A context-aware vertical handover decision algorithm for multimode mobile terminals and its performance T Ahmed, K Kyamakya, M Ludwig, KR Anne, J Schroeder, S Galler, ... na, 2006 | 86 | 2006 |
Defending against advanced persistent threats using game-theory S Rass, S König, S Schauer PloS one 12 (1), e0168675, 2017 | 64 | 2017 |
Security for the robot operating system B Dieber, B Breiling, S Taurer, S Kacianka, S Rass, P Schartner Robotics and Autonomous Systems 98, 192-203, 2017 | 58 | 2017 |
How to protect privacy in floating car data systems S Rass, S Fuchs, M Schaffer, K Kyamakya Proceedings of the fifth ACM international workshop on VehiculAr Inter …, 2008 | 50 | 2008 |
Application-level security for ROS-based applications B Dieber, S Kacianka, S Rass, P Schartner 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems …, 2016 | 46 | 2016 |
Context-awareness and collaborative driving for intelligent vehicles and smart roads S Fuchs, S Rass, B Lamprecht, K Kyamakya 1st International Workshop on ITS for an Ubiquitous ROADS, 1-6, 2007 | 43 | 2007 |
A model for ontology-based scene description for context-aware driver assistance systems S Fuchs, S Rass, B Lamprecht, K Kyamakya Proceedings of the 1st international conference on Ambient media and systems …, 2008 | 39 | 2008 |
Extrinsic camera calibration for an on-board two-camera system without overlapping field of view B Lamprecht, S Rass, S Fuchs, K Kyamakya 2007 IEEE Intelligent Transportation Systems Conference, 265-270, 2007 | 34 | 2007 |
Uncertainty in games: Using probability-distributions as payoffs S Rass, S König, S Schauer International Conference on Decision and Game Theory for Security, 346-357, 2015 | 33 | 2015 |
Cryptography for security and privacy in cloud computing S Rass, D Slamanig Artech House, 2013 | 33 | 2013 |
GADAPT: a sequential game-theoretic framework for designing defense-in-depth strategies against advanced persistent threats S Rass, Q Zhu International Conference on Decision and Game Theory for Security, 314-326, 2016 | 32 | 2016 |
On game-theoretic network security provisioning S Rass Journal of network and systems management 21 (1), 47-64, 2013 | 32 | 2013 |
On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats Q Zhu, S Rass IEEE Access 6, 13958-13971, 2018 | 31 | 2018 |
Physical intrusion games—optimizing surveillance by simulation and game theory S Rass, A Alshawish, MA Abid, S Schauer, Q Zhu, H De Meer IEEE Access 5, 8394-8407, 2017 | 30 | 2017 |
Generalizations and extensions of redactable signatures with applications to electronic healthcare D Slamanig, S Rass IFIP International Conference on Communications and Multimedia Security, 201-213, 2010 | 28 | 2010 |
Implementation of quantum key distribution network simulation module in the network simulator NS-3 M Mehic, O Maurhart, S Rass, M Voznak Quantum Information Processing 16 (10), 253, 2017 | 27 | 2017 |
An overview of data quality frameworks C Cichy, S Rass IEEE Access 7, 24634-24648, 2019 | 26 | 2019 |
A unified framework for the analysis of availability, reliability and security, with applications to quantum networks S Rass, P Schartner IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010 | 19 | 2010 |
Dynamic proofs of retrievability from Chameleon-Hashes S Rass 2013 International Conference on Security and Cryptography (SECRYPT), 1-9, 2013 | 17 | 2013 |
On the cost of game playing: How to control the expenses in mixed strategies S Rass, S König, S Schauer International Conference on Decision and Game Theory for Security, 494-505, 2017 | 16 | 2017 |