default search action
Oliver Jung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Chantal Himmels, Jakob Peintner, Carina Manger, Teresa Rock, Oliver Jung, Andreas Riener:
In Search of Social Presence: Evoking an Impression of Real Pedestrian Behavior Using Motion Capture*. IV 2024: 85-90 - [c22]Jakob Peintner, Chantal Himmels, Teresa Rock, Carina Manger, Oliver Jung, Andreas Riener:
Driving Behavior Analysis: A Human Factors Perspective on Automated Driving Styles. IV 2024: 3312-3317 - 2023
- [c21]Oliver Jung, Eva Hollauf, Veronika Hornung-Prähauser, Tess den Uyl, Kasper van Zon:
Promoting Healthy Aging Using a Robot Support System and Emotion Recognition. dHealth 2023: 140-141 - [c20]Miguel-Ángel Fas-Millán, Francesca Soro, Oliver Jung, Abdelkader Magdy Shaaban:
Cybersecurity Analysis in the UAV Domain: the Practical Approach of the Labyrinth Project. GoodIT 2023: 446-454 - [c19]Abdelkader Magdy Shaaban, Oliver Jung, Christoph Schmittner:
The Need for Threat Modelling in Unmanned Aerial Systems. SAFECOMP Workshops 2023: 73-84 - 2020
- [c18]Lenhard Reuter, Oliver Jung, Julian Magin:
Neural network based anomaly detection for SCADA systems. ICIN 2020: 194-201 - [c17]Dietmar Glachs, Tuncay Namli, Oliver Jung, Felix Strohmeier, Manuela Ploessnig, Gustavo Rodriguez:
FHIR Driven Self-Management Support System for Diabetes. MIE 2020: 1291-1292
2010 – 2019
- 2019
- [c16]Oliver Jung, Dietmar Glachs, Felix Strohmeier, Robert Mulrenin, Sasja Huisman, Ian Smith, Hilde van Keulen, Jacob Sont, Manuela Ploessnig:
Empowering Diabetes Patients with Interventions Based on Behaviour Change Techniques. dHealth 2019: 154-161 - [c15]Oliver Jung, Paul Smith, Julian Magin, Lenhard Reuter:
Anomaly Detection in Smart Grids based on Software Defined Networks. SMARTGREENS 2019: 157-164 - 2018
- [c14]Stefan Wilker, Marcus Meisel, Ewa Piatkowska, Thilo Sauter, Oliver Jung:
Smart Grid Reference Architecture, an Approach on a Secure and Model-Driven Implementation. ISIE 2018: 74-79 - 2017
- [c13]Sandford Bessler, Daniel Hovie, Oliver Jung:
A Tool that Uses Demand Side Management for Planning the Grid Response to Outages. SmartGIFT 2017: 212-222 - [e1]Eng Tseng Lau, Michael K. K. Chai, Yue Chen, Oliver Jung, Victor C. M. Leung, Kun Yang, Sandford Bessler, Jonathan Loo, Tomonori Nakayama:
Smart Grid Inspired Future Technologies - Second EAI International Conference, SmartGIFT 2017, London, UK, March 27-28, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 203, Springer 2017, ISBN 978-3-319-61812-8 [contents] - 2016
- [c12]Sandford Bessler, Daniel Hovie, Oliver Jung:
Outage response in microgrids using demand side management. ISC2 2016: 1-6 - [c11]Sandford Bessler, Oliver Jung:
Energy management in microgrids with flexible and interruptible loads. ISGT 2016: 1-6 - 2014
- [c10]Boris Malinowsky, Hans-Peter Schwefel, Oliver Jung:
Quantitative Safety and Security Analysis from a Communication Perspective. VALUETOOLS 2014 - 2013
- [c9]Andreas Berger, Stefan Ruehrup, Wilfried N. Gansterer, Oliver Jung:
Locality matters: Reducing Internet traffic graphs using location analysis. DSN 2013: 1-12 - 2010
- [j5]Oliver Jung, Andreas Berger, Michael Hirschbichler, Ivan Gojmerac, Hans Lippitsch, Mario Tscherwenka, Klaus Umschaden:
IMS security and what we should learn from the Internet. Elektrotech. Informationstechnik 127(5): 116-120 (2010) - [j4]Andreas Berger, Ivan Gojmerac, Oliver Jung:
Internet security meets the IP multimedia subsystem: an overview. Secur. Commun. Networks 3(2-3): 185-206 (2010)
2000 – 2009
- 2008
- [j3]Martin Petraschek, Thomas Hoeher, Oliver Jung, Helmut Hlavacs, Wilfried N. Gansterer:
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP. J. Univers. Comput. Sci. 14(5): 673-692 (2008) - [j2]Helmut Hlavacs, Wilfried N. Gansterer, Hannes Schabauer, Joachim Zottl, Martin Petraschek, Thomas Hoeher, Oliver Jung:
Enhancing ZRTP by using Computational Puzzles. J. Univers. Comput. Sci. 14(5): 693-716 (2008) - [c8]Oliver Jorns, Oliver Jung, Gerald Quirchmayr:
A platform for the development of location-based mobile applications with privacy protection. COMSWARE 2008: 120-127 - [c7]Oliver Jung, Martin Petraschek, Thomas Hoeher, Ivan Gojmerac:
Using SIP identity to prevent man-in-the-middle attacks on ZRTP. Wireless Days 2008: 1-5 - 2007
- [j1]Oliver Jorns, Oliver Jung, Gerald Quirchmayr:
Transaction pseudonyms in mobile environments. J. Comput. Virol. 3(2): 185-194 (2007) - [c6]Oliver Jorns, Oliver Jung, Gerald Quirchmayr:
A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications. ARES 2007: 139-146 - [c5]Oliver Jorns, Gerald Quirchmayr, Oliver Jung:
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services. ACSW 2007: 133-142 - 2005
- [c4]Oliver Jorns, Oliver Jung, Julia Gross, Sandford Bessler:
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms. TrustBus 2005: 100-109 - 2003
- [b1]Oliver Jung:
Verschlüsselung mit statistischer Selbstsynchronisation und ihre Anwendung in SDH-Netzen. University of Siegen, Germany, Shaker 2003, ISBN 978-3-8322-1756-3, pp. 1-209 - [p1]Martin Gaedke, Martin Nussbaumer, Oliver Jung, Markus Dieckmann:
Implementierungstechnologien für Web-Anwendungen. Web Engineering: Systematische Entwicklung von Web-Anwendungen 2003: 133-160 - 2001
- [c3]Oliver Jung, Sven Kuhn, Christoph Ruland, Kai Wollenweber:
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS. ACISP 2001: 344-359 - [c2]Oliver Jung, Sven Kuhn, Christoph Ruland, Kai Wollenweber:
Suitability of cryptographic modes of operation for the encryption in high-speed networks. ICON 2001: 134-139
1990 – 1999
- 1999
- [c1]Oliver Jung, Christoph Ruland:
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. CHES 1999: 340-352
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-01 21:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint