Author of the publication

Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy.

, , , , , , and . HASE, page 228-235. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the educated selection of unsupervised algorithms via attacks and anomaly classes., , , and . J. Inf. Secur. Appl., (2020)Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach., , , , , , and . ACM Trans. Cyber Phys. Syst., 3 (2): 18:1-18:24 (2019)Spoofing Detectability as a Property of Biometric Characteristics., , , , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 92-105. CEUR-WS.org, (2021)Practical Experience Report: Implementation, Verification and Validation of a Safe and Secure Communication Protocol for the Railway Domain., , , , , and . LADC, page 1-6. IEEE, (2019)Towards a General Model for Intrusion Detection: An Exploratory Study., , and . PKDD/ECML Workshops (2), volume 1753 of Communications in Computer and Information Science, page 186-201. Springer, (2022)Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection., , , and . Comput. Secur., (April 2023)A Tool for Evolutionary Threat Analysis of Smart Grids., , and . SmartGIFT, volume 203 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 205-211. Springer, (2017)Context-Awareness to Improve Anomaly Detection in Dynamic Service Oriented Architectures., , and . SAFECOMP, volume 9922 of Lecture Notes in Computer Science, page 145-158. Springer, (2016)Ontological Modelling for Archaeological Data., , and . VAST, page 211-218. Eurographics Association, (2006)On the Efficacy of Metrics to Describe Adversarial Attacks., , and . CoRR, (2023)