Author of the publication

Multi-Tenancy-Capable Correlation of Security Events in 5G Networks.

, , and . NFV-SDN, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Matrix for Systematic Selection of Authentication Mechanisms in Challenging Healthcare related Environments., , , and . SAT-CPS@CODASPY, page 88-97. ACM, (2021)An Intermediary Protocol Representation to Aid in Avionics Network Development., , and . NOMS, page 1-5. IEEE, (2023)TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks., , , and . ARES, page 67:1-67:10. ACM, (2023)Effiziente Bearbeitung von Abuse-Beschwerden., , and . IMF, volume P-39 of LNI, page 13-25. GI, (2003)Herausforderungen und Anforderungen für ein organisationsweites Notfall-Passwortmanagement., , and . DFN-Forum Kommunikationstechnologien, volume P-231 of LNI, page 109-119. GI, (2014)Policy-gesteuerte Datenfreigaben und Trust Management im organisationsübergreifenden Identitäts-Management., and . Sicherheit, volume P-77 of LNI, page 91-102. GI, (2006)Enabling the JSON Web Signature Format to Support Complex and Identity-Oriented Non-web Processes., and . I4CS, volume 1876 of Communications in Computer and Information Science, page 29-47. Springer, (2023)An Inter-Organizational Configuration Management Database as Key Enabler for Future IT Service Management Processes, and . Collaboration and the Knowledge Economy: Issues, Applications, Case Studies, IOS Press, Amsterdam, (2008)Towards an Improved Taxonomy of Attacks related to Digital Identities and Identity Management Systems., and . CoRR, (2024)TaxIdMA: Towards a Taxonomy for Attacks related to Identities., and . CoRR, (2023)