Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security-Driven Information Flow Modelling for Component Integration in Complex Environments., , and . IAIT, page 19:1-19:8. ACM, (2018)Konzeptionelle Vorschläge für eine umfassende IT-Unterstützung von Richtern und Staatsanwälten sowie Ansätze zu ihrer Realisierung auf der Grundlage vernetzbarer PCs des Industriestandards., and . GI Jahrestagung, volume 156 of Informatik-Fachberichte, page 713-728. Springer, (1987)Open Texture and Knowledge Representation.. Terminology and Knowledge Engineering, page 87-91. Indeks Verlag, Frankfurt Main, (1993)Ontology-Based Model for Automotive Security Verification and Validation., , , , , and . iiWAS, page 73-82. ACM, (2019)Assignment of tasks to competing nodes when task duration times are fuzzy., , , and . J. Intell. Fuzzy Syst., 8 (1): 43-61 (2000)VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis., , , , , and . Mach. Learn. Knowl. Extr., 4 (2): 371-396 (2022)KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data., , , , and . Comput. Secur., (2022)Cyber Exercises in Computer Science Education., , , , and . ICISSP, page 404-411. SCITEPRESS, (2022)Tis/mm., and . ENTER, page 80-86. Springer, (1994)An Approach to Supporting Militia Collaboration in Disaster Relief Through a Digital Environment., , and . I4CS, volume 1404 of Communications in Computer and Information Science, page 41-56. Springer, (2021)