Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verteiltes Design Thinking mit teleBoard., , , , , and . MuC, page 455-460. Oldenbourg Verlag, (2009)Virtual Machine Integrity Verification in Crowd-Resourcing Virtual Laboratory., , and . SOCA, page 169-176. IEEE Computer Society, (2018)Online assessment for hands-on cyber security training in a virtual lab., and . EDUCON, page 1-10. IEEE, (2012)Signed URL for an Isolated Web Server in a Virtual Laboratory., , and . ICETC, page 218-222. ACM, (2017)Lightweight ad hoc assessment of practical programming skills at scale., , , , and . EDUCON, page 475-483. IEEE, (2014)Tele-Lab IT-Security: an Architecture for an online virtual IT Security Lab., and . Int. J. Online Eng., 4 (2): 31-37 (2008)Virtual Machine Integration & Fault Recovery in Crowd-Resourcing Virtual Laboratory., , and . ICCCM, page 224-230. ACM, (2019)Handling re-grading of automatically graded assignments in MOOCs., , , , and . EDUCON, page 408-415. IEEE, (2014)A distributed virtual laboratory architecture for cybersecurity training., , , , and . ICITST, page 408-415. IEEE, (2011)Explorative Learning of Wireless Network Security with Tele-Lab IT-Security., , , and . ICHL, volume 5169 of Lecture Notes in Computer Science, page 213-224. Springer, (2008)