fortiss scientific publications

Scientific publications

Publications, journal articles and brochures with results from the institute

Scientific publications

Export list as BibTeX file

2018

  • 2018 Formal Analysis of Sneak-Peek: A Data Centre Attack and its Mitigations Wei Chen , Yuhui Lin , Vashti Galpin , Vivek Nigam , Myungjin Lee and David Aspinall In 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIPSEC 2018) - Poznan, Poland, 2018. Details BIB
  • 2018 Full contract verification for ATL using symbolic execution Bentley James Oakes , Javier Troya , Levi Lúcio and Manuel Wimmer Software & Systems Modeling, 17():815–849, 2018. Details DOI BIB
  • 2018 Highway Sensor System as Enabler for Autonomous Driving Gesa Wiegand and Yuanting Liu In volume CHI 2018 Workshop - Interacting with Autonomous Vehicles: Learning from other Domains(2018), 2018. Details BIB
  • 2018 Incorporating negative information to process discovery of complex systems Hernán Ponce de León , Lucio Nardelli , Carmona Josep and Seppe K. L. M. vanden Broucke Inf. Sci., 422():480–496, 2018. Details DOI BIB
  • 2018 Modular Fault Ascription and Corrective Maintenance Using a Digital Twin Milan Vathoopan , Maria Johny , Alois Zoitl and Alois Knoll IFAC-PapersOnLine, 51(11):1041–1046, 2018. Details BIB
  • 2018 On the accuracy of formal verification of selective defenses for TDoS attacks Marcilio Lemos , Yuri Gil Dantas , Iguatemi Fonseca and Vivek Nigam J. Log. Algebr. Meth. Program., 94():45–67, 2018. Details URL DOI BIB
  • 2018 Proof-Relevant Logical Relations for Name Generation Nick Benton , Martin Hofmann and Vivek Nigam Accepted to Logical Methods in Computer Science, ():, 2018. Details BIB
  • 2018 Roadblocks on the Highway to Secure Cars: An Exploratory Survey on the Current Safety and Security Practice of the Automotive Industry Michael M. Huber , Michael Brunner , Clemens Sauerwein , Carmen Cârlan and Ruth Breu In Proceedings of the 37th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2018), volume 11093 of Lecture Notes in Computer Science, pages 157–171, 2018. Springer. Details DOI BIB
  • 2018 Statistical Model Checking of Guessing and Timing Attacks on Distance-bounding Protocols. Musab A. Alturki , Max Kanovich , Vivek Nigam , Andre Scedrov , Carolyn Talcott and Tajana Ban Kirigin In "Workshop on Foundations of Computer Security", 2018. Details BIB
  • 2018 Subexponentials in non-commutative linear logic Max Kanovich , Stepan Kuznetsov , Vivek Nigam and Andre Scedrov Mathematical Structures in Computer Science, ():, 2018. Details URL DOI BIB
  • 2018 The Smile is The New Like: Controlling Music with Facial Expressions to Minimize Driver Distraction Michael Braun , Sarah Völkel , Gesa Wiegand , Thomas Puls , Daniel Steidl , Yannick Weiß and Florian Alt In Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, 2018. ACM. Details URL DOI BIB
  • 2018 Towards a Mathematical Understanding of the Difficulty in Learning with Feedforward Neural Networks Hao Shen Proceedings of the 31st IEEE Conference on Computer Vision and Pattern Recognition (CVPR), ():811–820, 2018. Details BIB
  • 2018 Which barriers hinder a successful digital transformation in small and medium-sized municipalities in a federal system? Markus Jakob and Helmut Krcmar In Proceedings of the Central and Eastern European e|Dem and e|Gov Days 2018, 2018. Hendrik Hansen; Robert Müller-Török; Andr{'a}s Nemeslaki; Alexander Prosser; Dona Scola; Tam{'a}s Sz{'a}deczky. Details DOI BIB

2017