019, 147-167, DOI:. Computers and Security. pp. 147–167 (2019).
       
    • 14.
      Herl, G., Hiller, J., Kasperl, S., Maier, A.: Reduktion von Metallartefakten durch multipositionale Datenfusion in der industriellen Röntgen-Computertomographie. de Gruyter, tm-Technisches Messen. (2019).
       
    • 15.
      Liang, H., Zimmermann, A., Reiner, K., Christian, F.: A new method for solving the height problem in deflectometry. Proceedings Applied Optical Metrology III (2019).
       
    • 16.
      Herl, G., Hiller, J., Sauer, T.: Artifact reduction in X-ray computed tomography by multipositional data fusion using local image quality measures. Proceedings of the 9th Conference on Industrial Computed Tomography, Padova, Italy (iCT 2019) (2019).
       
    • 17.
      Schütz, A.E., Fertig, T., Weber, K., Müller, N.H.: How E-Learning Can Facilitate Information Security Awareness. In: Zaphiris, P. and Ioannou, A. (eds.) HCI (25). pp. 390–401. Springer (2019).
       
    • 18.
      Niedermaier, M., Merli, D., Georg, S.: A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices. Mediterranean Conference on Embedded Computing (MECO); IEEE. (2019).
       
    • 19.
      Koch, P., May, S., Engelhardt, H., Ziegler, J., Nüchter, A.: Signed Distance Based Reconstruction for Exploration and Change Detection in Underground Mining Disaster Prevention. IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR ’19). pp. 1–2 (2019).
       
    • 20.
      Reinker, F., Wagner, R., Hasselmann, K., aus der Wiesche, S., Fritsche, M., Epple, P., Rußwurm, H.J.: Testing, modeling and simulation of fans working with organic vapors. Proceedings of 13th European Conference on Turbomachinery Fluid dynamics & Thermodynamics (2019).
       
    • 21.
      Auernhammer, K., Tavakoli Kolagari, R., Zoppelt, M.: Attacks on Machine Learning: Lurking Danger for Accountability. Proceedings of the Association for the Advancement of Artificial Intelligence AAAI Workshop on Artificial Intelligence Safety 2019 (2019).
       
    • 22.
      Sauer, F., Niedermaier, M., Kießling, S., Merli, D.: LICSTER - A Low-cost ICS Security Testbed for Education and Research. Computing Research Repository CoRR. abs/1910.00303, (2019).
       
    • 23.
      aus der Wiesche, S., Reinker, F., Wagner, R., Epple, P., Fritsche, M., Russwurm, H.J.: An Accurate Thermal Measurement Approach for Determining Fan Efficiencies Based on System Identification. ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference (2019).
       
    • 24.
      Fritsche, M., Epple, P., Hasselmann, K., Reinker, F., Wagner, R., aus der Wiesche, S., Russwurm, H.: CFD-Simulation of Centrifugal Fan Performance Characteristics Using Ideal and Real Gas Models for Air and Organic Fluids. ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference (2019).
       
    • 25.
      Epple, P., Steppert, M., Malcherek, A., Fritsche, M.: Theoretical and Numerical Analysis of the Pressure Distribution and Discharge Velocity in Flows Under Inclined Sluice Gates. ASME-JSME_KSME 2019 8th Joint Fluids Engineering Conference. (2019).
       
    • 26.
      Niedermaier, M., Striegel, M., Sauer, F., Merli, D., Sigl, G.: Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices. Computing Research Repository CoRR. abs/1908.03964, (2019).
       

    2018 [ nach oben ]

    • 1.
      Kasperl, S., Hanke, R., Oeckl, S., Schmitt, P., Uhlmann, N., Heinz, D., Herl, G., Hiller, J., Kämmler, A., Miller, T., Stock, A.M., Sauer, T.: Digitization, Data Processing and Analysis of Industrial and Cultural Objects: Creating Additional Value from Big Data. Proceedings of the 12th, European Conference on Non-Destructive Testing (ECNDT) 2018, Gothenburg-Sweden (2018).
       
    • 2.
      Ring, M., Schlör, D., Landes, D., Hotho, A.: Flow-based Network Traffic Generation using Generative Adversarial Networks. Computing Research Repository CoRR. abs/1810.07795, (2018).
       
    • 3.
      Pfitzner, C., May, S., Nüchter, A.: Body Weight Estimation for Dose-Finding and Health Monitoring of Lying, Standing and Walking Patients Based on RGB-D Data. Sensors. 18, (2018).
       
    • 4.
      Stock, M., Herl, G., Sauer, T., Hiller, J.: Edge Preserving Compression of CT Scans using Wavelets. Proceedings of the Structural Health Monitoring, International Symposium Nondestructive Testing 4-5 October 2018, Saarbruecken, Germany (2018).
       
