Institut für Angewandte Informationsverarbeitung und Kommunikationstechnologie (7050)

  • 8010

    Inffeldgasse 16a Graz

    Österreich

Forschungsoutput 1983 2019

Filter
Beitrag in einem Konferenzband
2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, S. 96-108 12 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 1 Aug 2019, 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. Institute of Electrical and Electronics Engineers, S. 554-561 8 S. 8887342

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Decision making
Experiments
Decentralized decision making
Security analysis
Currency

Algebraic Cryptanalysis of Frit

Dobraunig, C., Eichlseder, M., Mendel, F. & Schofnegger, M., 17 Jun 2019, (Angenommen/In Druck) Selected Areas in Cryptography - SAC 2019. Springer, (Lecture Notes in Computer Science).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

Albrecht, M. R., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 15 Aug 2019, (Angenommen/In Druck) ASIACRYPT 2019.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Polynomials
Hash functions

A Systematic Evaluation of Transient Execution Attacks and Defenses

Canella, C., Bulck, J. V., Schwarz, M., Lipp, M., Berg, B. V., Ortner, P., Piessens, F., Evtyushkin, D. & Gruss, D., 14 Aug 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, S. 249-266 17 S. (arXiv.org e-Print archive).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Program processors
Core meltdown
Firmware
Industry

Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys

Hörandner, F. & Nieddu, F., 2019, (Angenommen/In Druck) 15th International Conference on Information Systems Security, ICISS 2019.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Cryptography
Hardware
Recovery
Computer hardware

DNS-based Trust Scheme Publication and Discovery

Wagner, G., More, S. J., Wagner, S. & Hoffmann, M., 29 Mär 2019, Lecture Notes in Informatics: Open Identity Summit 2019. Gesellschaft für Informatik , Band 2019.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Fallout: Leaking Data on Meltdown-resistant CPUs

Canella, C. A., Genkin, D., Giner, L., Gruß, D., Lipp, M., Minkin, M., Moghimi, D., Piessens, F., Schwarz, M., Sunar, B., Bulck, J. V. & Yarom, Y., 12 Nov 2019, (Angenommen/In Druck) CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE, S. 769-784 15 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Fallout
Metadata
Flow control
Program processors
Hardware

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Cid, C. & Jacobson, M. J. (Hrsg.). Springer, S. 257-277 21 S. (Lecture Notes in Computer Science; Band 11349).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Authenticated Encryption
Fault Attacks
Cryptography
Fault
Initialization

Feistel Structures for MPC, and More

Albrecht, M. R., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 21 Jun 2019, (Angenommen/In Druck) ESORICS 2019. 54 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Throughput

Fides – Unleashing the Full Potential of Remote Attestation

Prünster, B., Palfinger, G. & Kollmann, C. P., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Band 2: SECRYPT. S. 314--321

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Experiments
Open source software

Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption

Ziegler, D., Sabongui, J. & Palfinger, G., Jun 2019, Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019. Springer International, S. 91-104

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Datei

Forgery Attacks on FlexAE and FlexAEAD

Eichlseder, M., Kales, D. & Schofnegger, M., 5 Sep 2019, (Angenommen/In Druck) IMA Cryptography and Coding - IMACC 2019. 12 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Standardization
Cryptography

Horcruxes for Everyone - A Framework for Key-Loss Recovery by Splitting Trust

Hörandner, F. & Rabensteiner, C., 2019, (Angenommen/In Druck) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Recovery
Servers
Application programs
Authentication
Costs

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Schwarz, M., Lackner, F. & Gruss, D., 24 Feb 2019, NDSS.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

L*-Based Learning of Markov Decision Processes

Tappler, M., Aichernig, B., Bacci, G., Eichlseder, M. & Larsen, K. G., 2019, Formal Methods - The Next 30 Years . ter Beek, M. H., McIver, A. & Oliveria, J. N. (Hrsg.). Cham: Springer, S. 651 - 669 19 S. (Lecture Notes in Computer Science; Band 11800).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Learning algorithms
Sampling
Formal languages
Model structures
Testing

Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning

Aichernig, B. K., Bloem, R., Ebrahimi, M., Horn, M., Pernkopf, F., Roth, W., Rupp, A., Tappler, M. & Tranninger, M., 2019, Testing Software and Systems: 31st IFIP WG 6.1 International Conference, ICTSS 2019, Paris, France, October 15–17, 2019, Proceedings. Gaston, C., Kosmatov, N. & Le Gall, P. (Hrsg.). Cham: Springer International Publishing AG , S. 3-21 19 S. (Lecture Notes in Computer Science; Band 11812).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Hybrid systems
Learning systems
Testing
Recurrent neural networks

