|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 181 occurrences of 158 keywords
|
|
|
Results
Found 844 publication records. Showing 763 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
110 | Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Ramesh |
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Knowl. Discov. Data ![In: ACM Trans. Knowl. Discov. Data 2(3), pp. 13:1-13:44, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anonymization, sampling, matching, correlation, frequent itemsets, bipartite graphs, belief function, hacker, prior knowledge, Disclosure risk |
86 | Jonathan F. Spencer |
Using XML to map relationships in hacker forums. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 46th Annual Southeast Regional Conference, 2008, Auburn, Alabama, USA, March 28-29, 2008, pp. 487-489, 2008, ACM, 978-1-60558-105-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
XScrape, screen scraping, tidy, data-mining, Java, XML, HTML, XPath, hacker, XSL, XHTML, forum |
86 | Nancy A. Staudenmayer |
Moving away from a hacker vs. disciplined-based organizational legacy-an organization theory perspective on software processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPW ![In: 10th International Software Process Workshop, ISPW 1996, June 17-19, 1996, Dijon, France, pp. 104-108, 1996, IEEE Computer Society, 0-8186-7725-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
hacker approach, disciplined-based approach, software firms, product choice, managerial challenges, software development, software processes, software development management, software products, organization theory |
72 | Sergey Bratus, Anna Shubina, Michael E. Locasto |
Teaching the principles of the hacker curriculum to undergraduates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 122-126, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
hacker curriculum, sismat, teaching failure modes, security, networking, information assurance |
58 | Greg Goth, Benjamin Alfonsi |
News. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(6), pp. 8-13, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Sergey Bratus |
What Hackers Learn that the Rest of Us Don't: Notes on Hacker Curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(4), pp. 72-75, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Syed A. Saleem |
Ethical hacking as a risk management technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 201-203, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ethical hacker, white hat hacker, network security, information security, computer security, system security |
43 | Thawatchai Chomsiri |
HTTPS Hacking Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 590-594, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Ramesh |
To Do or Not To Do: The Dilemma of Disclosing Anonymized Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Baltimore, Maryland, USA, June 14-16, 2005, pp. 61-72, 2005, ACM, 1-59593-060-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos |
Search Engines as a Security Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 34(10), pp. 25-30, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Andrei Lima Queiroz, Susan McKeever, Brian Keegan |
Detecting Hacker Threats: Performance of Word and Sentence Embedding Models in Identifying Hacker Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICS ![In: Proceedings for the 27th AIAI Irish Conference on Artificial Intelligence and Cognitive Science, Galway, Ireland, December 5-6, 2019., pp. 116-127, 2019, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
40 | Wael Khalifa, Kenneth Revett, Abdel-Badeeh M. Salem |
In the Hacker's Eye: The Neurophysiology of a Computer Hacker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICGS3/e-Democracy ![In: Global Security, Safety and Sustainability & e-Democracy - 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers, pp. 112-119, 2011, Springer, 978-3-642-33447-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Nir Kshetri |
The Simple Economics of Cybercrimes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(1), pp. 33-39, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
vicious circle, online extortions, psychological costs and benefits, hacker, Cybercrimes |
37 | Michael Ettredge, Vernon J. Richardson |
Assessing the Risk in E-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 194, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Electronic Commerce Risk, Hacker Attacks, Stock Market Reaction |
37 | Xiaobing Zhang, Shyhtsun Felix Wu, Zhi Fu, Tsung-Li Wu |
Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Eighth Annual International Conference on Network Protocols, ICNP 2000, 14-17 November, 2000, Osaka, Japan, pp. 263-272, 2000, IEEE Computer Society, 0-7695-0921-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
malicious packet dropping, dropping attack, severe damage, Internet environment, statistical analysis module, session delay, Internet, statistical analysis, transport protocols, packet switching, position, router, TCP performance, telecommunication security, hacker, detection performance, packet reorderings, denial of service attacks |
37 | Julie L. Connolly |
Operation chain link: the deployment of a firewall at Hanscom Air Force Base. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 170-177, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
operation chain link, Hanscom Air Force Base, Electronic Systems Center, unclassified network, Internet threats, network security assessments, hacker break-in, firewall development team, firewall deployment, security management, military computing |
37 | Cindy Cullen |
Internet vulnerabilities of one-time passcode mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 20th Conference on Local Computer Networks (LCN'95), Minneapolis, Minnesota, USA, October 16-19, 1995, pp. 184-186, 1995, IEEE Computer Society, 0-8186-7162-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
one-time passcode mechanisms, passive attack, one-time passcode server, hacker tools, authentication, security of data, vulnerabilities, hackers, user identification |
35 | Joris Dormans |
The Hacker: New Mythical Content of Narrative Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TIDSE ![In: Technologies for Interactive Digital Storytelling and Entertainment, Third International Conference, TIDSE 2006, Darmstadt, Germany, December 4-6, 2006., pp. 104-115, 2006, Springer, 3-540-49934-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Computer Games, Interactive Storytelling, Mythology |
29 | Irfan A. Siddavatam, Jayant Gadge |
Comprehensive test mechanism to detect attack on Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jayamsakthi Shanmugam, M. Ponnavaikko |
Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the Server Side. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, USA, pp. 398-405, 2007, IEEE Computer Society, 0-7695-3039-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Application-level web Security, cross-site scripting, security vulnerabilities |
29 | Gregory B. Newby |
Paths to creativity in security careers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 3, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Gang Tan, Yuqun Chen, Mariusz H. Jakubowski |
Delayed and Controlled Failures in Tamper-Resistant Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 216-231, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Hengming Zou, Henghui Zou |
PDE-Based Intrusion Forecast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (3) ![In: Advances in Natural Computation, First International Conference, ICNC 2005, Changsha, China, August 27-29, 2005, Proceedings, Part III, pp. 996-1000, 2005, Springer, 3-540-28320-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Bruce Schneier |
Airplane Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(6), pp. 92, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Gregory J. Conti, James Caroland |
Embracing the Kobayashi Maru: Why You Should Teach Your Students to Cheat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(4), pp. 48-51, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
hacker mindset, adversary mindset, cheating exercises, ethics, cheating |
23 | Charles Day |
"Compute? No, Mr. Bond, I Expect You to Die!". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Sci. Eng. ![In: Comput. Sci. Eng. 11(2), pp. 88, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Last Word, James Bond, Ian Fleming, Computing, engineering, science, hacker |
23 | Raúl Rojas 0001 |
Reviews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Ann. Hist. Comput. ![In: IEEE Ann. Hist. Comput. 29(1), pp. 96-99, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
early computers, history of typewriting, business data processing technology, life insurance industry, hacker pranks, geodesy, Alan Turing |
23 | Russell D. Rosco, Marcus K. Rogers, Samuel Liles |
Breaking Down Stereotypes: A Call for an Ontological Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 271, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Deviant, Ontology, Computer, Hacker |
23 | Julien Budynek, Eric Bonabeau, Ben Shargel |
