Login / Signup
Jana Fruth
Publication Activity (10 Years)
Years Active: 2010-2019
Publications (10 Years): 4
Top Topics
Input Variables
Top Venues
Stat. Comput.
GI-Jahrestagung
Reliab. Eng. Syst. Saf.
Math. Comput. Simul.
</>
Publications
</>
Jana Fruth
,
Olivier Roustant
,
Sonja Kuhnt
Support indices: Measuring the effect of input variables over their supports.
Reliab. Eng. Syst. Saf.
187 (2019)
Thomas Mühlenstädt
,
Jana Fruth
,
Olivier Roustant
Computer experiments with functional inputs and scalar outputs by a norm-based approach.
Stat. Comput.
27 (4) (2017)
Jana Fruth
,
Olivier Roustant
,
Sonja Kuhnt
Sequential designs for sensitivity analysis of functional inputs in computer experiments.
Reliab. Eng. Syst. Saf.
134 (2015)
Roland Fried
,
Inoncent Agueusop
,
Björn Bornkamp
,
Konstantinos Fokianos
,
Jana Fruth
,
Katja Ickstadt
Retrospective Bayesian outlier detection in INGARCH series.
Stat. Comput.
25 (2) (2015)
Jana Fruth
,
Matthias Thimm
,
Sven Kuhlmann
,
Jana Dittmann
Ein erster Prototyp: Sicherheitsguide für Grundschulkinder beim Umgang mit dem Internet.
GI-Jahrestagung
(2014)
Jana Fruth
,
Edgar Nett
Uniform Approach of Risk Communication in Distributed IT Environments Combining Safety and Security Aspects.
SAFECOMP Workshops
(2014)
Olivier Roustant
,
Jana Fruth
,
Bertrand Iooss
,
Sonja Kuhnt
Crossed-derivative based sensitivity measures for interaction screening.
Math. Comput. Simul.
105 (2014)
Jana Fruth
,
Marcel Beskau
,
Matthias Volk
,
Anneke Meyer
,
Robin Richter
,
Jana Dittmann
Erster Konzeptansatz von Sicherheitstypen: Sicherheitsbewusstsein von Kindern und Jugendlichen im Umgang mit dem Internet.
GI-Jahrestagung
(2013)
Jana Fruth
,
Carsten Schulze
,
Marleen Rohde
,
Jana Dittmann
E-Learning of IT Security Threats: A Game Prototype for Children.
Communications and Multimedia Security
(2013)
Wiebke Menzel
,
Sven Tuchscheerer
,
Jana Fruth
,
Christian Krätzer
,
Jana Dittmann
Designansatz und Evaluation von Kindgerechten Securitywarnungen für Smartphones.
Sicherheit
(2012)
Sven Kuhlmann
,
Jana Fruth
,
Tobias Hoppe
,
Jana Dittmann
Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation.
SAFECOMP Workshops
(2012)
Wiebke Menzel
,
Sven Tuchscheerer
,
Jana Fruth
,
Christian Kraetzer
,
Jana Dittmann
Design and evaluation of security multimedia warnings for children's smartphones.
Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems
(2012)
Fred Samland
,
Jana Fruth
,
Mario Hildebrandt
,
Tobias Hoppe
,
Jana Dittmann
AR.Drone: security threat analysis and exemplary attack to track persons.
Intelligent Robots and Computer Vision: Algorithms and Techniques
(2012)
Janet Siegmund
,
Norbert Siegmund
,
Jana Fruth
,
Sven Kuhlmann
,
Jana Dittmann
,
Gunter Saake
Program Comprehension in Preprocessor-Based Software.
SAFECOMP Workshops
(2012)
Janet Feigenspan
,
Norbert Siegmund
,
Jana Fruth
On the Role of Program Comprehension in Embedded Systems.
Softwaretechnik-Trends
31 (2) (2011)
Jana Fruth
,
Christian Kraetzer
,
Jana Dittmann
Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots.
Intelligent Robots and Computer Vision: Algorithms and Techniques
(2011)
Jana Fruth
,
Ronny Merkel
,
Jana Dittmann
Security Warnings for Children's Smart Phones: A First Design Approach.
Communications and Multimedia Security
(2011)
Norbert Siegmund
,
Janet Feigenspan
,
Michael Soffner
,
Jana Fruth
,
Veit Köppen
Challenges of secure and reliable data management in heterogeneous environments.
IWDE
(2010)
Jana Dittmann
,
Bernhard Karpuschewski
,
Jana Fruth
,
Mathias Petzel
,
Richard Münder
An exemplary attack scenario: threats to production engineering inspired by the Conficker worm.
IWDE
(2010)