From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Normalisation of Log Messages for Intrusion Detection, , , , , и . Journal of Information Assurance and Security, 9 (3): 167-176 (сентября 2014)Environment and Automata II., и . Elektronische Informationsverarbeitung und Kybernetik, 18 (3): 115-139 (1982)Tele-Lab IT-Security - IT Sicherheitstraining im Internet, , и . D-A-C-H Security 2005, syssec Verlag, (2005)Why HTTPS Is Not Enough – Signature-Based Architecture for Trusted Content on the WWW, , и . n Proc. of the 2007 IEEE / WIC /ACM Int. Conf. on Web Intelligence (WI 2007), (2007)location=Silicon Valley, date=2007.Lightweight ad hoc assessment of practical programming skills at scale., , , , и . EDUCON, стр. 475-483. IEEE, (2014)Automatic detection of vulnerabilities for advanced security analytics., , и . APNOMS, стр. 471-474. IEEE, (2015)Measuring Expertise in Online Communities., , , , и . IEEE Intelligent Systems, 26 (1): 26-32 (2011)A Unifying Theoretical Background for Some BDD-based Data Structures, и . Universität Trier, Mathematik/Informatik, Forschungsbericht, (1994)Medizinische Bildverarbeitung - eine Übersicht, и . Universität Trier, Mathematik/Informatik, Forschungsbericht, (2004)A Note on Möbius Functions and the Communication Complexity of the Graph-Accessability-Problem. Universität Trier, Mathematik/Informatik, Forschungsbericht, (1992)