|
|
Jana Fruth - Publications
2013
- Jana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann: E-learning of IT Security Threats: a Game Prototype for Children, 14th Joint IFIP TC6 and TC11 Conference on "Communications and Multimedia Security" (CMS'2013), September 25-26, 2013, Magdeburg, Germany.
- Jana Fruth, Marcel Beskau, Matthias Volk, Anneke Meyer, Robin Richter, Jana Dittmann: Erster Konzeptansatz von Sicherheitstypen: Sicherheitsbewusstsein von Kindern und Jugendlichen im Umgang mit dem Internet, Informatik 2013, GI, 43. Jahrestagung der Gesellschaft für Informatik, Workshop
"Risikokommunikation im Kontext von IT-Sicherheit" (RiskKom), 16. Sept. 2013, Koblenz.
2012
- Sven Kuhlmann, Jana Fruth, Tobias Hoppe, Jana Dittmann: Simulation of structural effects in embedded systems and visualization of dependencies according to an intended attack or manipulation, Computer Safety, Reliability, and Security (SAFECOMP) 2012, Springer Berlin, S. 498-507, 2012 - (Lecture Notes in Computer Science; 7613), Magdeburg, 2012
- Janet Siegmund, Norbert Siegmund, Jana
Fruth, Sven Kuhlmann, Jana Dittmann, Gunter Saake:
Program Comprehension in Preprocessor-Based Software, Computer Safety, Reliability, and Security (SAFECOMP) 2012, Springer Berlin, S.
517–528, 2012 - (Lecture Notes in Computer Science; 7613), Magdeburg, 2012
- Sven Kuhlmann, Tobias Hoppe, Jana Fruth, Jana Dittmann: Voruntersuchungen und erste Ergebnisse zur Webseitengestaltung für die situationsbewusste Unterstützung von Kindern in IT-Sicherheitsfragen, Informatik 2012. - Bonn : GI, S. 573-584 - (GI-Edition lecture notes in informatics), 42. Jahrestagung der Gesellschaft für Informatik, Braunschweig, 2012
- Wiebke Menzel, Sven Tuchscheerer, Jana Fruth, Christian Krätzer, Jana Dittmann: Design and evaluation of security multimedia warnings for children's
smartphones, Multimedia on mobile devices 2012; and multimedia content access: algorithms and systems VI, SPIE, Conference Multimedia on Mobile Devices , Burlingame, Calif., 2012
- Fred Samland, Jana Fruth, Mario Hildebrandt, Tobias Hoppe, Jana Dittmann: AR.Drone - security threat analysis and exemplary attack to track persons, Intelligent robots and computer vision XXIX: algorithms and techniques, SPIE, Conference Multimedia on Mobile Devices, Burlingame, Calif., 2012
- Wiebke Menzel, Sven Tuchscheerer, Jana Fruth, Christian Krätzer, Jana Dittmann: Designansatz und Evaluation von kindgerechten Securitywarnungen für
Smartphones, GI-Sicherheit 2012, Bonn : Ges. für Informatik, S. 211-223 - (GI-Edition lecture notes in informatics), Konferenz Sicherheit, Schutz und Zuverlässigkeit, Darmstadt, 2012
2011
- Jana Fruth, Ronny Merkel, Jana Dittmann: Security warnings for children’s smart phones: a first design approach (Poster), 12th Conference in the "Communication and Multimedia Security" (CMS 2011)
- Christoph Neubüser, Jana Fruth, Tobias Hoppe, Jana Dittmann: Wechselwirkungsmodell der Safety und Security, DACH Security 2011
- Janet Feigenspan, Norbert Siegmund, and
Jana Fruth: On the Role of Program Comprehension in Embedded
Systems, In Proceedings of 13. Workshop Software-Reengineering (WSR), GI,
2011, pages
34–35, GI, 2011
- Jana Fruth; Richard Münder, Hannes Gruschinski, Jana Dittmann, Bernhard Karpuschewski, Rolf Findeisen:
Sensitising to security risks in manufacturing engineering - an exemplary VR prototype, IWDE
2011: proceedings of the 2nd International Workshop on Digital
Engineering 2011. - Magdeburg, S. 39-44, 2011
- Jana Fruth, Christian Krätzer, Jana Dittmann: Design and Evaluation of Multi-Media Security Warnings for the Interaction between Humans and Industrial Robots,
Electronic Imaging Conference 7575 – Intelligent Robots and Computer Vision
XXVIII: Algorithms and Techniques, IS&T/SPIE, San Francisco Airport, CA,
USA, 23.-27. Jan. 2011
2010
- Sven Tuchscheerer, Jana Fruth, Jana Dittmann: Secure cashless transactions on mobile Bluetooth®-Devices, 8th
International Workshop for Technical, Economic and Legal Aspects of
Business Models for Virtual Goods incorporating the 6th
International ODRL Workshop, Namur, Belgium, 30. Sept.- 1. Oct. 2010
- Jana Fruth, Jana Dittmann, Frank Ortmeier, Janet Feigenspan: Metadaten-Modell für ein sicheres eingebettetes Datenmanagement; In: Patrick Horster (Ed.), DACH Security 2010, ISBN 978-3-00-031441-4,
S. 359-370, Wien, 21./22. Sept. 2010
- Jana Fruth, Sven Tuchscheerer: Sichere bargeldlose Transaktionen auf mobilen Endgeräten mit Bluetooth; In: Patrick Horster (Ed.), DACH Security 2010, ISBN 978-3-00-031441-4,
S. 326-336,
Wien, 21./22. Sept. 2010
- Jana Fruth, Jana Dittmann, Richard Münder, Mathias Petzel and Bernhard Karpuschewski: An exemplary Attack Scenario: Threats to Production Engineering inspired by the Conficker Worm. In International Workshop on Digital Engineering (IWDE 2010), pages 25-32, ACM,
Magdeburg, June 2010
- Norbert Siegmund, Janet Feigenspan,
Michael Soffner, Jana Fruth, and Veit Köppen:
Challenges of Secure and Reliable Data Management in Heterogeneous
Environments.
In International Workshop on Digital Engineering (IWDE 2010), pages 17-24, ACM,
Magdeburg, June 2010
2009
- Jana Fruth, Christian Krätzer, Jana Dittmann: Konzept für sichere Datenhaltung und Datenkommunikation verteilter personenbezogener Daten(sätze) in sozialen Institutionen, Sichere Wege in der vernetzten Welt - 11. Deutscher IT-Sicherheitskongress des BSI, SecuMedia Verlag Ingelheim, ISBN: 978-3-922746-97-3, S. 431-445, Bonn, 12.-14. Mai 2009
2008
- Jana Fruth: Sichere Datenhaltung verteilter Daten(sätze) für die Anwendung "SocialMap" in öffentlichen sozialen Institutionen, Diplomarbeit, Oktober, 2008, Magdeburg, 2008
<- BACK
|
|
|