default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 49 matches
- 2014
- Christian Dannegger:
Cyber Physical Systems: Agile, adaptive und autonome Produktion - Steilvorlage für Software-Agenten. STeP 2014: 21-32 - Stefan Eggert, Artur Fertich:
JADE-OSGi im Bereich des Ambient Assisted Living. STeP 2014: 71-86 - Stefan Eggert, Artur Fertich:
Evaluation des Penetration Testing Tool WS-Attacker für Web Services Security. STeP 2014: 87-100 - Carina Fredrich, Hendrik Kuijs, Christoph Reich:
Benutzerorientierte Ontologie im Bereich Ambient Assisted Living. STeP 2014: 115-130 - Holger Gantikow:
Virtualisierung im Cloud-Zeitalter - Speilt der Hypervisor noch eine Rolle? STeP 2014: 9-20 - Dirk Hölscher:
An Architectural Approach For Autonomous Agents To Monitor Huge Infrastructures. STeP 2014: 59-70 - Denis Jurkovic, Freidbert Kaspar:
A comparison of isolated Code execution approches for mobile devices. STeP 2014: 143-154 - Sai Manoj Marepalli, Razia Sultana, Andreas H. Christ:
A Log-based Approach towards Enhanced Security in Cloud. STeP 2014: 101-114 - Günter Müller:
Datenschutz: Ein Auslaufmodell? STeP 2014: 3 - Benjamin Nopper:
Penetrationtesting mit Windows Credential Editor. STeP 2014: 49-58 - Ronald Petrlic, Alexander Jungmann, Marie Christin Platenius, Wilhelm Schäfer, Christoph Sorge:
Security and Privacy Challenges in On-The-Fly Computing. STeP 2014: 131-142 - Amardeo Sarma:
Vertrauen und Privatheit: Ein unüberwindbarer Gegensatz? STeP 2014: 5 - Georg Usmanov, Alexander Kaiser, Holger Kölle:
Deterministische Manipulation von Quick-Response-Codes. STeP 2014: 33-48 - Jens-Matthias Bohli, Friedbert Kaspar, Dirk Westhoff:
Software-Technologien und -Prozesse: IT-Sicherheit und Privatheit in Zeiten von Big Data. Tagungsband/Proceedings zur 4. Konferenz STeP 2014, Hochschule Furtwangen. De Gruyter Oldenbourg 2014, ISBN 978-3-11-035865-0 [contents] - 2012
- Holger Breitling, Stefan Hofer:
Praktische Einführung in die exemplarische Geschäftsprozessmodellierung. STeP 2012: 89-91 - Holger Gantikow:
HPPCaaS: heiter bis wolkig. STeP 2012: 55-70 - Matthias Herrmann, Andreas Hülzenbecher:
Möglichkeiten zur Nutzung entfernter Dienste auf Android App Engine mit Android. STeP 2012: 165-198 - Markus Jahn, Markus Löberbauer, Reinhard Wölfinger, Hanspeter Mössenböck:
Plux.Net - A dynamic Plug-in Platform for Desktop and Web Applications in .Net. STeP 2012: 15-42 - Daniel Käfer, Markus Neumaier:
Untersuchung des Open-Source Frameworks SecurityRunTime. STeP 2012: 129-140 - Rudolph Kajan, Adam Herout, Michael Zachariá:
Selective Availability fpr Security Monitoring in IPv6 Networks. STeP 2012: 43-54 - Friedbert Kaspar:
Das Smartphone als Sicherheitselement. STeP 2012: 5-14 - Martin Knobloch:
Workshop: How to Hack, Tools an methodology explained. STeP 2012: 87 - Martin Knobloch:
Building Secure Software: The good, the bad and the ugly. STeP 2012: 99 - Ralf Kretzschmar-Auer:
Produktfamilien portabler Anwendungen für Mobilgeräte mit XText und Phonegap. STeP 2012: 95-97 - Stefan Link:
Attacking the web application users. STeP 2012: 117-127 - Bernhard Merkle:
DSL Sprachentwicklung für embedded und realtime Anwendungen mit Language-Workbenches (MPS). STeP 2012: 85-86 - Thomas Rübsamen, Alexander Paßfall:
DNS-Sicherheit: Bedrohungen, Mechanismen und aktuelle Entwicklung. STeP 2012: 141-163 - Alexander Schneider:
Die Pein mit der UML. STeP 2012: 101-114 - Mike Schober, Elmar Cochlovius:
Die Cloud im Fahrzeug: Auswirkungen auf die Software-Entwicklung vernetzter Telematik. STeP 2012: 71-82 - Mohsen Rezagholi, Harald Gläser:
Software-Technologien und -Prozesse: IT-Sicherheit und mobile Systeme ; Tagungsband zur 3. Konferenz STeP 2012, Hochschule Furtwangen, 10. Mai 2012. Oldenbourg Verlag, Munich 2012, ISBN 978-3-486-71663-4 [contents]
skipping 19 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-22 06:12 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint