fortiss wissenschaftliche Publikationen

Wissenschaftliche Publikationen

Veröffentlichungen, Zeitschriftenaufsätze und Broschüren mit Ergebnissen aus dem Institut

Wissenschaftliche Publikationen

Liste als BibTeX-Datei exportieren

2018

  • 2018 Formal Analysis of Sneak-Peek: A Data Centre Attack and its Mitigations Wei Chen , Yuhui Lin , Vashti Galpin , Vivek Nigam , Myungjin Lee und David Aspinall In 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIPSEC 2018) - Poznan, Poland, 2018. Details BIB
  • 2018 Full contract verification for ATL using symbolic execution Bentley James Oakes , Javier Troya , Levi Lúcio und Manuel Wimmer Software & Systems Modeling, 17():815–849, 2018. Details DOI BIB
  • 2018 Highway Sensor System as Enabler for Autonomous Driving Gesa Wiegand und Yuanting Liu In Band CHI 2018 Workshop - Interacting with Autonomous Vehicles: Learning from other Domains(2018), 2018. Details BIB
  • 2018 Incorporating negative information to process discovery of complex systems Hernán Ponce de León , Lucio Nardelli , Carmona Josep und Seppe K. L. M. vanden Broucke Inf. Sci., 422():480–496, 2018. Details DOI BIB
  • 2018 Modular Fault Ascription and Corrective Maintenance Using a Digital Twin Milan Vathoopan , Maria Johny , Alois Zoitl und Alois Knoll IFAC-PapersOnLine, 51(11):1041–1046, 2018. Details BIB
  • 2018 On the accuracy of formal verification of selective defenses for TDoS attacks Marcilio Lemos , Yuri Gil Dantas , Iguatemi Fonseca und Vivek Nigam J. Log. Algebr. Meth. Program., 94():45–67, 2018. Details URL DOI BIB
  • 2018 Proof-Relevant Logical Relations for Name Generation Nick Benton , Martin Hofmann und Vivek Nigam Accepted to Logical Methods in Computer Science, ():, 2018. Details BIB
  • 2018 Roadblocks on the Highway to Secure Cars: An Exploratory Survey on the Current Safety and Security Practice of the Automotive Industry Michael M. Huber , Michael Brunner , Clemens Sauerwein , Carmen Cârlan und Ruth Breu In Proceedings of the 37th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2018), Band 11093 von Lecture Notes in Computer Science, Seiten 157–171, 2018. Springer. Details DOI BIB
  • 2018 Statistical Model Checking of Guessing and Timing Attacks on Distance-bounding Protocols. Musab A. Alturki , Max Kanovich , Vivek Nigam , Andre Scedrov , Carolyn Talcott und Tajana Ban Kirigin In "Workshop on Foundations of Computer Security", 2018. Details BIB
  • 2018 Subexponentials in non-commutative linear logic Max Kanovich , Stepan Kuznetsov , Vivek Nigam und Andre Scedrov Mathematical Structures in Computer Science, ():, 2018. Details URL DOI BIB
  • 2018 The Smile is The New Like: Controlling Music with Facial Expressions to Minimize Driver Distraction Michael Braun , Sarah Völkel , Gesa Wiegand , Thomas Puls , Daniel Steidl , Yannick Weiß und Florian Alt In Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, 2018. ACM. Details URL DOI BIB
  • 2018 Towards a Mathematical Understanding of the Difficulty in Learning with Feedforward Neural Networks Hao Shen Proceedings of the 31st IEEE Conference on Computer Vision and Pattern Recognition (CVPR), ():811–820, 2018. Details BIB
  • 2018 Which barriers hinder a successful digital transformation in small and medium-sized municipalities in a federal system? Markus Jakob und Helmut Krcmar In Proceedings of the Central and Eastern European e|Dem and e|Gov Days 2018, 2018. Hendrik Hansen; Robert Müller-Török; Andr{'a}s Nemeslaki; Alexander Prosser; Dona Scola; Tam{'a}s Sz{'a}deczky. Details DOI BIB

2017