default search action
Igor Ivkic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Rita Stampfl, Barbara Geyer, Marie Deissl-O'Meara, Igor Ivkic:
Revolutionising Role-Playing Games with ChatGPT. Adv. Artif. Intell. Mach. Learn. 4(2): 2244-2257 (2024) - [c11]Igor Ivkic, Tobias Buhmann, Burkhard List, Clemens Gnauer:
Towards a Cost-Benefit Analysis of Additive Manufacturing as a Service. CLOSER 2024: 338-345 - [c10]Dominik Hasiwar, Andreas Gruber, Christian Dragschitz, Igor Ivkic:
Towards a Cloud-Based Smart Office Solution for Shared Workplace Individualization. CLOSER 2024: 367-374 - [i20]Rita Stampfl, Igor Ivkic, Barbara Geyer:
Role-Playing Simulation Games using ChatGPT. CoRR abs/2402.09161 (2024) - [i19]Igor Ivkic, Tobias Buhmann, Burkhard List, Clemens Gnauer:
Towards a Cost-Benefit Analysis of Additive Manufacturing as a Service. CoRR abs/2403.18882 (2024) - [i18]Dominik Hasiwar, Andreas Gruber, Christian Dragschitz, Igor Ivkic:
Towards a Cloud-based Smart Office Solution for Shared Workplace Individualization. CoRR abs/2403.18883 (2024) - [i17]Rita Stampfl, Barbara Geyer, Marie Deissl-O'Meara, Igor Ivkic:
Revolutionising Role-Playing Games with ChatGPT. CoRR abs/2407.02048 (2024) - [i16]Igor Ivkic, Dominik Thiede, Nicholas J. P. Race, Matthew Broadbent, Antonios Gouglidis:
Security Evaluation in Software-Defined Networks. CoRR abs/2408.11486 (2024) - [i15]Rita Stampfl, Igor Ivkic, Barbara Geyer:
Role-Playing Simulation Games using ChatGPT. ERCIM News 2024(136) (2024) - 2023
- [c9]Igor Ivkic, Dominik Thiede, Nicholas J. P. Race, Matthew Broadbent, Antonios Gouglidis:
A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments. CLOSER 2023: 277-288 - [i14]Igor Ivkic, Dominik Thiede, Nicholas J. P. Race, Matthew Broadbent, Antonios Gouglidis:
A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments. CoRR abs/2304.05776 (2023) - [i13]Silia Maksuti, Ani Bicaku, Mario Zsilak, Igor Ivkic, Bálint Péceli, Gábor Singler, Kristóf Kovács, Markus Tauber, Jerker Delsing:
Automated and Secure Onboarding for System of Systems. CoRR abs/2304.05778 (2023) - [i12]Thomas Ederer, Martin Ivancsits, Igor Ivkic:
Temperature Monitoring of Agricultural Areas in a Secure Data Room. CoRR abs/2310.18019 (2023) - [i11]Thomas Ederer, Martin Ivancsits, Igor Ivkic:
Temperature Monitoring of Agricultural Areas in a Secure Data Room. ERCIM News 2023(135) (2023) - 2022
- [j2]Igor Ivkic, Patrizia Sailer, Antonios Gouglidis, Andreas Mauthe, Markus Tauber:
A Security Cost Modelling Framework for Cyber-Physical Systems. ACM Trans. Internet Techn. 22(2): 53:1-53:31 (2022) - 2021
- [j1]Silia Maksuti, Ani Bicaku, Mario Zsilak, Igor Ivkic, Bálint Péceli, Gabor Singler, Kristóf Kovács, Markus Tauber, Jerker Delsing:
Automated and Secure Onboarding for System of Systems. IEEE Access 9: 111095-111113 (2021) - [c8]Patrizia Sailer, Igor Ivkic, Markus Tauber, Andreas Mauthe, Antonios Gouglidis:
Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems. IM 2021: 908-913 - [i10]Patrizia Sailer, Igor Ivkic, Markus Tauber, Andreas Mauthe, Antonios Gouglidis:
Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems. CoRR abs/2107.07745 (2021) - [i9]Igor Ivkic, Patrizia Sailer, Antonios Gouglidis, Andreas Mauthe, Markus Tauber:
A Security Cost Modelling Framework for Cyber-Physical Systems. CoRR abs/2107.07784 (2021)
2010 – 2019
- 2019
- [c7]Igor Ivkic, Andreas Mauthe, Markus Tauber:
Towards a Security Cost Model for Cyber-Physical Systems. CCNC 2019: 1-7 - [c6]Roland Pellegrini, Igor Ivkic, Markus Tauber:
Function-as-a-Service Benchmarking Framework. CLOSER 2019: 479-487 - [c5]Igor Ivkic, Harald Pichler, Mario Zsilak, Andreas Mauthe, Markus Tauber:
A Framework for Measuring the Costs of Security at Runtime. CLOSER 2019: 488-494 - [i8]David Hofbauer, Igor Ivkic, Silia Maksuti, Andreas Aldrian, Markus Tauber:
On the Cost of Security Compliance in Information Systems. CoRR abs/1905.06122 (2019) - [i7]Igor Ivkic, Andreas Mauthe, Markus Tauber:
Towards a Security Cost Model for Cyber-Physical Systems. CoRR abs/1905.06124 (2019) - [i6]Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Tauber, Alexander Wöhrer:
Towards a Security Baseline for IaaS-Cloud Back-Ends in Industry 4.0. CoRR abs/1905.06709 (2019) - [i5]Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Tauber:
On the Cost of Cyber Security in Smart Business. CoRR abs/1905.06711 (2019) - [i4]Igor Ivkic, Alexander Wöhrer, Markus Tauber:
Towards Comparing Programming Paradigms. CoRR abs/1905.06777 (2019) - [i3]Roland Pellegrini, Igor Ivkic, Markus Tauber:
Towards a Security-Aware Benchmarking Framework for Function-as-a-Service. CoRR abs/1905.07228 (2019) - [i2]Igor Ivkic, Harald Pichler, Mario Zsilak, Andreas Mauthe, Markus Tauber:
A Framework for Measuring the Costs of Security at Runtime. CoRR abs/1905.11180 (2019) - [i1]Roland Pellegrini, Igor Ivkic, Markus Tauber:
Function-as-a-Service Benchmarking Framework. CoRR abs/1905.11707 (2019) - 2018
- [c4]Roland Pellegrini, Igor Ivkic, Markus Tauber:
Towards a Security-Aware Benchmarking Framework for Function-as-a-Service. CLOSER 2018: 666-669 - 2017
- [c3]Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Gerhard Tauber:
On the cost of cyber security in smart business. ICITST 2017: 255-260 - [c2]Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer:
Towards a security baseline for IaaS-cloud back-ends in Industry 4.0. ICITST 2017: 427-432 - [c1]Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer:
Towards comparing programming paradigms. ICITST 2017: 436-437
Coauthor Index
aka: Markus Gerhard Tauber
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-28 02:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint