Author of the publication

Exploration of the Potential of Process Mining for Intrusion Detection in Smart Metering.

, , , , , , and . ICISSP, page 38-46. SciTePress, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of the Performance of AdaBoost.M2 for the Simulated Digit-Recognition-Example., and . ECML, volume 2167 of Lecture Notes in Computer Science, page 109-120. Springer, (2001)Comparison of approaches for intrusion detection in substations using the IEC 60870-5-104 protocol., , and . Energy Inform., (2020)AggFT: Low-Cost Fault-Tolerant Smart Meter Aggregation with Proven Termination and Privacy., , and . CoRR, (2021)Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications., , , , and . ICISSP, page 23-32. SCITEPRESS, (2021)Differential privacy for real smart metering data., and . Comput. Sci. Res. Dev., 32 (1-2): 173-182 (2017)Towards interoperable local energy communities in Austria., , , , and . Elektrotech. Informationstechnik, 140 (5): 432-440 (August 2023)Quantifying identifiability to choose and audit ε in differentially private deep learning., , , , and . CoRR, (2021)Evaluation of clustering methods for finding dominant optical flow fields in crowded scenes., and . ICPR, page 1-4. IEEE Computer Society, (2008)Influence of data granularity on nonintrusive appliance load monitoring., and . IH&MMSec, page 147-151. ACM, (2014)Pool detection from smart metering data with convolutional neural networks., , , , and . Energy Inform., (2019)