Publikationen an der Fakultät für Informatik und Automatisierung ab 2015

Anzahl der Treffer: 1932
Erstellt: Sat, 11 May 2024 23:10:03 +0200 in 0.0489 sec


Cierpka, Christian; Mäder, Patrick
SmartPIV - Smartphone-based flow visualization for education :
SmartPIV - Strömungsvisualisierung mit dem Smartphone in der Lehre. - In: Experimentelle Strömungsmechanik, (2019), S. 23.1-23.7

Kuang, Hongyu; Gao, Hui; Hu, Hao; Ma, Xiaoxing; Lü, Jian; Mäder, Patrick; Egyed, Alexander
Using frugal user feedback with closeness analysis on code to improve IR-based traceability recovery. - In: ICPC 2019, (2019), S. 369-379

https://doi.org/10.1109/ICPC.2019.00055
Lasch, Robert; Oukid, Ismail; Dementiev, Roman; May, Norman; Demirsoy, Suleyman S.; Sattler, Kai-Uwe
Fast & strong: the case of compressed string dictionaries on modern CPUs. - In: 15th International Workshop on Data Management on New Hardware (DaMoN 2019), (2019), article no. 4, 10 Seiten

https://doi.org/10.1145/3329785.3329924
Amthor, Peter; Fischer, Daniel; Kühnhauser, Winfried; Stelzer, Dirk
Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems. - In: ARES 2019, (2019), article no. 86, 10 Seiten

Cyber security management requires fast and cost efficient responses to threat alerts. Automation of cyber threat sensing and responding is one way to achieve immediate reactions to imminent threats. There are already tools for an extensive automation of threat sensing, e.g. threat intelligence sharing platforms. Methods, techniques and tools for reacting to menacing states and events, e.g. security-policy-controlled systems, have also been explored and published for some time. What is still missing, however, is the integration of these two approaches. This paper describes first steps towards an integration of threat intelligence sharing platforms and security-policy-controlled systems. We present a conceptual design for threat reaction strategies, security architectures and mechanisms and information representation requirements. We use two exemplary threat scenarios to demonstrate our proposals.



https://doi.org/10.1145/3339252.3340509
Pfeiffer, Michael; Roßberg, Michael; Buttgereit, Simon; Schäfer, Günter
Strong tenant separation in cloud computing platforms. - In: ARES 2019, (2019), article no. 15, 10 Seiten

https://doi.org/10.1145/3339252.3339262
Theil, Markus; Backhaus, Martin; Roßberg, Michael; Schäfer, Günter
Towards a security architecture for hybrid WMNs. - In: ARES 2019, (2019), article no. 107, 10 Seiten

https://doi.org/10.1145/3339252.3340106
Richter, Johannes; Streitferdt, Detlef
Modern architecture for deep learning-based automatic optical inspection. - In: 2019 IEEE 43rd Annual Computer Software and Applications Conference, (2019), S. 141-145

https://doi.org/10.1109/COMPSAC.2019.10197
Weichenhain, Maxi; Fengler, Wolfgang; Streitferdt, Detlef
How to bring project management of embedded systems to an appropriate level of abstraction for a discrete event model. - In: 2019 IEEE 43rd Annual Computer Software and Applications Conference, (2019), S. 171-176

https://doi.org/10.1109/COMPSAC.2019.10202
Scheidig, Andrea; Jäschke, Bianca; Schütz, Benjamin; Trinh, Thanh Q.; Vorndran, Alexander; Mayfarth, Anke; Groß, Horst-Michael
May I keep an eye on your training? Gait assessment assisted by a mobile robot. - In: 2019 IEEE 16th International Conference on Rehabilitation Robotics (ICORR), (2019), S. 701-708

https://doi.org/10.1109/ICORR.2019.8779369
Alramlawi, Mansour; Souidi, Youssef; Li, Pu
Optimal design of PV-battery microgrid incorporating lead-acid battery aging model. - In: Conference proceedings 2019 IEEE International Conference on Environment and Electrical Engineering and 2019 IEEE Industrial and Commercial Power Systems Europe (EEEIC/I & CPS Europe), (2019), insges. 6 S.

https://doi.org/10.1109/EEEIC.2019.8783927