Author of the publication

Digitale Bürgerbeteiligung Forschung und Praxis – Chancen und Herausforderungen der elektronischen Partizipation

. Springer Vieweg, Wiesbaden, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments., and . J. Netw. Comput. Appl., (2020)International Workshop on Cyber Range Technologies and Applications (CACOE 2020)., and . EuroS&P Workshops, page 1. IEEE, (2020)Enabling exercises, education and research with a comprehensive cyber range., , , , , , , , , and 2 other author(s). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (4): 37-61 (2021)Collaborative Patterns for Workflows with Collaborative Robots., and . CoopIS, volume 13591 of Lecture Notes in Computer Science, page 131-148. Springer, (2022)CISA: Establishing National Cyber Situational Awareness to Counter New Threats., , and . ERCIM News, (2016)Delta Analysis of Role-Based Access Control Models.. EUROCAST (1), volume 8111 of Lecture Notes in Computer Science, page 507-514. Springer, (2013)Machine Learning Based Prediction of Frequency Hopping Spread Spectrum Signals., , , , , , and . PIMRC, page 1-6. IEEE, (2023)Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies., , , , and . SACMAT, page 195-206. ACM, (2019)BAnDIT: Business Process Anomaly Detection in Transactions., , and . CoopIS, volume 14353 of Lecture Notes in Computer Science, page 405-415. Springer, (2023)On Evolving Organizational Models without Losing Control on Authorization Constraints in Web Service Orchestrations., and . CEC, page 128-135. IEEE Computer Society, (2010)