Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Concept for Intelligent Collaborative Network Intrusion Detection, , , , , , and . ARCS 2017; 30th International Conference on Architecture of Computing Systems; Proceedings of, page 1--8. VDE, (2017)Deciphering ADFGVX Messages from World War I Eastern Front, , , and . Cryptologia, (August 2016)Requirements of Peer-to-Peer-based Massively Multiplayer Online Gaming, , , , , and . CCGRID '07: Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid, page 773--782. Washington, DC, USA, IEEE Computer Society, (2007)A novel method for securing critical infrastructures by detecting hidden flows of data., , , and . CNS, page 648-654. IEEE, (2015)Cryptanalysis of Enigma double indicators with hill climbing., , and . Cryptologia, 43 (4): 267-292 (2019)Informatik mit Recht., , , , and . GI-Jahrestagung, volume P-294 of LNI, page 293-294. GI, (2019)IT-Sicherheit, and . Wirtschaftsinformatik: Eine Einführung (Pearson Studium - Economic BWL), Wirtschaftsinformatik, chapter 15, Hallbergmoos, Germany: Pearson Deutschland GmbH, 3 edition, (Oktober 2015)Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages, , and . Cryptologia, (2015)Simulating Cheated Results Acceptance Rates for Gossip-Based Volunteer Computing, , and . International Journal of Mobile Network Design and Innovation, 7 (1): 56--67 (2017)"Löschen" im Internet. Ein neuer Ansatz für die technische Unterstützung des Rechts auf Löschen, , and . Datenschutz und Datensicherheit (DuD), 39 (1/2015): 31-36 (January 2015)