default search action
Martin Knahl
Person information
- affiliation: Furtwangen University of Applied Sciences, Faculty of Business Information Systems
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Jan Stodt, Christoph Reich, Martin Knahl, Nathan L. Clarke:
Explainable Object Classification: Integrating Object Parts/Attributes and Expertise. ICTAI 2024: 128-135 - [c24]Dirk Hölscher, Christoph Reich, Frank Gut, Martin Knahl, Nathan L. Clarke
:
Exploring the Efficacy and Limitations of Histogram-Based Fake Image Detection. KES 2024: 2882-2891 - [c23]Jan Stodt
, Christoph Reich, Martin Knahl:
Demystifying XAI: Requirements for Understandable XAI Explanations. MIE 2024: 565-569 - 2023
- [c22]Dirk Hölscher, Christoph Reich
, Martin Knahl, Frank Gut, Nathan L. Clarke
:
Pix2Pix Hyperparameter Optimisation Towards Ideal Universal Image Quality Index Score. IntelliSys (1) 2023: 862-882 - [c21]Dirk Hölscher, Christoph Reich
, Frank Gut, Martin Knahl, Nathan L. Clarke
:
Pix2Pix Hyperparameter Optimisation Prediction. KES 2023: 1009-1018 - 2022
- [c20]Dirk Hölscher, Christoph Reich
, Martin Knahl, Frank Gut, Nathan L. Clarke
:
Surface Quality Augmentation for Metalworking Industry with Pix2Pix. KES 2022: 897-906 - [c19]Hendrik Kuijs
, Christoph Reich
, Martin Knahl, Nathan L. Clarke
, Ivana Ognjanovic:
The Need for Emergency-Based Access Control in AAL Systems. MECO 2022: 1-6
2010 – 2019
- 2019
- [c18]Ganesh Sankaran, Martin Knahl, Guido Siestrup, Ismini Vasileiou:
Value of Smart Data for Supply Chain Decisions in a Data Rich, Uncertain World. CERC 2019: 49-54 - [c17]Holger Gantikow
, Christoph Reich
, Martin Knahl, Nathan L. Clarke
:
Rule-Based Security Monitoring of Containerized Environments. CLOSER (Selected Papers) 2019: 66-86 - [c16]Hendrik Kuijs
, Timo Bayer, Christoph Reich
, Martin Knahl, Nathan L. Clarke
:
Privacy Enhancing Data Access Control for Ambient Assisted Living. CLOSER 2019: 448-455 - [c15]Holger Gantikow
, Christoph Reich
, Martin Knahl, Nathan L. Clarke
:
Rule-based Security Monitoring of Containerized Workloads. CLOSER 2019: 543-550 - 2016
- [c14]Thomas Rübsamen, Christoph Reich
, Nathan L. Clarke
, Martin Knahl:
Evidence Collection in Cloud Provider Chains. CLOSER (1) 2016: 59-70 - [c13]Hendrik Kuijs
, Christoph Reich
, Martin Knahl, Nathan L. Clarke
:
A Scalable Architecture for Distributed OSGi in the Cloud. CLOSER (2) 2016: 109-117 - [c12]Florian Kemmer, Christoph Reich
, Martin Knahl, Nathan L. Clarke
:
Software Defined Privacy. IC2E Workshops 2016: 25-29 - [c11]Holger Gantikow
, Christoph Reich
, Martin Knahl, Nathan L. Clarke
:
Providing Security in Container-Based HPC Runtime Environments. ISC Workshops 2016: 685-695 - 2013
- [j8]Martin Knahl, Benjamin Contius, Hanno Ebsen:
Ermittlung der Prozessreife für IT-Servicemanagementprozesse. HMD Prax. Wirtsch. 289: 52-60 (2013) - [j7]Markus Sieder, Martin Knahl, Jürgen Hoffmann:
Globale Supportkonzepte für den kontinuierlichen Betrieb heterogener Systemlandschaften. HMD Prax. Wirtsch. 291: 95-103 (2013) - [c10]Martin Hans Knahl:
Application of IT Management Frameworks in Higher Education Institutions. CAiSE Workshops 2013: 124-133 - [c9]Frank Dölitzscher, Martin Knahl, Christoph Reich
, Nathan L. Clarke
:
Anomaly Detection in IaaS Clouds. CloudCom (1) 2013: 387-394 - [c8]Martin Knahl, Rawand Sulayman Mahmood:
Perception and Adoption of Mobile Internet Service Quality in Iraq. DeSE 2013: 169-173 - 2012
- [j6]Mathew George, Klaus Peter Fischer-Hellmann, Martin Knahl, Udo Bleimann, Shirley Atkinson
:
Traceability in Model-Based Testing. Future Internet 4(4): 1026-1036 (2012) - [j5]Frank Doelitzscher, Christoph Reich
, Martin Knahl, Alexander Paßfall, Nathan L. Clarke
:
An agent based business aware incident detection system for cloud environments. J. Cloud Comput. 1: 9 (2012) - [c7]Frank Dölitzscher, Christian Fischer, Denis Moskal, Christoph Reich
, Martin Knahl, Nathan L. Clarke
:
Validating Cloud Infrastructure Changes by Cloud Audits. SERVICES 2012: 377-384 - 2011
- [j4]Mathias Ardelt, Frank Dölitzscher, Martin Knahl, Christoph Reich:
Sicherheitsprobleme für IT-Outsourcing durch Cloud Computing. HMD Prax. Wirtsch. 281: 62-70 (2011) - [c6]Frank Dölitzscher, Christoph Reich
, Martin Knahl, Nathan L. Clarke
:
An Autonomous Agent Based Incident Detection System for Cloud Environments. CloudCom 2011: 197-204
2000 – 2009
- 2008
- [j3]Martin Hans Knahl, Geoff Cox
:
Internet governance: towards a non-representational democracy. Int. J. Web Based Communities 4(3): 319-333 (2008) - [c5]Holger D. Hofmann, Martin Hans Knahl:
The Web 2.0 Demystified – Six Theses on a Misinterpreted Concept. INC 2008: 245-259 - 2007
- [c4]Martin Hans Knahl:
An Analysis of Internet Deployment and Governance. WEBIST (3) 2007: 247-250 - [c3]Martin Hans Knahl:
Design and Implementation Principles for Integrated Network and System Management. WEBIST (1) 2007: 418-421 - 2005
- [c2]Martin Hans Knahl:
A development framework for the provision of integrated management services. IADIS AC 2005: 583-590 - 2004
- [c1]Martin Hans Knahl:
Componentware based network and system management development. Parallel and Distributed Computing and Networks 2004: 239-244 - 2002
- [b1]Martin Hans Knahl:
A generic network and system management framework. University of Plymouth, UK, 2002
1990 – 1999
- 1999
- [j2]Martin Hans Knahl, Holger D. Hofmann, Andrew D. Phippen
:
A distributed component framework for integrated network and systems management. Inf. Manag. Comput. Secur. 7(5): 254-260 (1999) - 1998
- [j1]Steven Furnell
, P. D. Onions, Martin Knahl, Peter W. Sanders, Udo Bleimann, U. Gojny, H. F. Röder:
A security framework for online distance learning and training. Internet Res. 8(3): 236-242 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint