@book{WolfFoltzKillich2000, author = {Wolf, Martin and Foltz, Christian and Killich, S.}, title = {K3 User Guide}, publisher = {RWTH}, address = {Aachen}, pages = {1 -- 13}, year = {2000}, language = {en} } @inproceedings{HadinejadMahramGligorevicRitscher2002, author = {Hadinejad-Mahram, Hafez and Gligorevic, Snjezana and Ritscher, Matthias}, title = {Joint iterative channel estimation and parallel interference cancellation for coded DS-CDMA}, series = {Proceeding of the International Conference on Telecommunications 2002 : [Beijing, 23 - 26 June 2002]. Vol. 2}, booktitle = {Proceeding of the International Conference on Telecommunications 2002 : [Beijing, 23 - 26 June 2002]. Vol. 2}, organization = {Institute of Electrical and Electronics Engineers}, pages = {566 -- 570}, year = {2002}, language = {en} } @inproceedings{Gligorevic2002, author = {Gligorevic, Snjezana}, title = {Joint channel estimation and equalization for fast time-variant multipath channels}, series = {Proceedings / 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications : PIMRC 2002 : Lisboa, Portugal, September 15 - 18, 2002}, booktitle = {Proceedings / 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications : PIMRC 2002 : Lisboa, Portugal, September 15 - 18, 2002}, organization = {Institute of Electrical and Electronics Engineers}, isbn = {0-7803-7589-0}, pages = {1127 -- 1130}, year = {2002}, language = {en} } @article{Gligorevic2008, author = {Gligorevic, Snjezana}, title = {Joint channel estimation and equalisation of fast time-varying frequency-selective channels}, series = {European transactions on telecommunications}, volume = {Vol. 19}, journal = {European transactions on telecommunications}, number = {Iss. 1}, issn = {1541-8251; 2161-3915; 1120-3862; 1124-318X}, pages = {1 -- 13}, year = {2008}, language = {en} } @article{Mayer2005, author = {Mayer, Claudia}, title = {Jenseits der Grenze. Asien im Werk von G{\"u}nter Grass. Claudia Mayer-Iswandy}, series = {Ich will in das Herz Kalkuttas eindringen. G{\"u}nter Grass in Indien und Bagladesch. Hrsg. von Martin K{\"a}mpchen.}, journal = {Ich will in das Herz Kalkuttas eindringen. G{\"u}nter Grass in Indien und Bagladesch. Hrsg. von Martin K{\"a}mpchen.}, publisher = {Ed. Isele}, address = {Eggingen}, isbn = {3-86142-314-6}, pages = {159 -- 180}, year = {2005}, language = {de} } @inproceedings{HartungHillgaertnerSchmitzetal.2014, author = {Hartung, Frank and Hillg{\"a}rtner, Michael and Schmitz, G{\"u}nter and Schuba, Marko and Adolphs, Fabian and Hoffend, Jens and Theis, Jochen}, title = {IT-Sicherheit im Automobil}, series = {AmE 2014 : Automotive meets Electronics, Beitr{\"a}ge der 5. GMM-Fachtagung vom 18. bis 19. Februar 2014 in Dortmund. (GMM-Fachbericht ; 78)}, booktitle = {AmE 2014 : Automotive meets Electronics, Beitr{\"a}ge der 5. GMM-Fachtagung vom 18. bis 19. Februar 2014 in Dortmund. (GMM-Fachbericht ; 78)}, publisher = {VDE-Verl.}, address = {Berlin}, organization = {VDE/VDI-Gesellschaft Mikroelektronik, Mikrosystem- und Feinwerktechnik (GMM)}, isbn = {978-3-8007-3580-8}, pages = {CD-ROM}, year = {2014}, language = {de} } @inproceedings{BeckerHoefkenSchuetzetal.2016, author = {Becker, Sebastian and H{\"o}fken, Hans-Wilhelm and Sch{\"u}tz, Philip and Schuba, Marko}, title = {IT-forensische Erkennung modifizierter Android-Apps}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {120 -- 125}, year = {2016}, abstract = {Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbeh{\"o}rden immer h{\"a}ufiger gegen{\"u}berstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden gef{\"u}hrt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei m{\"u}ssen die Ermittler m{\"o}glichst schnell und gezielt erkennen k{\"o}nnen, ob eine App tats{\"a}chlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber f{\"u}r die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen ber{\"u}cksichtigt und so f{\"u}r den Einsatz in der Strafverfolgung in Frage kommt.}, language = {de} } @article{WolfAltgen2013, author = {Wolf, Martin and Altgen, Jannik}, title = {IT Service Management in der Region Aachen : White Paper}, pages = {1 -- 13}, year = {2013}, language = {de} } @article{Alt1979, author = {Alt, Helmut}, title = {Isolierte Freileitungen, ein Betriebsmittel f{\"u}r schwierige Trassenf{\"u}hrung}, series = {Elektrizit{\"a}tswirtschaft}, volume = {Jg. 78}, journal = {Elektrizit{\"a}tswirtschaft}, number = {H. 10}, issn = {0013-5496}, pages = {250 -- 256}, year = {1979}, language = {de} } @inproceedings{BrockmannSultanowCzarnecki2019, author = {Brockmann, Carsten and Sultanow, Eldar and Czarnecki, Christian}, title = {Is enterprise architecture still relevant in the digital age?}, series = {GI Edition Proceedings Band 295 INFORMATIK 2019, Workshop-Beitr{\"a}ge}, booktitle = {GI Edition Proceedings Band 295 INFORMATIK 2019, Workshop-Beitr{\"a}ge}, editor = {Draude, Claude and Lange, Martin and Sick, Bernhard}, publisher = {K{\"o}llen}, address = {Bonn}, isbn = {9783885796893}, issn = {1617-5468}, doi = {10.18420/inf2019_ws01}, pages = {21 -- 21}, year = {2019}, language = {en} }