Stefan Rass
Cited by
Cited by
A context-aware vertical handover decision algorithm for multimode mobile terminals and its performance
T Ahmed, K Kyamakya, M Ludwig, KR Anne, J Schroeder, S Galler, ...
na, 2006
Defending against advanced persistent threats using game-theory
S Rass, S König, S Schauer
PloS one 12 (1), e0168675, 2017
Security for the robot operating system
B Dieber, B Breiling, S Taurer, S Kacianka, S Rass, P Schartner
Robotics and Autonomous Systems 98, 192-203, 2017
How to protect privacy in floating car data systems
S Rass, S Fuchs, M Schaffer, K Kyamakya
Proceedings of the fifth ACM international workshop on VehiculAr Inter …, 2008
Context-awareness and collaborative driving for intelligent vehicles and smart roads
S Fuchs, S Rass, B Lamprecht, K Kyamakya
1st International Workshop on ITS for an Ubiquitous ROADS, 1-6, 2007
Application-level security for ROS-based applications
B Dieber, S Kacianka, S Rass, P Schartner
2016 IEEE/RSJ International Conference on Intelligent Robots and Systems …, 2016
A model for ontology-based scene description for context-aware driver assistance systems
S Fuchs, S Rass, B Lamprecht, K Kyamakya
Proceedings of the 1st international conference on Ambient media and systems …, 2008
Extrinsic camera calibration for an on-board two-camera system without overlapping field of view
B Lamprecht, S Rass, S Fuchs, K Kyamakya
2007 IEEE Intelligent Transportation Systems Conference, 265-270, 2007
Uncertainty in games: Using probability-distributions as payoffs
S Rass, S König, S Schauer
International Conference on Decision and Game Theory for Security, 346-357, 2015
GADAPT: a sequential game-theoretic framework for designing defense-in-depth strategies against advanced persistent threats
S Rass, Q Zhu
International Conference on Decision and Game Theory for Security, 314-326, 2016
On game-theoretic network security provisioning
S Rass
Journal of network and systems management 21 (1), 47-64, 2013
Cryptography for security and privacy in cloud computing
S Rass, D Slamanig
Artech House, 2013
Generalizations and extensions of redactable signatures with applications to electronic healthcare
D Slamanig, S Rass
IFIP International Conference on Communications and Multimedia Security, 201-213, 2010
Physical intrusion games—optimizing surveillance by simulation and game theory
S Rass, A Alshawish, MA Abid, S Schauer, Q Zhu, H De Meer
IEEE Access 5, 8394-8407, 2017
On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats
Q Zhu, S Rass
IEEE Access 6, 13958-13971, 2018
Implementation of quantum key distribution network simulation module in the network simulator NS-3
M Mehic, O Maurhart, S Rass, M Voznak
Quantum Information Processing 16 (10), 253, 2017
A unified framework for the analysis of availability, reliability and security, with applications to quantum networks
S Rass, P Schartner
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010
An overview of data quality frameworks
C Cichy, S Rass
IEEE Access 7, 24634-24648, 2019
On the cost of game playing: How to control the expenses in mixed strategies
S Rass, S König, S Schauer
International Conference on Decision and Game Theory for Security, 494-505, 2017
Decisions with Uncertain Consequences—A Total Ordering on Loss-Distributions
S Rass, S Koenig, S Schauer
PloS one 11 (12), e0168583, 2016
The system can't perform the operation now. Try again later.
Articles 1–20