Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/sicherheit/SchmerlRK08
%A Schmerl, Sebastian
%A Rietz, René
%A König, Hartmut
%B Sicherheit
%D 2008
%E Alkassar, Ammar
%E Siekmann, Jörg H.
%I GI
%K dblp
%P 367-379
%T Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort.
%U http://dblp.uni-trier.de/db/conf/sicherheit/sicherheit2008.html#SchmerlRK08
%V P-128
%@ 978-3-88579-222-2
@inproceedings{conf/sicherheit/SchmerlRK08,
added-at = {2023-07-04T00:00:00.000+0200},
author = {Schmerl, Sebastian and Rietz, René and König, Hartmut},
biburl = {https://www.bibsonomy.org/bibtex/2b73aa4a9ec94a138090149a01bccd16d/dblp},
booktitle = {Sicherheit},
crossref = {conf/sicherheit/2008},
editor = {Alkassar, Ammar and Siekmann, Jörg H.},
ee = {https://dl.gi.de/handle/20.500.12116/21490},
interhash = {109eea44ba7060817c3399852a337461},
intrahash = {b73aa4a9ec94a138090149a01bccd16d},
isbn = {978-3-88579-222-2},
keywords = {dblp},
pages = {367-379},
publisher = {GI},
series = {LNI},
timestamp = {2024-04-10T02:59:40.000+0200},
title = {Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort.},
url = {http://dblp.uni-trier.de/db/conf/sicherheit/sicherheit2008.html#SchmerlRK08},
volume = {P-128},
year = 2008
}