Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Anonymity in Data-Driven Biomedical Science., , , , and . Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, volume 8401 of Lecture Notes in Computer Science, Springer, (2014)Analysing supplier locations using social and semantic data: a case study based on indonesian factories., , , and . I-KNOW, page 21:1-21:8. ACM, (2014)Exploiting Linked Spatial Data and Granularity Transformations., and . GIO@GIScience, volume 1273 of CEUR Workshop Proceedings, page 15-22. CEUR-WS.org, (2014)IPv6 Security: Attacks and Countermeasures in a Nutshell., , , , and . WOOT, USENIX Association, (2014)IPv6 Security, , , , and . page 227-254. Magdeburger Institut für Sicherheitsforschung, Magdeburg, (2015)Social engineering attacks on the knowledge worker., , , and . SIN, page 28-35. ACM, (2013)Qualitative Spatial Configuration Search., , and . Spatial Cognition & Computation, 16 (4): 272-300 (2016)Visualisation of User-Generated Event Information: Towards Geospatial Situation Awareness Using Hierarchical Granularity Levels., , , and . SSA-SMILE@ESWC, volume 1329 of CEUR Workshop Proceedings, page 43-54. CEUR-WS.org, (2014)Towards Security-Enhanced and Privacy-Preserving Mashup Compositions., , , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 286-299. Springer, (2013)Advanced social engineering attacks., , , and . J. Inf. Secur. Appl., (2015)