Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach to the transparent management instrumentation of distributed applications., , , and . NOMS, page 887-889. IEEE, (2002)Applying the Web ontology language to management information definitions., , and . IEEE Communications Magazine, 42 (7): 68-74 (2004)Semantic Management: Application of Ontologies for the Integration of Management Information Models., , , , and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 131-134. Kluwer, (2003)Multi-domain fault management architecture based on a shared ontology-based knowledge plane., , , , and . CNSM, page 493-498. IEEE, (2010)A Flexible Architecture for Service Management in the Cloud., , , and . IEEE Trans. Network and Service Management, 11 (1): 116-125 (2014)Real-Time Multistep Attack Prediction Based on Hidden Markov Models., , and . IEEE Trans. Dependable Secur. Comput., 17 (1): 134-147 (2020)Ontology-Based Network Management: Study Cases and Lessons Learned., , , and . J. Netw. Syst. Manag., 17 (3): 234-254 (2009)Technology Independent Honeynet Description Language., , and . MODELSWARD, page 303-311. SciTePress, (2015)Measuring Quality of Experience of Internet Access over HSDPA., , , and . MWCN/PWC, volume 284 of IFIP, page 225-234. Springer, (2008)Definition of response metrics for an ontology-based Automated Intrusion Response Systems., , , and . Comput. Electr. Eng., 38 (5): 1102-1114 (2012)