Hacking and securing the AR. Drone 2.0 quadcopter: investigations for improving the security of a toy JS Pleban, R Band, R Creutzburg Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and …, 2014 | 140 | 2014 |
Fast algorithm for computing fractal dimensions of image segments R Creutzburg, E Ivanov Recent issues in pattern analysis and recognition, 42-51, 2005 | 41* | 2005 |
Memory architecture and parallel access M Gossel, B Rebel, R Creutzburg Elsevier Science Inc., 1994 | 40 | 1994 |
Number-theoretic transforms of prescribed length R Creutzburg, M Tasche Mathematics of computation 47 (176), 693-701, 1986 | 34 | 1986 |
Parameter determination for complex number-theoretic transforms using cyclotomic polynomials R Creutzburg, M Tasche Mathematics of computation 52 (185), 189-200, 1989 | 24 | 1989 |
F-Transformation und Faltung in kommutativen Ringen R Creutzburg, M Tasche Elektronische Informationsverarbeitung und Kybernetik 21 (3), 129-149, 1985 | 24 | 1985 |
Practical usefulness of structure from motion (SfM) point clouds obtained from different consumer cameras P Ingwer, F Gassen, S Püst, M Duhn, M Schälicke, K Müller, H Ruhm, ... Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and …, 2015 | 20 | 2015 |
On design of parallel memory access schemes for video coding JK Tanskanen, R Creutzburg, JT Niittylahti Journal of VLSI signal processing systems for signal, image and video …, 2005 | 20 | 2005 |
Some historical notes on number theoretic transform M Bhattacharya, R Creutzburg, J Astola Proc. 2004 Int. TICS Workshop on Spectral Methods and Multirate Signal …, 2004 | 20 | 2004 |
Recent results on the parallel access to tree-like data structures-the isotropic approach, I R Creutzburg Proc. 1991 Int'l Conf. on Parallel Processing, 369-372, 1991 | 15 | 1991 |
Fast algorithm for computing the fractal dimension of binary images R Creutzburg, A Mathias, E Ivanov Physica A: Statistical Mechanics and its Applications 185 (1-4), 56-60, 1992 | 12 | 1992 |
Parallel optimal subtree access with linear memory functions R Creutzburg Proc. of the Third International Workshop on Parallel processing by cellular …, 1987 | 12 | 1987 |
Design of professional laboratory exercises for effective state-of-the-Art OSINT investigation tools-Part 3: Maltego K Schwarz, R Creutzburg Electronic Imaging 33, 1-23, 2021 | 11 | 2021 |
Measuring IT security, compliance and data governance within small and medium-sized IT enterprises A Johannsen, D Kant, R Creutzburg Electronic Imaging 32, 1-11, 2020 | 11 | 2020 |
The strange world of keyloggers-an overview, Part I R Creutzburg Electronic Imaging 29, 139-148, 2017 | 11 | 2017 |
Analysis of IoT security risks based on the exposure of the MQTT protocol D Kant, A Johannsen, R Creutzburg Electronic Imaging 33, 1-8, 2021 | 10 | 2021 |
3D fractal compression for real-time video A Chabarchine, R Creutzburg ISPA 2001. Proceedings of the 2nd International Symposium on Image and …, 2001 | 10 | 2001 |
Recent issues in pattern analysis and recognition V Cantoni, R Creutzburg, S Levialdi, G Wolf Springer Science & Business Media, 1989 | 10 | 1989 |
Conception and implementation of professional laboratory exercises in the field of open source intelligence (OSINT) K Schwarz, F Schwarz, R Creutzburg Electronic Imaging 32, 1-10, 2020 | 9 | 2020 |
Design of Professional Laboratory Exercises for Effective State-of-the-Art OSINT Investigation Tools-Part 1: RiskIQ Passive-Total K Schwarz, R Creutzburg Electronic imaging 33, 1-7, 2021 | 8 | 2021 |