Evolving computer intrusion scripts for vulnerability assessment and log analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2005, Proceedings, Washington DC, USA, June 25-29, 2005, pp. 1905-1912, 2005, ACM, 1-59593-010-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
script kiddies, agent-based model, log analysis, hacker, vulnerability assessment |
23 | Nicholas Athanasiades, Randal T. Abler, John G. Levine, Henry L. Owen, George F. Riley |
Intrusion Detection Testing and Benchmarking Methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 63-72, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Intrusion Detection Testing, Network Attack Generation, Hacker Tools, Network Security |
22 | Janek Gröhl, Thomas R. Else, Lina Hacker, Ellie V. Bunce, Paul W. Sweeney, Sarah E. Bohndiek |
Moving Beyond Simulation: Data-Driven Quantitative Photoacoustic Imaging Using Tissue-Mimicking Phantoms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Medical Imaging ![In: IEEE Trans. Medical Imaging 43(3), pp. 1214-1224, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | John H. R. Burns, Kailey H. Pascoe, Haunani H. Kane, Joseph W. P. Nakoa, Makoa Pascoe, Sophia R. Pierucci, Riley E. Sokol, Krista A. Golgotiu, Manuela Cortes, Aralyn Hacker, Lorenzo Villela, Brianna K. Ninomoto, Kainalu Steward, Cindy Otcenasek, Clifford Kapono |
Community-Based Monitoring for Rapid Assessment of Nearshore Coral Reefs Amid Disturbances in Teahupo'o, Tahiti. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 16(5), pp. 853, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Thomas R. Else, Janek Gröhl, Lina Hacker, Sarah E. Bohndiek |
PATATO: a Python photoacoustic tomography analysis toolkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Open Source Softw. ![In: J. Open Source Softw. 9(93), pp. 5686, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Claudio Novelli, Federico Casolari, Philipp Hacker, Giorgio Spedicato, Luciano Floridi |
Generative AI in EU Law: Liability, Privacy, Intellectual Property, and Cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.07348, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Janek Gröhl, Kylie Yeung, Kevin Gu, Thomas R. Else, Monika Golinska, Ellie V. Bunce, Lina Hacker, Sarah E. Bohndiek |
Distribution-informed and wavelength-flexible data-driven photoacoustic oximetry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.14863, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Ahmad Rashid, Serena Hacker, Guojun Zhang, Agustinus Kristiadi, Pascal Poupart |
Preventing Arbitrarily High Confidence on Far-Away Data in Point-Estimated Discriminative Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISTATS ![In: International Conference on Artificial Intelligence and Statistics, 2-4 May 2024, Palau de Congressos, Valencia, Spain., pp. 3034-3042, 2024, PMLR. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
22 | Florian Skopik, Arndt Bonitz, Daniel Slamanig, Markus Kirschner, Wolfgang Hacker |
SD4MSD: Using a Single Device for Multiple Security Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ERCIM News ![In: ERCIM News 2023(134), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
22 | Murray Bruce Reed, Magdalena Ponce de León, Chrysoula Vraka, Ivo Rausch, Godber Mathis Godbersen, Valentin Popper, Barbara Katharina Geist, Arkadiusz Komorowski, Lukas Nics, Clemens Schmidt, Sebastian Klug, Werner Langsteger, Georgios Karanikas, Tatjana Traub-Weidinger, Andreas Hahn 0001, Rupert Lanzenberger, Marcus Hacker |
Whole-body metabolic connectivity framework with functional PET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NeuroImage ![In: NeuroImage 271, pp. 120030, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Hawazin Alghamdi, Olasunbo Z. Farinre, Mathew L. Kelley, Adam J. Biacchi, Dipanjan Saha, Tehseen Adel, Kerry Siebein, Angela R. Hight Walker, Christina A. Hacker, Albert F. Rigosi, Prabhakar Misra |
Experimental Spectroscopic Data of SnO2 Films and Powder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data ![In: Data 8(2), pp. 37, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Philipp Hacker, Jürgen Neyer |
Substantively smart cities - Participation, fundamental rights and temporality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Policy Rev. ![In: Internet Policy Rev. 12(1), March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Joseph Snider, Ryan J. Spence, Anne-Marie Engler, Ryan Moran, Sarah Hacker, Leanne Chukoskie, Jeanne Townsend, Linda L. Hill |
Distraction "Hangover": Characterization of the Delayed Return to Baseline Driving Risk After Distracting Behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 65(2), pp. 306-320, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Philipp Hacker |
