Jana Fruth
According to our database1,
Jana Fruth
authored at least 20 papers
between 2010 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
0
1
2
3
4
5
6
1
1
2
1
1
2
2
5
2
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2019
Reliab. Eng. Syst. Saf., 2019
2018
PhD thesis, 2018
2017
Computer experiments with functional inputs and scalar outputs by a norm-based approach.
Stat. Comput., 2017
2015
Sequential designs for sensitivity analysis of functional inputs in computer experiments.
Reliab. Eng. Syst. Saf., 2015
2014
Math. Comput. Simul., 2014
Uniform Approach of Risk Communication in Distributed IT Environments Combining Safety and Security Aspects.
Proceedings of the Computer Safety, Reliability, and Security, 2014
Ein erster Prototyp: Sicherheitsguide für Grundschulkinder beim Umgang mit dem Internet.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014
2013
Erster Konzeptansatz von Sicherheitstypen: Sicherheitsbewusstsein von Kindern und Jugendlichen im Umgang mit dem Internet.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
Proceedings of the Communications and Multimedia Security, 2013
2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Computer Safety, Reliability, and Security, 2012
Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation.
Proceedings of the Computer Safety, Reliability, and Security, 2012
Proceedings of the Multimedia on Mobile Devices 2012; and Multimedia Content Access: Algorithms and Systems VI, 2012
Proceedings of the Intelligent Robots and Computer Vision XXIX: Algorithms and Techniques, 2012
2011
Softwaretechnik-Trends, 2011
Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots.
Proceedings of the Intelligent Robots and Computer Vision XXVIII: Algorithms and Techniques, 2011
Proceedings of the Communications and Multimedia Security, 2011
2010
Proceedings of the First International Workshop on Digital Engineering, 2010
An exemplary attack scenario: threats to production engineering inspired by the Conficker worm.
Proceedings of the First International Workshop on Digital Engineering, 2010