Author of the publication

Big Log Data Stream Processing: Adapting an Anomaly Detection Technique.

, and . DEXA (2), volume 11030 of Lecture Notes in Computer Science, page 159-166. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Ledger Approach to Digital Twin Secure Data Sharing., , and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 281-300. Springer, (2019)Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity., , , and . J. Cybersecur. Priv., 1 (3): 519-538 (September 2021)Enhancing Industrial Control System Forensics Using Replication-Based Digital Twins., , and . IFIP Int. Conf. Digital Forensics, volume 612 of IFIP Advances in Information and Communication Technology, page 21-38. Springer, (2021)EtherTwin: Blockchain-based Secure Digital Twin Information Management., , , and . Inf. Process. Manag., 58 (1): 102425 (2021)Bürgerzufriedenheit durch E-Government? - Eine Analyse auf Basis des Kano-Modells., , , and . MKWI, page 505-516. Universitätsverlag Ilmenau, (2016)Employing Digital Twins for Security-by-Design System Testing., , , and . SAT-CPS@CODASPY, page 97-106. ACM, (2022)Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence., , and . COMPSAC, page 789-797. IEEE, (2022)Integrating digital twin security simulations in the security operations center., , and . ARES, page 18:1-18:9. ACM, (2020)Big Log Data Stream Processing: Adapting an Anomaly Detection Technique., and . DEXA (2), volume 11030 of Lecture Notes in Computer Science, page 159-166. Springer, (2018)Unleashing the Digital Twin's Potential for ICS Security., and . IEEE Secur. Priv., 18 (4): 20-27 (2020)