Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Cyber Threat Hunting: A Visual Approach with the Forensic Visualization Toolkit., , , and . IEEE Big Data, page 3035-3042. IEEE, (2023)PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange., , , , , , , , , and 8 other author(s). CoRR, (2023)Monitoring and Securing Execution at the OS Level.. Braunschweig University of Technology, Germany, (2023)MMU-based Access Control for Libraries., and . SECRYPT, page 686-691. SCITEPRESS, (2021)Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System., , and . VEHITS, page 148-158. SciTePress, (2019)Intrusion Response System for Vehicles: Challenges and Vision., , and . SMARTGREENS/VEHITS (Selected Papers), volume 1217 of Communications in Computer and Information Science, page 321-341. Springer, (2019)Software System Exploration Using Library Call Analysis., and . MSTEC, volume 12512 of Lecture Notes in Computer Science, page 125-139. Springer, (2020)Efficient Monitoring of Library Call Invocation., and . IoTSMS, page 387-392. IEEE, (2019)PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange., , , , , , , , , and 8 other author(s). CSR, page 538-545. IEEE, (2023)Creating a Security Enforcement Environment for a Vehicular Platform., , , and . CSCN, page 278-283. IEEE, (2023)