Author of the publication

An Analysis Pattern for Course Management.

, and . EuroPLoP, page 899-912. UVK - Universitaetsverlag Konstanz, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A course module on web tracking and privacy., , , , and . InfoSecCD, page 10:1-10:7. ACM, (2015)A course module on mobile malware., , , , and . InfoSecCD, page 10:1. ACM, (2014)A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack Patterns., and . ICISA, volume 514 of Lecture Notes in Electrical Engineering, page 239-249. Springer, (2018)Security Labs for Software Defined Networks in CloudLab., , and . SIGCSE, page 1235. ACM, (2019)Teaching Security Management for Mobile Devices., , , and . SIGITE, page 14-19. ACM, (2016)Designing an SOA-Based Earthquake Forewarning System using BPMN., and . Software Engineering Research and Practice, page 593-598. CSREA Press, (2010)Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory., and . Inf. Fusion, 8 (4): 379-386 (2007)Ultrasonic Diagnosis and Analysis of the Effect of Labor Analgesia on Early Pelvic Floor Function and Pelvic Floor Dysfunction., , , and . J. Medical Imaging Health Informatics, 11 (7): 1903-1910 (2021)A Survey of Attacks and Defenses for Deep Neural Networks., , and . CSR, page 254-261. IEEE, (2023)Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework., , , , and . Int. J. Comput. Intell. Appl., 18 (4): 1950022:1-1950022:16 (2019)