Fakultät für Mathematik und Naturwissenschaften

Die Mathematik des Drängelns - Simulationen von Evakuierungen bei Grossveranstaltungen

  1. M. Küpper, A. Seyfried, Analysis of Space Usage on train station platforms based on trajectory data, Sustainability 12, no. 20 (2020): 8325.
  2. J. Adrian, N. Bode, M. Amos, et al., A glossary for research on human crowd dynamics, Collective Dynamics 4 (2019): 1-13.
  3. M. Boltes, J. Zhang, A. Seyfried, Analysis of crowd dynamics with laboratory experiments, In: Modeling, Simulation and Visual Analysis of Crowds, pp. 67-97. Springer, New York, NY, 2013.
  4. A. Seyfried, O. Passon, B. Steffen, M. Boltes, T. Rupprecht, W. Klingsch, New insights into pedestrian flow through bottlenecks, Transportation Science 43, no. 3 (2009): 395-406.
  5. A. Schadschneider, M. Chraibi, A. Seyfried, A. Tordeux, J. Zhang, Pedestrian dynamics: From empirical results to modeling, In: Crowd Dynamics, Volume 1, pp. 63-102. Birkhäuser, Cham, 2018.

Mit mathematischer Optimierung zu sicheren und klimafreundlichen Flügen

  1. M. Schubert, Optimal Control of 3D Separation Management, Master thesis, Ru-precht-Karls-Universität Heidelberg, 2017.
  2. V. Semenov, Multi-Stage Strategy to Numerical Trajectory Optiization for Multiple Aircraft Approaching an Airport, Master thesis, Ruprecht-Karls-Universität Heidelberg, 2019.
  3. A. Raptakis, Optimization of Flight Trajectories of an Aircraft with Respect to Fuel Consumption, Master thesis, Ruprecht-Karls-Universität Heidelberg, 2020.
  4. European Aviation Environmental Report 2019

Weniger Flugzeugabstürze aufgrund besserer Wahrscheinlichkeitsmodelle

  1. C. Thiel, H. Fricke, Assessment of local aircraft crash risk, In: International Conference on Research in Airport Transportation (ICRAT), Fairfax. 2008.
  2. K.H. Lyle, A.E. Stockwell, R.C. Hardy, Application of probability methods to assess crash modeling uncertainty, 2003.
  3. M. Piers, Models for the assessment of third party risk due to aircraft accidents in the vicinity of airports, In: 4 th International Conference on Probabilistic Safety Assessment and management, New York, Springer, vol. 3, no. Pt 4, pp. 1547-1553. 1998.
  4. O. Zaporozhets, I. Gosudarska, The Aircraft Accident Probability Model in The Vicinity of the Airport, Proceedings of the National Aviation University 4 (2016): 69-76.
  5. B.J.M. Ale, M. Piers, The assessment and management of third party risk around a major airport, Journal of Hazardous Materials 71, no. 1-3 (2000): 1-16.
  6. D.A. Hsu, The evaluation of aircraft collision probabilities at intersecting air routes, The Journal of Navigation 34, no. 1 (1981): 78-102.
  7. M. Ayres Jr, H. Shirazi, R. Carvalho, et al., Modelling the location and consequences of aircraft accidents, Safety Science 51, no. 1 (2013): 178-186.

Kryptographie: Digitale Schutzmechanismen knacken, um sie sicherer zu machen

  1. G. Baumslag, B. Fine, M. Kreuzer, G. Rosenberger, A course in mathematical cryptography, De Gruyter, 2015.
  2. J. Hoffstein, J. Pipher, J.H. Silverman, An introduction to mathematical cryptography, Vol. 1. New York: Springer, 2008.
  3. A. Stanoyevitch, Introduction to Cryptography with mathematical foundations and computer implementations, CRC Press, 2010.
  4. J. Marquis, The Mathematics Behind Breaking Asymmetrical Key Encryption, PhD diss., Lamar University-Beaumont, 2020.
  5. V. Di Proietto, Introduction to (Mathematical) Cryptography.

Muster in PIN-Codes: Sie sind berechenbarer als Sie denken

  1. X. Bultel, J. Dreier, M. Giraud, M. Izaute, et al., Security analysis and psychological study of authentication methods with PIN codes, In 2018 12th International Conference on Research Challenges in Information Science (RCIS), pp. 1-11. IEEE, 2018.
  2. G. Ali, A.D. Mussa, A.E. Sam, Two-factor authentication scheme for mobile money: a review of threat models and countermeasures, Future Internet 12, no. 10 (2020): 160.
  3. G. Le Lan, V. Frey, Securing smartphone handwritten pin codes with recurrent neural networks, In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2612-2616. IEEE, 2019.
  4. G. Zhang, Analyzing key-click patterns of pin input for recognizing voip users, In: IFIP International Information Security Conference, pp. 247-258. Springer, Berlin, Heidelberg, 2011.
  5. L. O'Gorman, Comparing passwords, tokens, and biometrics for user authentication, Proceedings of the IEEE 91, no. 12 (2003): 2021-2040.

Das Benfordsche Gesetz -- Wie Mathematik Zahlenfälscher entlarvt

  1. Frank Benford, The law of anomalous numbers, Proceedings of the American Philosophical Society, 78, (1938), 551–572.
  2. Simon Newcomb, Note on the frequency of use of the different digits in natural numbers, American Journal of Mathematics, 4 (1881), 39–40.
  3. S. Goudsmit, W. Furry, Significant Figures of Numbers in Statistical Tables, Nature 154, 800–801 (1944).
  4. A. Berger, T. P. Hill, and E. Rogers, Benford Online Library, 2009.
  5. A. Berger and T. P. Hill, An Introduction to Benford's Law, Princeton University Press, 2015
  6. P. Diaconis, The distribution of leading digits and uniform distribution mod 1, Ann. Probab. 5 (1977), 72-81.
  7. A. Diekmann, Datenfälschung. Ergebnisse aus Experimenten mit der Benford Verteilung, Manuscript, ETH Zürich, 2004.
  8. A. Diekmann, Not the First Digit! Using Benford's Law to Detect Fraudulent Scientific Data, Manuscript, ETH Zürich, 2004.
  9. Boudewijn F. Roukema, A first-digit anomaly in the 2009 Iranian presidential election, Journal of Applied Statistics, 41:1 (2014), 164-199, DOI: 10.1080/02664763.2013.838664
  10. A. Bach, Auf Verbrecherjagd mit Benford, Quarks&Co, WDR, 2006.
  11. H. Dambeck, Mathematisches Gesetz verletzt - Zahlenforscher findet Hinweise auf Wahlmanipulation in Iran, Spiegel Online, 2009.
  12. S. Hagl, Das Benfordsche Gesetz - Wenn sich Zahlen an Gesetze halten, FH Deggendorf, 2005.
  13. M.J. Nigrini, The detection of income evasion through an analysis of digital distributions, Ph.D. thesis, Dept. of Accounting, Univ. Cincinnati, Cincinnati OH, 1992.
  14. M.J. Nigrini, A taxpayer compliance application of Benford's Law, J. of the Am. Taxation Assoc. 18 (1996), 72-91.
  15. M.J. Nigrini, Benford's Law.
  16. B. Rauch, M. Göttsche, G. Brähler, S. Engel, Fact and Fiction in EU-Governmental Economic Data, German Economic Review 12 (2011), 243-255.
  17. R.U. Schneider, Das Rätsel der abgegriffenen Seiten, NZZ Folio 1/06.

Weitere Infos über #UniWuppertal: