Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users., , , , , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 396-414. Springer, (2015)Adaptive Verifiable Training Using Pairwise Class Similarity., , , , and . CoRR, (2020)Detecting Insider Information Theft Using Features from File Access Logs., , , , , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 383-400. Springer, (2014)Generating Balanced Classifier-Independent Training Samples from Unlabeled Data., , , and . PAKDD (1), volume 7301 of Lecture Notes in Computer Science, page 266-281. Springer, (2012)Environmental Management Systems and Information Management - Strategic-Systematical Integration of Green Value Added.. ITEE, page 251-260. Springer, (2007)Supply Chain Management goes RoHS - The Need to Include Compliance Related Information in the Supply Chain Information Flow.. ITEE, page 12-22. Shaker Verlag, (2005)Adversaries' Holy Grail: access control analytics., , and . BADGERS@EuroSys, page 54-61. ACM, (2011)Trading in risk: using markets to improve access control., , and . NSPW, page 107-125. ACM, (2008)Tri-Modularization of Firewall Policies., , , , , , and . SACMAT, page 37-48. ACM, (2016)Slicing: A New Approach to Privacy Preserving Data Publishing, , , and . CoRR, (2009)