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Dinur, I., Promitzer, A., Kales, D., Ramacher, S. & Rechberger, C., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I. Ishai, Y. & Rijmen, V. (Hrsg.). Springer, S. 343-372 30 S. (Lecture Notes in Computer Science; Band 11476).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Block Ciphers
Cryptography
Equivalence
Partial
Encryption

Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks

Prünster, B., Fasllija, E. & Mocher, D. W., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Band 2: SECRYPT. S. 252--259

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Peer to peer networks
Silicon
Cloud computing
Hardware
Bandwidth

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, S. 306-313 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Android (operating system)

Mobile-Only Solution for Server-Based Qualified Electronic Signatures

Theuermann, K., Tauber, A. & Lenz, T., 24 Mai 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Shanghai, China, 7 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Mobile Private Contact Discovery at Scale

Kales, D., Rechberger, C., Schneider, T., Senker, M. & Weinert, C., 14 Aug 2019, 28th USENIX Security Symposium. USENIX Association, S. 1447-1464

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Smartphones
Communication
Networks (circuits)
Mobile devices
Cryptography

More Practical Single-Trace Attacks on the Number Theoretic Transform

Peßl, P. & Primas, R., 2019, Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Springer, (Lecture Notes in Computer Science; Band 11774).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Cryptography
Mathematical transformations
Microcontrollers
Recovery
Side channel attack

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M., Masters, J. & Gruß, D., Sep 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings. Cham: Springer, Band 1. S. 279-299 (Lecture Notes in Computer Science; Band 11735).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Data storage equipment

Obfuscation-Resilient Code Recognition in Android Apps

Feichtner, J. & Rabensteiner, C., 2019, 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: Association of Computing Machinery, 10 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Android (operating system)

Page Cache Attacks

Gruss, D., Kraft, E., Tiwari, T., Schwarz, M., Trachtenberg, A., Hennessey, J., Ionescu, A. & Fogh, A., 12 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE, S. 167-180

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Hardware
Computer operating systems
Computer systems
Servers
Monitoring

Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs

Fasllija, E., Enişer, H. F. & Prünster, B., 23 Okt 2019, 15th EAI International Conference on Security and Privacy in Communication Networks. Springer

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Hooks
Transparency
Labels
Websites
Visibility

Policy-based access control for the IoT and Smart Cities

Omolola, O., More, S., Fasllija, E., Wagner, G. & Alber, L., 1 Jan 2019, Open Identity Summit 2019, Proceedings. Rossnagel, H., Wagner, S. & Huhnlein, D. (Hrsg.). Gesellschaft fur Informatik (GI), S. 157-163 7 S. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); Band P-293).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Access control
Network protocols
Data privacy
Data storage equipment
Smart city

Protecting RISC-V Processors against Physical Attacks

Werner, M., Schilling, R., Unterluggauer, T. & Mangard, S., 2019, Design, Automation & Test in Europe Conference - DATE 2019. S. 1136-1141 6 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Datei
Reduced instruction set computing
Microcontrollers
Data storage equipment
Flow control
Program processors

Prying CoW: Inferring Secrets Across Virtual Machine Boundaries

Palfinger, G., Prünster, B. & Ziegler, D., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. Prague, Czech Republic: SciTePress - Science and Technology Publications, Band 2: SECRYPT. S. 187 - 197

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Computer operating systems
Hardware
Virtual machine

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (Hrsg.). S. 219-231

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschung

Datei

Revisiting User Privacy for Certificate Transparency

Kales, D., Omolola, O. & Ramacher, S., 2019, 4th IEEE European Symposium on Security and Privacy.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Run-Time Optimization for Learned Controllers Through Quantitative Games

Avni, G., Bloem, R., Chatterjee, K., Henzinger, T., Könighofer, B. & Pranger, S., 15 Jul 2019, Computer Aided Verification (CAV). Dillig, I. & Tasiran, S. (Hrsg.). 31 Aufl. Springer, Band 11561. S. 630-649 ( Lecture Notes in Computer Science; Band 11561).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Controllers
Emergency vehicles
Stochastic models
Telecommunication traffic
Learning systems

Selective End-To-End Data-Sharing in the Cloud

Hörandner, F., Ramacher, S. & Roth, S., 2019, (Angenommen/In Druck) 15th International Conference on Information Systems Security, ICISS 2019.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Cryptography

