Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Crash Frequency Analysis to Identify Error-Prone Software Technologies in Multi-System Monitoring., , , and . QRS, page 183-190. IEEE, (2018)Using Multi-System Monitoring Time Series to Predict Performance Events., , , , and . Softwaretechnik-Trends, 39 (3): 55-57 (2019)A Framework for Preprocessing Multivariate, Topology-Aware Time Series and Event Data in a Multi-System Environment., , , , and . HASE, page 115-122. IEEE, (2019)Benchmarking Function Hook Latency in Cloud-Native Environments., , , and . CoRR, (2023)Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires., , and . EICC, page 11:1-11:2. ACM, (2020)Can we Predict Performance Events with Time Series Data from Monitoring Multiple Systems?, , , and . ICPE Companion, page 9-12. ACM, (2019)An Approach for Ranking Feature-based Clustering Methods and its Application in Multi-System Infrastructure Monitoring., , , , , and . SEAA, page 178-187. IEEE, (2021)Application Layer Cyber Deception Without Developer Interaction., and . EuroS&P Workshops, page 416-429. IEEE, (2024)