Author of the publication

Adaptive and Intelligible Prioritization for Network Security Incidents.

, , , and . Cyber Security, page 1-8. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Triple Dissemination, Forward-Chaining, and Load Balancing in DHT based RDF stores, , , and . LNCS, (2007)Grappa - die Spinne im Netz der Autobewerter und Lernmanagementsysteme., , and . DeLFI, volume P-247 of LNI, page 169-181. GI, (2015)Adaptive and Intelligible Prioritization for Network Security Incidents., , , and . Cyber Security, page 1-8. IEEE, (2019)Enhancing Feedback Generation for Autograded SQL Statements to Improve Student Learning., and . ITiCSE (1), ACM, (2024)Detecting Attacks in Network Traffic Using Normality Models: The Cellwise Estimator., , , , , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 265-282. Springer, (2021)On the Evaluation and Deployment of Machine Learning Approaches for Intrusion Detection., , and . IEEE BigData, page 4594-4603. IEEE, (2020)Evaluation automatisierter Programmbewertung bei der Vermittlung der Sprachen Java und SQL mit den Gradern äSQLg" und "Graja" aus studentischer Perspektive.., , , , , and . DeLFI, volume P-218 of LNI, page 233-238. GI, (2013)Moving Hadoop to the Cloud for Big Data Analytics., , , and . DB&IS (Selected Papers), volume 315 of Frontiers in Artificial Intelligence and Applications, page 195-209. IOS Press, (2018)A Feedback-Based Evaluation Approach for the Continuous Adjustment of Incident Prioritization., , , and . ICDIS, page 176-183. IEEE, (2018)Design and Evaluation of an Approach for Feedback-Based Adaptation of Incident Prioritization., , , and . ICDIS, page 28-35. IEEE, (2019)