Author of the publication

Modeling and efficiently detecting security-critical sequences of actions.

, , , and . Future Gener. Comput. Syst., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical binary histograms for summarizing multi-dimensional data., , , and . SAC, page 598-603. ACM, (2005)Properties of Database Schemata with Functional Dependencies., , and . PODS, page 19-28. ACM, (1984)Number of Minimal Hypergraph Transversals and Complexity of IFM with Infrequency: High in Theory, but Often Not so Much in Practice!, and . AI*IA, volume 11946 of Lecture Notes in Computer Science, page 193-209. Springer, (2019)The Advanced Database Environment of the KIWI System., , , , , and . IEEE Data Eng. Bull., 10 (4): 20-27 (1987)Implementation of Recursive Queries for a Data Language Based on Pure Horn Logic., and . ICLP, page 104-135. MIT Press, (1987)Enhanced User Search Activity by Big Data Tools., , , and . SEBD, page 206-213. Matematicamente.it, (2016)CalcuList: a Functional Language Extended with Imperative Features., and . CoRR, (2018)Estimating Range Queries using Aggregate Data with Integrity Constraints: a Probabilistic Approach, , and . CoRR, (2005)Cybersecurity compliance analysis as a service: Requirements specification and application scenarios., , , , and . Concurr. Comput. Pract. Exp., (2018)Deterministic and Non-Deterministic Stable Models., and . J. Log. Comput., 7 (5): 555-579 (1997)