Publications at the Faculty of Computer Science and Automation since 2015

Results: 1965
Created on: Thu, 18 Jul 2024 23:11:58 +0200 in 0.1073 sec


Schulz, Steffen; Haueisen, Jens; Bär, Karl-Jürgen; Voss, Andreas
Altered causal coupling pathways within the central-autonomic-network in patients suffering from schizophrenia. - In: Entropy, ISSN 1099-4300, Bd. 21 (2019), 8, 733, S. 1-23

https://doi.org/10.3390/e21080733
Bag, Tanmoy; Garg, Sharva; Preciado Rojas, Diego Fernando; Shaik, Zubair; Mitschele-Thiel, Andreas; Mückenheim, Jens
Self-organizing network functions for handover optimization in LTE cellular networks. - In: Mobilkommunikation, (2019), S. 14-20

Cierpka, Christian; Mäder, Patrick
SmartPIV - Smartphone-based flow visualization for education :
SmartPIV - Strömungsvisualisierung mit dem Smartphone in der Lehre. - In: Experimentelle Strömungsmechanik, (2019), S. 23.1-23.7

Kuang, Hongyu; Gao, Hui; Hu, Hao; Ma, Xiaoxing; Lü, Jian; Mäder, Patrick; Egyed, Alexander
Using frugal user feedback with closeness analysis on code to improve IR-based traceability recovery. - In: ICPC 2019, (2019), S. 369-379

https://doi.org/10.1109/ICPC.2019.00055
Lasch, Robert; Oukid, Ismail; Dementiev, Roman; May, Norman; Demirsoy, Suleyman S.; Sattler, Kai-Uwe
Fast & strong: the case of compressed string dictionaries on modern CPUs. - In: 15th International Workshop on Data Management on New Hardware (DaMoN 2019), (2019), article no. 4, 10 Seiten

https://doi.org/10.1145/3329785.3329924
Amthor, Peter; Fischer, Daniel; Kühnhauser, Winfried; Stelzer, Dirk
Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems. - In: ARES 2019, (2019), article no. 86, 10 Seiten

Cyber security management requires fast and cost efficient responses to threat alerts. Automation of cyber threat sensing and responding is one way to achieve immediate reactions to imminent threats. There are already tools for an extensive automation of threat sensing, e.g. threat intelligence sharing platforms. Methods, techniques and tools for reacting to menacing states and events, e.g. security-policy-controlled systems, have also been explored and published for some time. What is still missing, however, is the integration of these two approaches. This paper describes first steps towards an integration of threat intelligence sharing platforms and security-policy-controlled systems. We present a conceptual design for threat reaction strategies, security architectures and mechanisms and information representation requirements. We use two exemplary threat scenarios to demonstrate our proposals.



https://doi.org/10.1145/3339252.3340509
Pfeiffer, Michael; Roßberg, Michael; Buttgereit, Simon; Schäfer, Günter
Strong tenant separation in cloud computing platforms. - In: ARES 2019, (2019), article no. 15, 10 Seiten

https://doi.org/10.1145/3339252.3339262
Theil, Markus; Backhaus, Martin; Roßberg, Michael; Schäfer, Günter
Towards a security architecture for hybrid WMNs. - In: ARES 2019, (2019), article no. 107, 10 Seiten

https://doi.org/10.1145/3339252.3340106
Richter, Johannes; Streitferdt, Detlef
Modern architecture for deep learning-based automatic optical inspection. - In: 2019 IEEE 43rd Annual Computer Software and Applications Conference, (2019), S. 141-145

https://doi.org/10.1109/COMPSAC.2019.10197
Weichenhain, Maxi; Fengler, Wolfgang; Streitferdt, Detlef
How to bring project management of embedded systems to an appropriate level of abstraction for a discrete event model. - In: 2019 IEEE 43rd Annual Computer Software and Applications Conference, (2019), S. 171-176

https://doi.org/10.1109/COMPSAC.2019.10202