Sustainable AI Regulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.00292, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Philipp Hacker, Andreas Engel 0006, Marco Mauer |
Regulating ChatGPT and other Large Generative AI Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.02337, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Alessandro Fabris, Nina Baranowska, Matthew J. Dennis, Philipp Hacker, Jorge Saldivar, Frederik J. Zuiderveen Borgesius, Asia J. Biega |
Fairness and Bias in Algorithmic Hiring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.13933, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, Andreas Ulbig |
An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.13737, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Ahmad Rashid, Serena Hacker, Guojun Zhang, Agustinus Kristiadi, Pascal Poupart |
Preventing Arbitrarily High Confidence on Far-Away Data in Point-Estimated Discriminative Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.03683, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze |
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.09390, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Janek Gröhl, Thomas R. Else, Lina Hacker, Ellie V. Bunce, Paul W. Sweeney, Sarah E. Bohndiek |
Moving beyond simulation: data-driven quantitative photoacoustic imaging using tissue-mimicking phantoms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.06748, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Leonard Hacker, Finn Bartels, Pierre-Etienne Martin |
Fine-Grained Action Detection with RGB and Pose Information using Two Stream Convolutional Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.02755, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Robyn Brooks, Celia Hacker, Claudia Landi 0001, Barbara I. Mahler, Elizabeth R. Stephenson |
Switch Points of Bi-Persistence Matching Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.02955, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Kelly Maggs, Celia Hacker, Bastian Rieck |
Simplicial Representation Learning with Neural k-forms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.08515, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Philipp Hacker |
AI Regulation in Europe: From the AI Act to Future Regulatory Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.04072, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Philipp Hacker |
The European AI liability directives - Critique of a half-hearted approach and lessons for the future. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 51, pp. 105871, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Ingrid Bauer 0001, Rafael Ziolkowski, Janine Hacker, Gerhard Schwabe |
Why Blockchain: A Socio-technical Perspective on the Motives of Business Consortia Members to Engage with Blockchain Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Ledger Technol. Res. Pract. ![In: Distributed Ledger Technol. Res. Pract. 2(2), pp. 1-27, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Noa Gueron-Sela, Ido Shalev, Avigail Gordon-Hacker, Alisa Egotubov, Rachel Barr |
Screen media exposure and behavioral adjustment in early childhood during and after COVID-19 home lockdown periods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 140, pp. 107572, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Oliver Hacker, Thomas Buchmann |
NICE: A Flexible Expression Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MODELSWARD ![In: Proceedings of the 11th International Conference on Model-Based Software and Systems Engineering, MODELSWARD 2023, Lisbon, Portugal, February 19-21, 2023., pp. 63-74, 2023, SCITEPRESS, 978-989-758-633-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Manuel Weber, Janine Hacker, Laura Karintaus, Samuli Pekkola, Jan vom Brocke, Maija Ylinen |
Preparing for Cyberattacks: a Case Study of Resilience in the Health-Care Sector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIS ![In: 31st European Conference on Information Systems - Co-creating Sustainable Digital Futures, ECIS 2023, Kristiansan, Norway, June 11-16, 2023, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
22 | Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze |
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, July 3-7, 2023, pp. 1065-1081, 2023, IEEE, 978-1-6654-6512-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Philipp Hacker, Andreas Engel 0006, Marco Mauer |
Regulating ChatGPT and other Large Generative AI Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FAccT ![In: Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency, FAccT 2023, Chicago, IL, USA, June 12-15, 2023, pp. 1112-1123, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Antigona Selimaj, Immanuel Hacker, Ronja Steinfurth, Andreas Ulbig |
