34 results on '"Fruth, Jana"'
Search Results
2. Computer experiments with functional inputs and scalar outputs by a norm-based approach
3. Uniform Approach of Risk Communication in Distributed IT Environments Combining Safety and Security Aspects
4. Relevantes interprofessionelles Wissen des (Allgemein‑/Viszeral‑)Chirurgen – Informationssicherheit und Datenschutz im chirurgischen Klinikalltag
5. Computer experiments with functional inputs and scalar outputs by a norm-based approach
6. E-Learning of IT Security Threats: A Game Prototype for Children
7. Program Comprehension in Preprocessor-Based Software
8. Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation
9. Security Warnings for Children’s Smart Phones: A First Design Approach
10. As few pediatricians as possible and as many pediatricians as necessary?
11. How to calculate the risk of shortage and surplus of pediatric workforce?
12. Retrospective Bayesian outlier detection in INGARCH series
13. Serum Myo-Inositol, Dimethyl Sulfone, and Valine in Combination with Creatinine Allow Accurate Assessment of Renal Insufficiency—A Proof of Concept
14. E-Learning of IT Security Threats: A Game Prototype for Children
15. Security Warnings for Children’s Smart Phones: A First Design Approach
16. SP278A NUCLEAR MAGNETIC RESONANCE-BASED METHOD FOR ACCURATE ASSESSMENT OF GLOMERULAR FILTRATION RATE
17. As Few Pediatricians as Possible and as Many Pediatricians as Necessary?
18. How to Calculate the Risk of Shortage and Surplus of Pediatric Workforce?
19. Sensitivy analysis and graph-based methods for black-box functions with on application to sheet metal forming
20. New methods for the sensitivity analysis of black-box functions with an application to sheet metal forming
21. Crossed-Derivative Based Sensitivity Measures for Interaction Screening
22. Computer experiments with functional inputs and scalar outputs by a norm-based approach
23. Total interaction index: A variance-based sensitivity index for second-order interaction screening
24. Bayesian outlier detection in INGARCH time series
25. Total Interaction Index: A Variance-based Sensitivity Index for Function Decomposition
26. Retrospective Bayesian outlier detection in INGARCH series
27. Design and evaluation of security multimedia warnings for children's smartphones
28. AR.Drone: security threat analysis and exemplary attack to track persons
29. Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots
30. Challenges of secure and reliable data management in heterogeneous environments
31. An exemplary attack scenario
32. Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots.
33. Challenges of secure and reliable data management in heterogeneous environments.
34. An exemplary attack scenario.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.