Author of the publication

AR.Drone: security threat analysis and exemplary attack to track persons.

, , , , and . Intelligent Robots and Computer Vision: Algorithms and Techniques, volume 8301 of SPIE Proceedings, page 83010G. SPIE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An effective security warning approach for malware attacks on mobile devices.. Otto-von-Guericke University Magdeburg, Germany, (2018)Crossed-derivative based sensitivity measures for interaction screening., , , and . Math. Comput. Simul., (2014)Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots., , and . Intelligent Robots and Computer Vision: Algorithms and Techniques, volume 7878 of SPIE Proceedings, page 78780K. SPIE, (2011)AR.Drone: security threat analysis and exemplary attack to track persons., , , , and . Intelligent Robots and Computer Vision: Algorithms and Techniques, volume 8301 of SPIE Proceedings, page 83010G. SPIE, (2012)Retrospective Bayesian outlier detection in INGARCH series., , , , , and . Stat. Comput., 25 (2): 365-374 (2015)Support indices: Measuring the effect of input variables over their supports., , and . Reliab. Eng. Syst. Saf., (2019)Sequential designs for sensitivity analysis of functional inputs in computer experiments., , and . Reliab. Eng. Syst. Saf., (2015)Uniform Approach of Risk Communication in Distributed IT Environments Combining Safety and Security Aspects., and . SAFECOMP Workshops, volume 8696 of Lecture Notes in Computer Science, page 289-300. Springer, (2014)Erster Konzeptansatz von Sicherheitstypen: Sicherheitsbewusstsein von Kindern und Jugendlichen im Umgang mit dem Internet., , , , , and . GI-Jahrestagung, volume P-220 of LNI, page 2000-2014. GI, (2013)Computer experiments with functional inputs and scalar outputs by a norm-based approach., , and . Stat. Comput., 27 (4): 1083-1097 (2017)