From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tube Map Visualization: Evaluation of a Novel Knowledge Visualization Application for the Transfer of Knowledge in Long-Term Projects., и . J. Univers. Comput. Sci., 11 (4): 473-494 (2005)Interfaces for Knowledge-Base Builders' Control Knowledge and Application-Specific Procedures., , , , и . IBM J. Res. Dev., 30 (1): 29-38 (1986)Track Down Identity Leaks using Threat Intelligence., , , , и . ICISSP, стр. 96-106. SCITEPRESS, (2020)Beyond Excel and Powerpoint: Knowledge Maps for the Transfer and Creation of Knowledge in Organizations., , , , и . IV, стр. 76-81. IEEE Computer Society, (2005)If You've Seen One, You've Seen Them All: Leveraging AST Clustering Using MCL to Mimic Expertise to Detect Software Supply Chain Attacks., , , и . CoRR, (2020)Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces., , , , и . SADFE, стр. 22-31. IEEE, (2020)Automated Identification of Vulnerable Devices in Networks using Traffic Data and Deep Learning., , , , и . CoRR, (2021)Effiziente Analyseverfahren für Intrusion-Detection-Systeme., и . Sicherheit, том P-62 из LNI, стр. 209-220. GI, (2005)Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet., , , , и . Sicherheit, том P-228 из LNI, стр. 407-418. GI, (2014)Vereinfachung der Signaturentwicklung durch Wiederverwendung., , и . Sicherheit, том P-77 из LNI, стр. 201-212. GI, (2006)