Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social Media., and . TrustCom, page 638-645. IEEE, (2022)Resilience-by-Design Concepts for 6G Communication Networks., , , , , , , , , and 5 other author(s). CoRR, (2024)Cybersicherheitsforschung als Teil der nationalen Sicherheitsarchitektur., and . Datenschutz und Datensicherheit, 45 (4): 249-253 (2021)Privacy-Preserving IDS for In-Vehicle Networks with Local Differential Privacy., , and . Privacy and Identity Management, volume 619 of IFIP Advances in Information and Communication Technology, page 58-77. Springer, (2020)Towards global eID-interoperability., , and . BIOSIG, volume P-108 of LNI, page 127-140. GI, (2007)„Das Netzwerkdurchsetzungsgesetz“, , , , , , , , , and 1 other author(s). Fraunhofer ISI, Karlsruhe, (2018)Smart Governance for Cybersecurity., and . ERCIM News, 2021 (126): 0 (2021)An Electronic Guide Dog for the Blind Based on Artificial Neural Networks., , , , and . HCI (45), volume 1499 of Communications in Computer and Information Science, page 23-30. Springer, (2021)NetCo: Reliable Routing With Unreliable Routers., , , , , , , , and . DSN Workshops, page 128-135. IEEE Computer Society, (2016)A Model Driven Development Approach Using AADL and Code Generation to Develop Modular Distributed Electronic Travel Aid Devices., , and . IHSI, volume 903 of Advances in Intelligent Systems and Computing, page 540-545. Springer, (2019)