Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic-Ready Risk Management Concepts., , , , , and . CoRR, (2022)The Suitability of Graph Databases for Big Data Analysis: A Benchmark., , and . IoTBDS, page 213-220. SCITEPRESS, (2020)Process Mining Analysis of Puzzle-Based Cybersecurity Training., , and . ITiCSE (1), page 449-455. ACM, (2022)Evaluating Code Improvements in Software Quality Course Projects., , , and . EASE, page 160-169. ACM, (2022)A Cross-Domain Comparative Study of Big Data Architectures., , and . Int. J. Cooperative Inf. Syst., 29 (4): 2030001:1-2030001:27 (2020)Addressing insider attacks via forensic-ready risk management., , , , , and . J. Inf. Secur. Appl., (March 2023)Identification of Unintentional Perpetrator Attack Vectors using Simulation Game: A Case Study., , and . FedCSIS, volume 25 of Annals of Computer Science and Information Systems, page 349-356. (2021)Comparative Analysis of Supersonic Flow in Atmospheric and Low Pressure in the Region of Shock Waves Creation for Electron Microscopy., , , , , , , and . Sensors, 23 (24): 9765 (December 2023)CopAS: A Big Data Forensic Analytics System., , , , , and . CoRR, (2022)Scenarios for Process-Aware Insider Attack Detection in Manufacturing., , , , and . ARES, page 89:1-89:10. ACM, (2022)