Optimal Time Coordination of Definite-Time Overcurrent Relays for Adaptive Protection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISGT EUROPE ![In: IEEE PES Innovative Smart Grid Technologies Europe, ISGT EUROPE 2023, Grenoble, France, October 23-26, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-9678-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Chunming Rong, Jiahui Geng, Thomas J. Hacker, Haakon Bryhni, Martin Gilje Jaatun |
OpenIaC: open infrastructure as code - the network is my computer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cloud Comput. ![In: J. Cloud Comput. 11, pp. 12, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Daling Li Yi, Oleg Melnichenko, Peter Hacker, Ke Fan |
Satellite-Observed Time and Length Scales of Global Sea Surface Salinity Variability: A Comparison of Three Satellite Missions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 14(21), pp. 5435, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Angela Lausch, Michael E. Schaepman, Andrew K. Skidmore, Eusebiu Catana, Lutz Bannehr, Olaf Bastian, Erik Borg, Jan Bumberger, Peter Dietrich, Cornelia Glässer, Jörg M. Hacker, René Hofer, Thomas Jagdhuber, Sven Jany, András Jung, Arnon Karnieli, Reinhard Klenke, Toralf Kirsten, Uta Ködel, Wolfgang Kresse, Ulf Mallast, Carsten Montzka, Markus Möller, Hannes Mollenhauer, Marion Pause, Minhaz Rahman, Franziska Schrodt, Christiane Schmullius, Claudia Schütze, Peter Selsam, Ralf-Uwe Syrbe, Sina C. Truckenbrodt, Michael Vohland, Martin Volk 0002, Thilo Wellmann, Steffen Zacharias, Roland Baatz |
Remote Sensing of Geomorphodiversity Linked to Biodiversity - Part III: Traits, Processes and Remote Sensing Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 14(9), pp. 2279, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Philipp Hacker, Felix Naumann, Tobias Friedrich 0001, Stefan Grundmann, Anja Lehmann, Herbert Zech |
AI Compliance - Challenges of Bridging Data Science and Law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Data Inf. Qual. ![In: ACM J. Data Inf. Qual. 14(3), pp. 21:1-21:4, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Olasunbo Z. Farinre, Hawazin Alghamdi, Swapnil M. Mhatre, Mathew L. Kelley, Adam J. Biacchi, Albert V. Davydov, Christina A. Hacker, Albert F. Rigosi, Prabhakar Misra |
Comprehensive Data via Spectroscopy and Molecular Dynamics of Chemically Treated Graphene Nanoplatelets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data ![In: Data 7(4), pp. 38, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner 0003, Martin Henze, Martin Serror |
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.04716, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Philipp Hacker, Johann Cordes, Janina Rochon |
Regulating Gatekeeper AI and Data: Transparency, Access, and Fairness under the DMA, the GDPR, and beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.04997, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Ömer Sen, Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze |
On Specification-based Cyber-Attack Detection in Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.04354, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Stefania Ebli, Celia Hacker, Kelly Maggs |
Morse Theoretic Signal Compression and Reconstruction on Chain Complexes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.08571, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Philipp Hacker |
The European AI Liability Directives - Critique of a Half-Hearted Approach and Lessons for the Future. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.13960, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Ben Craps, Marine De Clerck, Oleg Evnin, Philip Hacker, Maxim Pavlov |
Bounds on quantum evolution complexity via lattice cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.13924, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Asilata Bapat, Robyn Brooks, Celia Hacker, Claudia Landi 0001, Barbara I. Mahler, Elizabeth R. Stephenson |
Computing the Matching Distance of 2-Parameter Persistence Modules from Critical Values. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.12868, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Csaba Tóth, Darrick Lee, Celia Hacker, Harald Oberhauser |
Capturing Graphs with Hypo-Elliptic Diffusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.14092, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Celia Hacker, Bastian Rieck |
On the Surprising Behaviour of node2vec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.08252, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Meike Zehlike, Alex Loosley, Håkan Jonsson, Emil Wiedemann, Philipp Hacker |
Beyond Incompatibility: Trade-offs between Mutually Exclusive Fairness Criteria in Machine Learning and Law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.00469, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | James P. Becker, Douglas J. Hacker |
Conceptual-Based Writing Exercises in a Circuit Analysis Course. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Educ. ![In: IEEE Trans. Educ. 65(4), pp. 544-552, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Ömer Sen, Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze |
On specification-based cyber-attack detection in smart grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Energy Inform. ![In: Energy Inform. 5, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Michael Itzkin, Laura J. Moore, Peter Ruggiero, Paige A. Hovenga, Sally D. Hacker |
Combining process-based and data-driven approaches to forecast beach and dune change. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Environ. Model. Softw. ![In: Environ. Model. Softw. 153, pp. 105404, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Satwik Dutta, Sarah Anne Tao, Jacob C. Reyna, Rebecca Elizabeth Hacker, Dwight W. Irvin, Jay F. Buzhardt, John H. L. Hansen |
Challenges remain in Building ASR for Spontaneous Preschool Children Speech in Naturalistic Educational Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERSPEECH ![In: Interspeech 2022, 23rd Annual Conference of the International Speech Communication Association, Incheon, Korea, 18-22 September 2022., pp. 4322-4326, 2022, ISCA. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Linda Achilles, Thomas Mandl 0001, Christa Womser-Hacker |
Thinspiration Inspired by K-pop: A Comparison of K-pop Related Thinspiration Imagery and Texts to Regular Thinspiration Content on Tumblr. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIS ![In: Well-Being in the Information Society: When the Mind Breaks - 9th International Conference, WIS 2022, Turku, Finland, August 25-26, 2022, Proceedings, pp. 63-77, 2022, Springer, 978-3-031-14831-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Suzana Brown, Faheem Hussain, Emily Hacker, Maurice Bess, Achilles Vairis |
Evaluating Mobility and Access of Disabled Refugees in Rohingya Camps in COX'S Bazar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICT4D ![In: Freedom and Social Inclusion in a Connected World - 17th IFIP WG 9.4 International Conference on Implications of Information and Digital Technologies for Development, ICT4D 2022, Lima, Peru, May 25-27, 2022, Proceedings, pp. 583-592, 2022, Springer, 978-3-031-19428-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Oliver Hacker, Matthias Korch, Johannes Seiferth |
A Motivating Case Study on Code Variant Selection by Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: High Performance Computing - 37th International Conference, ISC High Performance 2022, Hamburg, Germany, May 29 - June 2, 2022, Proceedings, pp. 293-312, 2022, Springer, 978-3-031-07311-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner 0003, Martin Henze, Martin Serror |
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSET @ USENIX Security Symposium ![In: CSET 2022: Cyber Security Experimentation and Test Workshop, Virtual Event, 8 August 2022, pp. 49-53, 2022, ACM, 978-1-4503-9684-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Thomas J. Hacker, Preston M. Smith, Dana Brunson, Lisa Arafune, Thomas E. Cheatham, Ewa Deelman |
Building the Research Innovation Workforce: Challenges and Recommendations from a Virtual Workshop to Advance the Research Computing Community✱. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PEARC ![In: PEARC '22: Practice and Experience in Advanced Research Computing, Boston, MA, USA, July 10 - 14, 2022, pp. 26:1-26:7, 2022, ACM, 978-1-4503-9161-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Celia Hacker, Bastian Rieck |
On the Surprising Behaviour of \textttnode2vec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAG-ML ![In: Topological, Algebraic and Geometric Learning Workshops 2022, 25-22 July 2022, Virtual, pp. 142-151, 2022, PMLR. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Miguel Urteaga, Zach Griffith, A. Arias-Purdue, A. Carter, Petra Rowell, J. Hacker, B. Brar |
