Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces., , , , and . SADFE, page 22-31. IEEE, (2020)If You've Seen One, You've Seen Them All: Leveraging AST Clustering Using MCL to Mimic Expertise to Detect Software Supply Chain Attacks., , , and . CoRR, (2020)Automated Identification of Vulnerable Devices in Networks using Traffic Data and Deep Learning., , , , and . CoRR, (2021)On Rewriting, Answering Queries in OBDA Systems for Big Data (Short Paper)., , , , , , and . OWLED, volume 1080 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)Effiziente Analyseverfahren für Intrusion-Detection-Systeme., and . Sicherheit, volume P-62 of LNI, page 209-220. GI, (2005)Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet., , , , and . Sicherheit, volume P-228 of LNI, page 407-418. GI, (2014)Vereinfachung der Signaturentwicklung durch Wiederverwendung., , and . Sicherheit, volume P-77 of LNI, page 201-212. GI, (2006)High-Efficient Intrusion Detection Infrastructure., , and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-44 of LNI, page 217-232. GI, (2003)Track Down Identity Leaks using Threat Intelligence., , , , and . ICISSP, page 96-106. SCITEPRESS, (2020)Interfaces for Knowledge-Base Builders' Control Knowledge and Application-Specific Procedures., , , , and . IBM J. Res. Dev., 30 (1): 29-38 (1986)