In the field of network security, with the ongoing arms race between
att...
Artificial Intelligence (AI) increasingly shows its potential to outperf...
The use of Unmanned Arial Vehicles (UAVs) offers many advantages across ...
Machine Learning (ML) has provided promising results in recent years acr...
Reliability estimation of Machine Learning (ML) models is becoming a cru...
Virtual Reality (VR) has the potential to support mobile knowledge worke...
Operational Technology (OT)-networks and -devices, i.e. all components u...
Cooperative driving systems, such as platooning, rely on communication a...
An increasing number of consumer-oriented head-mounted displays (HMD) fo...
The open and cooperative nature of Cyber-Physical Systems (CPS) poses ne...
Cyber-Physical Systems (CPS) provide enormous potential for innovation b...
Deception technology has proven to be a sound approach against threats t...
Honeypots are a well-studied defensive measure in network security. This...
The internet landscape is growing and at the same time becoming more
het...
Virtual Reality (VR) has the potential to transform knowledge work. One
...
Virtual Reality (VR) can enhance the display and interaction of mobile
k...
We study a finite and fixed relative formation of possibly mobile wirele...
Transformations accompanying shape-instability govern the morphological
...
Context: Across different domains, Artificial Neural Networks (ANNs) are...
Physical keyboards are common peripherals for personal computers and are...
Failure to accurately measure the outcomes of an experiment can lead to ...
Today, low-altitude fixed-wing Unmanned Aerial Vehicles (UAVs) are large...
Around-device interaction techniques aim at extending the input space us...
Smartphones are a popular device class for mobile Augmented Reality but
...