Institut für Wirtschafts- und Verwaltungsinformatik
FB 4: Informatik / Universität Koblenz
- 0261/2872646
- 0261/2871002646
Neumann, Martin; Lotzmann, Ulf; Troitzsch, Klaus G.
Mafia war: simulating conflict escalation in criminal organizationsTrends in Organized Crime. Bd. 20. H. 1-2. New York, NY: Springer 2016 S. 139 - 178
Watson, Michael R.; Shirazi, Noor-ul-Hassan; Marnerides, Angelos K. et al.
Malware Detection in Cloud Computing InfrastructuresIEEE Transactions on Dependable and Secure Computing. Bd. 13. H. 2. New York, NY: IEEE Institute of Electrical and Electronics Engineers 2016 S. 192 - 205
Anzola, David; Neumann, Martin; Möhring, Michael et al.
National Mafia-Type Organisations: Local Threat, Global ReachElsenbroich, Corinna u. a. (Hrsg). Social Dimensions of Organised Crime : Modelling the Dynamics of Extortion Rackets. Cham: Springer International Publishing 2016 S. 9 - 23
Riehle, Dennis M.; Jannaber, Sven; Karhof, Arne et al.
On the de-facto Standard of Event-driven Process Chains: How EPC is defined in LiteratureAndreas Oberweis; Ralf Reussner (Hrsg). Modellierung 2016: 2.-4. März, 2016; Karlsruhe; Proceedings. Bonn: Gesellschaft für Informatik 2016 S. 61 - 76 (LNI P-254)
Karhof, Arne; Jannaber, Sven; Riehle, Dennis M. et al.
On the de-facto Standard of Event-driven Process Chains: Reviewing EPC Implementations in Process Modelling ToolsAndreas Oberweis; Ralf Reussner (Hrsg). Modellierung 2016: 2.-4. März, 2016; Karlsruhe; Proceedings. Bonn: Gesellschaft für Informatik 2016 S. 77 - 91 (LNI P-254)
Lehmann, Matheus B.; Barcellos, Marinho P.; Mauthe, Andreas
Providing producer mobility support in NDN through proactive data replicationSema Oktug;Mehmet Ulema;Cicek Cavdar;Lisandro Zambenedetti Granville;Carlos Raniery Paula dos Santos (Hrsg). Proceedings of the IEEE/IFIP Network Operations and Management Symposium NOMS 2016: Istanbul, Turkey, April 25-29, 2016. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2016 S. 383 - 391
Grimm, Rüdiger; Simić-Draws, Daniela; Bräunlich, Katharina et al.
Referenzmodell für ein Vorgehen bei der IT-SicherheitsanalyseInformatik Spektrum. Bd. 39. H. 1. Berlin: Springer 2016 S. 2 - 20
Mondorf, Ansgar; Wimmer, Maria A.
Requirements for an Architecture Framework for Pan-European E-Government ServicesH. Jochen Scholl;Oliver Glassey;Marijn Janssen;Bram Klievink;Ida Lidgren;Peter Parycek;Efthimios Tambouris;Maria A. Wimmer;Tomasz Janowski;Delfina Sá Soares (Hrsg). Electronic Government: 15th IFIP WG 8.5 International Conference, EGOV 2016, Guimarães, Portugal, September 5-8, 2016 Proceedings. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2016 S. 135 - 150
Neumann, Martin; Lotzmann, Ulf
Sanction recognition: A simulation model of extended normative reasoning2016
Nardin, Luis G.; Andrighetto, Giulia; Conte, Rosaria et al.
Simulating protection rackets: a case study of the Sicilian MafiaAutonomous Agents and Multi-Agent Systems. Bd. 30. H. 6. Cham: Springer Science and Business Media LLC 2016 S. 1117 - 1147