Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting social networking sites for spam., , , , and . ACM Conference on Computer and Communications Security, page 693-695. ACM, (2010)SYNOPS - Generation of Partial Languages and Synthesis of Petri Nets., , , and . PNSE, volume 851 of CEUR Workshop Proceedings, page 237-252. CEUR-WS.org, (2012)Energy-Corrected Finite Element Methods for Scalar Elliptic Problems., , , , and . ENUMATH, volume 103 of Lecture Notes in Computational Science and Engineering, page 19-36. Springer, (2013)Ein Petrinetz-Modell zur Informationsübertragung per Dialog., , , and . AWPN, volume 380 of CEUR Workshop Proceedings, page 15-24. CEUR-WS.org, (2008)Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications., , , , , , and . NDSS, The Internet Society, (2012)Massively parallel and fault-tolerant multigrid solvers on peta-scale systems.. Technical University of Munich, Germany, (2019)When to assist? - Modelling human behaviour for hybrid assembly systems., , , and . ISR/ROBOTIK, page 1-6. VDE Verlag, (2010)Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites., , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 80-89. Springer, (2010)Investigating Human-Human Approach and Hand-Over., , , , and . Human Centered Robot Systems, Cognition, Interaction, Technology, volume 6 of Cognitive Systems Monographs, Springer, (2009)Towards Fully Automated Digital Alibis with Social Interaction., , , , and . IFIP Int. Conf. Digital Forensics, volume 433 of IFIP Advances in Information and Communication Technology, page 297-307. Springer, (2014)