SGXJail: Defeating Enclave Malware via Confinement

Weiser, S., Mayr, L., Schwarz, M. & Gruß, D., Sep 2019, (Angenommen/In Druck) Research in Attacks, Intrusions and Defenses 2019.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Small faults grow up - Verification of error masking robustness in arithmetically encoded programs

Karl, A. F., Schilling, R., Bloem, R. & Mangard, S., 2019, Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings. Piskac, R. & Enea, C. (Hrsg.). Springer, S. 183-204 22 S. (Lecture Notes in Computer Science; Band 11388).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Masking
Fault
Robustness
Flip
Soft Error

Spectre Attacks: Exploiting Speculative Execution

Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M. & Yarom, Y., 20 Mai 2019, 40th IEEE Symposium on Security and Privacy.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Synthesis of Minimum-Cost Shields for Multi-agent Systems

Bharadwaj, S., Bloem, R., Dimitrova, R., Könighofer, B. & Topcu, U., 10 Jul 2019, 2019 American Control Conference (ACC). ACM/IEEE, S. 1048-1055 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Multi agent systems
Costs
Warehouses
Unmanned aerial vehicles (UAV)
Logistics

Synthesizing Reactive Systems Using Robustness and Recovery Specifications

Bloem, R., Chockler, H., Ebrahimi, M. & Strichman, O., 2019, (Angenommen/In Druck) 2019 Formal Methods in Computer Aided Design, FMCAD 2019. Barrett, C. & Yang, J. (Hrsg.). IEEE CS, 5 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Specifications
Recovery

Tackling data inefficiency: Compressing the bitcoin blockchain

Marsalek, A., Zefferer, T., Fasllija, E. & Ziegler, D., 1 Aug 2019, 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering: TrustCom/BigDataSE 2019. Institute of Electrical and Electronics Engineers, S. 626-633 8 S. 8887331. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Node
Inefficiency
Internet of things
Resources
Evaluation

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V

Weiser, S., Werner, M., Brasser, F., Malenko, M., Mangard, S. & Sadeghi, A-R., Feb 2019, (Angenommen/In Druck) Network and Distributed System Security Symposium (NDSS) 2019.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

TPL: A Trust Policy Language

Mödersheim, S., Schlichtkrull, A., Wagner, G., More, S. & Alber, L., 19 Jul 2019, Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM 2019. 1 Aufl. Copenhagen, Denmark: Springer, Band Trust Management XIII. S. 209-223

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Semantics
Acoustic waves

Trustworthy Privacy-Preserving Service Compositions

Theuermann, K., 31 Okt 2019, 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). S. 10-17 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Chemical analysis
Transparency
Cryptography
Computer systems
Network protocols

Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications

Marsalek, A., Kollmann, C., Zefferer, T. & Teufl, P., 1 Mai 2019, ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency. Institute of Electrical and Electronics Engineers, S. 394-402 9 S. 8751444

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Industry
Data privacy
Security of data
Middleware
Privacy

Usability of Policy Authoring tools: A layered approach

Weinhardt, S. & Omolola, O., 2019, ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy. Mori, P., Camp, O. & Furnell, S. (Hrsg.). Band 1. S. 301-308 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Wait a second: Playing Hanabi without giving hints

Eger, M. & Gruss, D., 26 Aug 2019, Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019. Khosmood, F., Pirker, J., Apperley, T. & Deterding, S. (Hrsg.). New York, NY: Association of Computing Machinery, 14. (ACM International Conference Proceeding Series).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Security systems
Photonics
Communication

ZombieLoad: Cross-Privilege-Boundary Data Sampling

Schwarz, M., Lipp, M., Moghimi, D., Bulck, J. V., Stecklina, J., Prescher, T. & Gruss, D., 12 Nov 2019, (Angenommen/In Druck) CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Program processors
Sampling
Faulting
Data storage equipment
Virtual machine
2018

A Counting Semantics for Monitoring LTL Specifications over Finite Traces

Bartocci, E., Bloem, R., Nickovic, D. & Röck, F., 2018, Computer Aided Verification : 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part I. Band 1. S. 547-564 18 S. (Lecture Notes in Computer Science; Band 10980).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access

Agile Smart-device based Multi-factor Authentication for Modern Identity Management Systems

Lenz, T. & Krnjic, V., 2018, Proceedings of the 14th International Conference on Web Information Systems and Technologies. Band 1. S. 113-124

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access

A Hierarchical Evaluation Scheme for Pilot-based Research Projects

Zefferer, T., 2018, Proceedings of the 14th International Conference on Web Information Systems and Technologies. Escalona, M. J., Domínguez Mayo, F., Majchrzak, T. & Monfort, V. (Hrsg.). SciTePress, Band 1. S. 356-363

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung