From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Normalisation of Log Messages for Intrusion Detection, , , , , и . Journal of Information Assurance and Security, 9 (3): 167-176 (сентября 2014)Measuring Expertise in Online Communities., , , , и . IEEE Intelligent Systems, 26 (1): 26-32 (2011)Automatic detection of vulnerabilities for advanced security analytics., , и . APNOMS, стр. 471-474. IEEE, (2015)Lightweight ad hoc assessment of practical programming skills at scale., , , , и . EDUCON, стр. 475-483. IEEE, (2014)Tele-Lab IT-Security - IT Sicherheitstraining im Internet, , и . D-A-C-H Security 2005, syssec Verlag, (2005)Why HTTPS Is Not Enough – Signature-Based Architecture for Trusted Content on the WWW, , и . n Proc. of the 2007 IEEE / WIC /ACM Int. Conf. on Web Intelligence (WI 2007), (2007)location=Silicon Valley, date=2007.Neue Kooperations- und Finazierungsmodelle in der Hochschullehre, , , , , , , , , и 3 other автор(ы). Hochschulforum Digitalisierung, Berlin, (2015)Online assessment for hands-on cyber security training in a virtual lab., и . EDUCON, стр. 1-10. IEEE, (2012)Collaboration and Teamwork on a MOOC Platform: A Toolset., и . L@S, стр. 165-168. ACM, (2017)Signed URL for an Isolated Web Server in a Virtual Laboratory., , и . ICETC, стр. 218-222. ACM, (2017)