Author of the publication

A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes.

, , , , , , , , , , and . J. Univers. Comput. Sci., 24 (8): 1015-1033 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending the power line LAN up to the neighborhood transformer., , , , , , , , , and 1 other author(s). IEEE Communications Magazine, 41 (4): 64-70 (2003)argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Binaries., and . CoRR, (2021)A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape., and . USENIX Security Symposium, page 1-18. USENIX Association, (2019)Who's Accessing My Data? Application-Level Access Control for Bluetooth Low Energy., and . SecureComm (2), volume 399 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 252-272. Springer, (2021)Detecting Video-Game Injectors Exchanged in Game Cheating Communities., , , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 305-324. Springer, (2021)WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS., , and . RAID, page 63-75. USENIX Association, (2020)PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals., , , and . AsiaCCS, page 521-533. ACM, (2022)Attacks Against BLE Devices by Co-located Mobile Applications., and . CoRR, (2018)How private is your period?: A systematic analysis of menstrual app privacy policies., and . Proc. Priv. Enhancing Technol., 2020 (4): 491-510 (2020)Automated generation of colluding apps for experimental research., and . J. Comput. Virol. Hacking Tech., 14 (2): 127-138 (2018)