Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy., , , , , , and . IEEE Internet Comput., 15 (3): 43-50 (2011)An Event-based Data Model for Granular Information Flow Tracking., , , , and . TaPP, USENIX Association, (2020)Using self-diagnosis to adapt organizational structures., , and . Agents, page 529-536. ACM, (2001)Expectation Failure as a Basis for Agent-Based Model Diagnosis and Mixed Initiative Model Adaptation during Anomalous Plan Execution., , , and . IJCAI, page 489-494. (2007)Dynamic Explanation of Bayesian Networks with Abductive Bayes Factor Qualitative Propagation and Entropy-Based Qualitative Explanation., , , , , and . FUSION, page 1-9. IEEE, (2021)Semantic Links Across Distributed Heterogeneous Data., , , , , , , and . DCAI, volume 1003 of Advances in Intelligent Systems and Computing, page 107-115. Springer, (2019)Managed Execution Environment as a Moving-Target Defense Infrastructure., , , and . IEEE Secur. Priv., 12 (2): 51-59 (2014)Automated Self-Adaptation for Cyber-Defense - Pushing Adaptive Perimeter Protection Inward., , , , , , , , and . SASO Workshops, page 47-52. IEEE Computer Society, (2013)Understanding Rulelog Computations in Silk., , , , , , , , and . CoRR, (2013)Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks., , , , and . ARES, page 80-89. IEEE Computer Society, (2015)