Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CarmentiS: A Co-Operative Approach Towards Situation Awareness and Early Warning for the Internet., , and . IMF, volume P-97 of LNI, page 55-66. GI, (2006)A Unifying Approach to Goal-Directed Evaluation., , and . SAIG, volume 2196 of Lecture Notes in Computer Science, page 108-125. Springer, (2001)Klassifikation von IT-Sicherheitsvorfällen., , and . Datenschutz und Datensicherheit, 40 (1): 17-21 (2015)Automated Implementation of Windows-related Security-Configuration Guides., , and . CoRR, (2022)Automatisierte Identifikation von sicherheitsrelevanten Konfigurationseinstellungen mittels NLP., , , and . Software Engineering, volume P-332 of LNI, page 115-116. Gesellschaft für Informatik e.V., (2023)Automated Implementation of Windows-related Security-Configuration Guides., , and . ASE, page 598-610. IEEE, (2020)The Second Futamura Projection for Type-Directed Partial Evaluation., and . High. Order Symb. Comput., 14 (2-3): 173-219 (2001)Partial Evaluation of Pattern Matching in Strings, revisited., and . Nord. J. Comput., 8 (4): 437-462 (2001)Understanding Cloud Computing Vulnerabilities., , and . IEEE Secur. Priv., 9 (2): 50-57 (2011)Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules., , , and . AST, page 90-100. IEEE, (2023)