InP HBT Technologies for sub-THz Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Technology and Circuits ![In: IEEE Symposium on VLSI Technology and Circuits (VLSI Technology and Circuits 2022), Honolulu, HI, USA, June 12-17, 2022, pp. 122-123, 2022, IEEE, 978-1-6654-9772-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Linda Achilles, Thomas Mandl 0001, Christa Womser-Hacker |
"Meanspo Please, I Want to Lose Weight": A Characterization Study of Meanspiration Content on Tumblr Based on Images and Texts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLEF ![In: Experimental IR Meets Multilinguality, Multimodality, and Interaction - 13th International Conference of the CLEF Association, CLEF 2022, Bologna, Italy, September 5-8, 2022, Proceedings, pp. 3-17, 2022, Springer, 978-3-031-13642-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Leonard Hacker, Finn Bartels, Pierre-Etienne Martin |
Fine-Grained Action Detection with RGB and Pose Information using Two Stream Convolutional Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MediaEval ![In: Working Notes Proceedings of the MediaEval 2022 Workshop, Bergen, Norway and Online, 12-13 January 2023., 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Csaba Tóth, Darrick Lee, Celia Hacker, Harald Oberhauser |
Capturing Graphs with Hypo-Elliptic Diffusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NeurIPS ![In: Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022., 2022, 9781713871088. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Felix Burkhardt, Anabell Hacker, Uwe Reichel, Hagen Wierstorf, Florian Eyben, Björn W. Schuller |
A Comparative Cross Language View On Acted Databases Portraying Basic Emotions Utilising Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LREC ![In: Proceedings of the Thirteenth Language Resources and Evaluation Conference, LREC 2022, Marseille, France, 20-25 June 2022, pp. 1917-1924, 2022, European Language Resources Association. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Janine Hacker, Kai Riemer |
Identification of User Roles in Enterprise Social Networks: Method Development and Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bus. Inf. Syst. Eng. ![In: Bus. Inf. Syst. Eng. 63(4), pp. 367-387, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Lina Hacker, James Joseph, Aoife M. Ivory, Mohand O. Saed, Bajram Zeqiri, Rajagopalan Srinath, Sarah E. Bohndiek |
A Copolymer-in-Oil Tissue-Mimicking Material With Tuneable Acoustic and Optical Characteristics for Photoacoustic Imaging Phantoms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Medical Imaging ![In: IEEE Trans. Medical Imaging 40(12), pp. 3593-3603, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Lara Talavera, Ana Vila-Concejo, Jody M. Webster, Courtney Smith, Stephanie Duce, Thomas E. Fellowes, Tristan Salles, Daniel Harris, Jon Hill, Will Figueira, Jörg M. Hacker |
Morphodynamic Controls for Growth and Evolution of a Rubble Coral Island. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 13(8), pp. 1582, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Oleg Melnichenko, Peter Hacker, Vasco Müller |
Observations of Mesoscale Eddies in Satellite SSS and Inferred Eddy Salt Transport. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 13(2), pp. 315, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Anup Mohan, Ahmed S. Kaseb, Yung-Hsiang Lu, Thomas J. Hacker |
Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cloud Comput. ![In: IEEE Trans. Cloud Comput. 9(1), pp. 40-53, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Nir Hacker, Boris A. Malomed |
Nonlinear Dynamics of Wave Packets in Tunnel-Coupled Harmonic-Oscillator Traps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 13(3), pp. 372, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Tim Krause, Raphael Ernst, Benedikt Klaer, Immanuel Hacker, Martin Henze |
Cybersecurity in Power Grids: Challenges and Opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.00013, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Ömer Sen, Dennis van der Velde, Katharina A. Wehrmeister, Immanuel Hacker, Martin Henze, Michael Andres |
Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2109.02336, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Ömer Sen, Dennis van der Velde, Philipp Linnartz, Immanuel Hacker, Martin Henze, Michael Andres, Andreas Ulbig |
Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.09162, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Ke Liu, Felix Hacker, Chiara Daraio |
Robotic surfaces with reversible, spatiotemporal control for shape morphing and object manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Robotics ![In: Sci. Robotics 6(53), pp. 5116, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 763 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ >>] |
|