Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security in Process: Detecting Attacks in Industrial Process Data., , , and . CECC, page 5:1-5:6. ACM, (2019)Security in Process: Visually Supported Triage Analysis in Industrial Process Data., , , , and . CoRR, (2019)Deep Down the Rabbit Hole: On References in Networks of Decoy Elements., , , , and . CoRR, (2021)Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces., , , , , , , , and . Discov. Internet Things, 3 (1): 16 (December 2023)ARENA: A Data-Driven Radio Access Networks Analysis of Football Events., , , , , and . IEEE Trans. Netw. Serv. Manag., 17 (4): 2634-2647 (2020)Neural Network-Based Channel Prediction and Its Performance in Multi-Antenna Systems., and . VTC Fall, page 1-6. IEEE, (2018)A Comparison of Wireless Channel Predictors: Artificial Intelligence Versus Kalman Filter., and . ICC, page 1-6. IEEE, (2019)Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests., , and . SoftCOM, page 1-6. IEEE, (2019)CPU Resource Resilience in Wireless Mobile Communications: Design and Evaluation on COTS Virtual Distributed Platform., , , , and . BlackSeaCom, page 43-48. IEEE, (2022)Secure (S)Hell: Introducing an SSH Deception Proxy Framework., , , and . CyberSA, page 1-6. IEEE, (2021)