Author of the publication

An agent-based framework for decentralized reconstruction of attack paths.

, , , , , and . DFN-Forum Kommunikationstechnologien, volume P-243 of LNI, page 37-46. GI, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an Accounting System for Multi-Provider Grid Environments., , , and . Integrated Network Management, page 60-69. IEEE, (2007)Disequilibrium: Tor's Exit Node Selection under the Stereoscope., , and . TrustCom/BigDataSE/ISPA (1), page 942-949. IEEE, (2015)On the evaluation of military simulations: towards a taxonomy of assessment criteria., , , , , and . MilCIS, page 1-7. IEEE, (2015)A Revised Attack Taxonomy for a New Generation of Smart Attacks., , and . Computer and Information Science, 7 (3): 18-30 (2014)On the Evaluation of Military Simulations: Towards A Taxonomy of Assessment Criteria., , , , , and . CoRR, (2020)Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis., , , and . IEEE Syst. J., 10 (4): 1338-1349 (2016)Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen., , and . DFN-Forum Kommunikationstechnologien, volume P-231 of LNI, page 131-140. GI, (2014)Privacy-aware intrusion detection in high-speed backbone networks - design and prototypical implementation of a multi-layered NIDS., , and . DFN-Forum Kommunikationstechnologien, volume P-257 of LNI, page 77-86. GI, (2016)Architecture for evaluating and correlating NIDS in real - World networks., and . CyCon, page 1-20. IEEE, (2013)Silent Battles: Towards Unmasking Hidden Cyber Attack., and . CyCon, page 1-20. IEEE, (2019)