Author of the publication

Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.

, , , , , , and . IEEE Trans. Comput. Social Systems, 4 (3): 65-79 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudMAC: towards software defined WLANs., , , , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 16 (4): 42-45 (2012)W2 - Adaptive and Intelligent Web-Based Education Systems.. Intelligent Tutoring Systems, volume 1839 of Lecture Notes in Computer Science, page 663. Springer, (2000)Rückblick auf die AI-ED 99.. Künstliche Intell., 13 (4): 46 (1999)CloudMAC: towards software defined WLANs, , , , , and . SIGMOBILE Mob. Comput. Commun. Rev., 16 (4): 42--45 (February 2013)Ontologiebasierte Wissensvermittlung für intelligente Lehr- und Lernumgebungen.. Künstliche Intell., 17 (2): 48- (2003)On Restaurants and Requirements: How Requirements Engineering may be Facilitated by Scripts.. KESE, volume 425 of CEUR Workshop Proceedings, CEUR-WS.org, (2008)Optimization of WLAN associations considering handover costs., , , , and . EURASIP J. Wireless Comm. and Networking, (2012)Playout-buffer aware hand-off control for wireless video streaming., , , , , , , and . GLOBECOM, page 5237-5242. IEEE, (2012)CloudMAC - An OpenFlow based architecture for 802.11 MAC layer processing in the cloud., , , , , and . GLOBECOM Workshops, page 186-191. IEEE, (2012)Teleteaching - Serviceteil.. Künstliche Intell., 13 (4): 50 (1999)