    • 5.
      Kasperl, S., Hanke, R., Oeckl, S., Schmitt, P., Uhlmann, N., Heinz, D., Herl, G., Hiller, J., Kämmler, A., Miller, T., Stock, A., Sauer, T.: Digitalisierung, Verarbeitung und Analyse kultureller und industrieller Objekte: Wertschöpfung aus großen Datenmengen. Jahrestagung für zerstörungsfreie Prüfung (2018), Deutsche Gesellschaft DGZfP (2018).
       
    • 6.
      Schütz, A.E., Fertig, T., Weber, K., Vu, H., Hirth, M., Tran-Gia, T.: Vertrauen ist gut, Blockchain ist besser - Einsatzmöglichkeiten von Blockchain für Vertrauensprobleme im Crowdsourcing. HMD Prax. der Wirtschaftsinformatik. 55, 1155–1166 (2018).
       
    • 7.
      Herl, G., Rettenberger, S., Hiller, J., Sauer, T.: Metal artifact reduction by fusion of CT scans from different positions using the unfiltered backprojection. Proceedings of the 8th Conference on Industrial Computed Tomography, Wels, Austria (iCT 2018) (2018).
       
    • 8.
      Ring, M., Landes, D., Hotho, A.: Detection of slow port scans in flow-based network traffic. PLOS ONE. 13, 1–18 (2018).
       
    • 9.
      Schulz, T., Überle, M.: How Institutional Arrangements impede Realization of Smart Ecosystems: the Case of Door-to-Door Mobility integrators. In: Bednar, P.M., Frank, U., and Kautz, K. (eds.) Proceedings of the European Conference on Information Systems (ECIS 2018), Portsmouth, UK, 2018. p. 135 (2018).
       
    • 10.
      Schütz, A., Fertig, T., Weber, K., Vu, H., Hirth, M., Tran-Gia, T.: Vertrauen ist gut, Blockchain ist besser - Einsatzmöglichkeiten von Blockchain für Vertrauensprobleme im Crowdsourcing. HMD Praxis der Wirtschaftsinformatik. (2018).
       
    • 11.
      Stieler, M., Kriegl, B.: How do consumers experience the emotional rollercoaster? A smartphone app to measure emotions continously, transfer. Werbeforschung & Praxis. 64, 43–53 (2018).
       
    • 12.
      Niedermaier, M., Malchow, J.-O., Fischer, F., Marzin, D., Merli, D., Roth, V., von Bodisco, A.: You Snooze, You Lose: Measuring PLC Cycle Times under Attacks. In: Rossow, C. and Younan, Y. (eds.) WOOT @ USENIX Security Symposium. USENIX Association (2018).
       

    2017 [ nach oben ]

    • 1.
      Koch, R., May, S., Nüchter, A.: Detection and Purging of Specular Reflective and Transparent Object Influences in 3D Range Measurements. Proceedings of the 7th International Society for Photogrammetry and Remote Sensing, ISPRS International Workshop 3D-ARCH 2017: "3D Virtual Reconstruction and Visualization of Complex Architectures". pp. 377–384. , Nafplio, Greece (2017).
       
    • 2.
      Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: Creation of Flow-Based Data Sets for Intrusion Detection. Journal of Information Warfare. 16, 41–54 (2017).
       
    • 3.
      Ring, M., Landes, D., Dallmann, A., Hotho, A.: IP2Vec: Learning Similarities Between IP Addresses. 2017 IEEE International Conference on Data Mining Workshops (ICDMW). pp. 657–666 (2017).
       
    • 4.
      Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: A Toolset for Intrusion and Insider Threat Detection. In: Palomares Carrascosa, I., Kalutarage, H.K., and Huang, Y. (eds.) Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications. pp. 3–31. Springer International Publishing, Cham (2017).
       
    • 5.
      Ring, M., Wunderlich, S., Grüdl, D., Landes, D., Hotho, A.: Flow-based benchmark data sets for intrusion detection. Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS). pp. 361–369. ACPI (2017).
       
    • 6.
      Pfitzner, C., May, S., Nüchter, A.: Evaluation of Features from RGB-D Data for Human Body Weight Estimation. International Federation of Automatic Control. , Toulouse, France (2017).
       
    • 7.
      Marc Philipp Dietrich, G.W.: Towards EEG-Based Eye-Tracking for Interaction Design in Head-Mounted Devices. Proceedings of the 7th International Conference on Consumer Electronics Berlin (ICCE-Berlin), 2017 IEEE (2017).
       
    • 8.
      Koch, R., Böttcher, L., Jahrsdörfer, M., Maier, J., Trommer, M., May, S., Nüchter, A.: Out of lab calibration of a rotating 2D scanner for 3D mapping. Proceedings of the International Society for Optics and Photonics SPIE optical metrology, Videometrics, Range Imaging, and Applications. pp. 10332 – 10332 . , Munich, Germany (2017).
       
    • 9.
      Koch, R., May, S., Nüchter, A.: Effective Distinction Of Transparent And Specular Reflective Objects In Point Clouds Of A Multi-Echo Laser Scanner. Proceedings of the 18th IEEE International Conference on Advanced Robotics (ICAR ’17). pp. 566–571. , Hong Kong, China (2017).