Author of the publication

Stereoscopic cell visualization: from mesoscopic to molecular scale.

, , , , and . J. Electronic Imaging, 23 (1): 011007 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures., , and . Rel. Eng. & Sys. Safety, 96 (1): 11-25 (2011)Analyzing Malware Log Data to Support Security Information and Event Management: Some Research Results., , , and . DBKDA, page 108-113. IEEE Computer Society, (2009)Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation., , , and . SAFECOMP Workshops, volume 7613 of Lecture Notes in Computer Science, page 498-507. Springer, (2012)Statistical Detection of Malicious PE-Executables for Fast Offline Analysis., , , and . Communications and Multimedia Security, volume 6109 of Lecture Notes in Computer Science, page 93-105. Springer, (2010)Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment., , , and . SAFECOMP, volume 4680 of Lecture Notes in Computer Science, page 40-53. Springer, (2007)Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures., , and . SAFECOMP, volume 5219 of Lecture Notes in Computer Science, page 235-248. Springer, (2008)Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump., , , and . GI Jahrestagung, volume P-154 of LNI, page 1619-1633. GI, (2009)IT Security in Automotive Software Development., , and . Softwaretechnik-Trends, (2009)Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment., , and . IAS, page 295-298. IEEE Computer Society, (2008)Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional Transitions., , , and . SAFECOMP, volume 9337 of Lecture Notes in Computer Science, page 47-58. Springer, (2015)