Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Jun. -Prof. Dr. -Ing. Alina Roitberg University of Stuttgart

On Transferability of Driver Observation Models from Simulated to Real Environments in Autonomous Cars, , , , and . 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), page 3129-3134. IEEE, (2023)
On Transferability of Driver Observation Models from Simulated to Real Environments in Autonomous Cars, , , , and . 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), page 3129-3134. IEEE, (2023)Quantized Distillation : Optimizing Driver Activity Recognition Models for Resource-Constrained Environments, , , , and . 2023 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), page 5479-5486. IEEE, (2023)
 

Other publications of authors with the same name

On Preventing Intrusions by Process Behavior Monitoring., , and . Workshop on Intrusion Detection and Network Monitoring, page 29-40. USENIX, (1999)On the Limits of Information Flow Techniques for Malware Analysis and Containment., , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 143-163. Springer, (2008)Expanding Malware Defense by Securing Software Installations., , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 164-185. Springer, (2008)Code-pointer integrity., , , , , and . The Continuing Arms Race, ACM / Morgan & Claypool, (2018)Eternal War in Memory., , , and . IEEE Security & Privacy, 12 (3): 45-53 (2014)Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata., and . IEEE Trans. Information Forensics and Security, 11 (3): 468-483 (2016)Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program., , , , , , , and . CoRR, (2016)SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data., , , , , , , and . CoRR, (2018)Protection, usability and improvements in reflected XSS filters., and . AsiaCCS, page 5. ACM, (2012)Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models., and . ACSAC, page 215-224. IEEE Computer Society, (2005)