Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A SIEM Architecture for Advanced Anomaly Detection., , , and . Open J. Big Data, 6 (1): 26-42 (2022)APT Detection: An Incremental Correlation Approach., , , , , and . IDAACS, page 151-156. IEEE, (2023)A SIEM Architecture for Multidimensional Anomaly Detection., , , and . IDAACS, page 136-142. IEEE, (2021)Automated Detection and Monitoring of Advanced Data Quality Rules., , and . DEXA (1), volume 11706 of Lecture Notes in Computer Science, page 238-247. Springer, (2019)A DSL for Automated Data Quality Monitoring., , and . DEXA (1), volume 12391 of Lecture Notes in Computer Science, page 89-105. Springer, (2020)A Feedback-Based Evaluation Approach for the Continuous Adjustment of Incident Prioritization., , , and . ICDIS, page 176-183. IEEE, (2018)Design and Evaluation of an Approach for Feedback-Based Adaptation of Incident Prioritization., , , and . ICDIS, page 28-35. IEEE, (2019)OraGiST - How to Make User-Defined Indexing Become Usable and Useful., and . BTW, volume P-26 of LNI, page 324-333. GI, (2003)Die Evaluation generischer Einbettung automatisierter Programmbewertung am Beispiel von Moodle und aSQLg., , , , , , , and . DeLFI, volume P-233 of LNI, page 301-304. GI, (2014)Securing SOAP Web Services for Mobile Devices on Different Platforms., and . MMS, volume P-185 of LNI, page 25-38. GI, (2011)