Jana Fruth

According to our database1, Jana Fruth authored at least 20 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Support indices: Measuring the effect of input variables over their supports.
Reliab. Eng. Syst. Saf., 2019

2018
An effective security warning approach for malware attacks on mobile devices.
PhD thesis, 2018

2017
Computer experiments with functional inputs and scalar outputs by a norm-based approach.
Stat. Comput., 2017

2015
Retrospective Bayesian outlier detection in INGARCH series.
Stat. Comput., 2015

Sequential designs for sensitivity analysis of functional inputs in computer experiments.
Reliab. Eng. Syst. Saf., 2015

2014
Crossed-derivative based sensitivity measures for interaction screening.
Math. Comput. Simul., 2014

Uniform Approach of Risk Communication in Distributed IT Environments Combining Safety and Security Aspects.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Ein erster Prototyp: Sicherheitsguide für Grundschulkinder beim Umgang mit dem Internet.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

2013
Erster Konzeptansatz von Sicherheitstypen: Sicherheitsbewusstsein von Kindern und Jugendlichen im Umgang mit dem Internet.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

E-Learning of IT Security Threats: A Game Prototype for Children.
Proceedings of the Communications and Multimedia Security, 2013

2012
Designansatz und Evaluation von Kindgerechten Securitywarnungen für Smartphones.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Program Comprehension in Preprocessor-Based Software.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Design and evaluation of security multimedia warnings for children's smartphones.
Proceedings of the Multimedia on Mobile Devices 2012; and Multimedia Content Access: Algorithms and Systems VI, 2012

AR.Drone: security threat analysis and exemplary attack to track persons.
Proceedings of the Intelligent Robots and Computer Vision XXIX: Algorithms and Techniques, 2012

2011
On the Role of Program Comprehension in Embedded Systems.
Softwaretechnik-Trends, 2011

Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots.
Proceedings of the Intelligent Robots and Computer Vision XXVIII: Algorithms and Techniques, 2011

Security Warnings for Children's Smart Phones: A First Design Approach.
Proceedings of the Communications and Multimedia Security, 2011

2010
Challenges of secure and reliable data management in heterogeneous environments.
Proceedings of the First International Workshop on Digital Engineering, 2010

An exemplary attack scenario: threats to production engineering inspired by the Conficker worm.
Proceedings of the First International Workshop on Digital Engineering, 2010


  Loading...