Johannes Hoffmann

Orcid: 0000-0001-7842-4960

According to our database1, Johannes Hoffmann authored at least 20 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Pilot Study: Magnetic Motion Analysis for Swallowing Detection Using MEMS Cantilever Actuators.
Sensors, April, 2023

Effects of Text Input Latency on Performance and Task Load.
Proceedings of the 22nd International Conference on Mobile and Ubiquitous Multimedia, 2023

2022
Measurement Uncertainty in Battery Electrochemical Impedance Spectroscopy.
IEEE Trans. Instrum. Meas., 2022

Quantitative Evaluation for Magnetoelectric Sensor Systems in Biomagnetic Diagnostics.
Sensors, 2022


2021
Standard Load Method: A New Calibration Technique for Material Characterization at Terahertz Frequencies.
IEEE Trans. Instrum. Meas., 2021

Active Magnetoelectric Motion Sensing: Examining Performance Metrics with an Experimental Setup.
Sensors, 2021

Constructive arithmetics in Ore localizations enjoying enough commutativity.
J. Symb. Comput., 2021

2020
Constructive arithmetics in Ore localizations of domains.
J. Symb. Comput., 2020

2018
Constructive Arithmetics in Ore Localizations with Enough Commutativity.
Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018

2017
A Constructive Approach to Arithmetics in Ore Localizations.
Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, 2017

2016
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques.
Int. J. Inf. Sec., 2015

2014
CloudSylla: Detecting Suspicious System Calls in the Cloud.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014

2013
Mobile-sandbox: having a deeper look into android applications.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Slicing droids: program slicing for smali code.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Mobile Malware Detection Based on Energy Fingerprints - A Dead End?
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2011
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2010
Cooperation enablement for centralistic early warning systems.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010


  Loading...