default search action
Thomas Mundt
Person information
- affiliation: University of Rostock, Department of Computer Science, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Marvin Davieds, Thomas Mundt, Richard Dabels, Noah Garkisch, M. A. Al-Mamun:
Anomaly Detection in Uncharted Ship-Borne Field Buses: A case study. PACRIM 2024: 1-9
2010 – 2019
- 2019
- [c23]Johann Bauer, Johannes Goltz, Thomas Mundt, Simeon Wiedenmann:
Honeypots for Threat Intelligence in Building Automation Systems. ComComAP 2019: 242-246 - [c22]Johannes Goltz, Thomas Mundt, Simeon Wiedenmann:
Risk Analysis in Fieldbus Networks Using the Example of KNX. ICOIN 2019: 310-315 - [c21]Thomas Mundt, Simeon Wiedenmann, Johannes Goltz, Johann Bauer, Maximilian Jung:
Detecting Intrusive Behaviour of People in a Building through Data Analysis and Anomaly Detection in Home Automation Systems. NTMS 2019: 1-7 - [c20]Martin Peters, Johannes Goltz, Simeon Wiedenmann, Thomas Mundt:
Using Machine Learning to Find Anomalies in Field Bus Network Traffic. SpaCCS 2019: 336-353 - 2018
- [c19]Thomas Mundt, Alexander Gladisch, Simon Rietschel, Johann Bauer, Johannes Goltz, Simeon Wiedenmann:
General Security Considerations of LoRaWAN Version 1.1 Infrastructures. MobiWac 2018: 118-123 - 2016
- [c18]Thomas Mundt, Peter Wickboldt:
Security in building automation systems - a first analysis. Cyber Security And Protection Of Digital Services 2016: 1-8 - [c17]Thomas Mundt, Peter Wickboldt:
Zusammenwachsen von Gebäudeautomation und Computernetzwerken - Eine erste Sicherheitsanalyse. DFN-Forum Kommunikationstechnologien 2016: 115-124 - [c16]Robin Nicolay, Thomas Mundt:
Evaluation of acoustical position determination in a classroom scenario. FIE 2016: 1-7 - [c15]Benjamin Leiding, Clemens H. Cap, Thomas Mundt, Samaneh Rashidibajgan:
Authcoin: Validation and Authentication in Decentralized Networks. MCIS 2016: 5 - [i1]Benjamin Leiding, Clemens H. Cap, Thomas Mundt, Samaneh Rashidibajgan:
Authcoin: Validation and Authentication in Decentralized Networks. CoRR abs/1609.04955 (2016) - 2014
- [c14]Frank Krüger, Martin Kasparick, Thomas Mundt, Thomas Kirste:
Where are My Colleagues and Why? Tracking Multiple Persons in Indoor Environments. Intelligent Environments 2014: 190-197 - 2012
- [c13]Thomas Mundt, Frank Krüger, Till Wollenberg:
Who Refuses to Wash Hands? Privacy Issues in Modern House Installation Networks. BWCCA 2012: 271-277 - 2011
- [c12]Alireza Angabini, Nasser Yazdani, Thomas Mundt, Fatemeh Hassani:
Suitability of Cloud Computing for Scientific Data Analyzing Applications; An Empirical Study. 3PGCIC 2011: 193-199 - [c11]Till Wollenberg, Thomas Mundt:
Proof of proximity with 802.11 wireless LAN. SoftCOM 2011: 1-7
2000 – 2009
- 2009
- [c10]Till Wollenberg, Thomas Mundt:
Interference Aware Route Optimization with Predicted Network Conditions - Extended Abstract. CNSR 2009: 455-457 - [c9]Till Wollenberg, Thomas Mundt:
Interference aware route optimization with predicted network conditions. WOWMOM 2009: 1-7 - 2006
- [j2]Thomas Mundt:
Authentisierte Positionsbestimmung. Prax. Inf.verarb. Kommun. 29(1): 24-29 (2006) - [c8]Thomas Mundt:
Two methods of authenticated positioning. Q2SWinet 2006: 25-32 - 2005
- [c7]Thomas Mundt:
Location Dependent Digital Rights Management. ISCC 2005: 617-622 - 2004
- [j1]Ralf Bill, Clemens H. Cap, Martin Kofahl, Thomas Mundt:
Indoor and Outdoor Positioning in Mobile Environments - a Review and some Investigations on WLAN-Positioning. Ann. GIS 10(2): 91-98 (2004) - 2003
- [b1]Thomas Mundt:
Spontane Verknüpfung von Diensten: Wiederverwendung und Kostenersparnis. University of Rostock, Germany, Diplomica GmbH 2003, ISBN 978-3-8324-6508-7, pp. 1-125 - 2002
- [c6]Nico Maibaum, Thomas Mundt:
JXTA: a technology facilitating mobile peer-to-peer networks. MOBIWAC 2002: 7-13 - 2001
- [c5]Thomas Mundt, Stephan Preuss, Wolfgang Lindner:
Adaptive Service Chaining. International Conference on Internet Computing (1) 2001: 386-392 - [c4]Andreas Müller, Thomas Mundt, Wolfgang Lindner, Clemens H. Cap:
Platform Independent User Interface Generation with XML. ISAS-SCI (1) 2001: 299-304 - [c3]Andreas Müller, Thomas Mundt, Wolfgang Lindner:
Using XML to Semi-Automatically Derive User Interfaces. UIDIS 2001: 91-95
1980 – 1989
- 1988
- [c2]Thomas Mundt:
RPRISM - ein neues Rechnerkonzept. GI Jahrestagung (3) 1988: 29-39 - [c1]Thomas Mundt, R. Süß:
Verteiltes Rechnen in heterogenen Umgebungen. GI Jahrestagung (3) 1988: 76-81
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-13 18:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint