Author of the publication

Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks.

, , , , and . DFN-Forum Kommunikationstechnologien, volume P-149 of LNI, page 115-124. GI, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating advanced functions on network processors: experience and perspectives., , , , , , , , and . IEEE Netw., 17 (4): 46-54 (2003)Consistent Deniable Lying: Privacy in Mobile Social Networks, and . (2008)SIEGE: Service-independent enterprise-grade protection against password scans., and . DFN-Forum Kommunikationstechnologien, volume P-231 of LNI, page 121-130. GI, (2014)HomeCA: Scalable Secure IoT Network Integration., , , and . GI-Jahrestagung, volume P-294 of LNI, page 167-180. GI, (2019)I seek for knowledge: Exploiting social properties in Mobile Ad Hoc Networks., , and . Wireless Days, page 1-5. IEEE, (2008)Polybius: Secure Web Single-Sign-On for Legacy Applications., and . DFN-Forum Kommunikationstechnologien, volume P-187 of LNI, page 91-100. GI, (2011)Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks., , , , and . DFN-Forum Kommunikationstechnologien, volume P-149 of LNI, page 115-124. GI, (2009)A Legal and Technical Perspective on Secure Cloud Storage., , , and . DFN-Forum Kommunikationstechnologien, volume P-203 of LNI, page 63-72. GI, (2012)bwIDM: Föderieren auch nicht-webbasierter Dienste auf Basis von SAML., , , , and . DFN-Forum Kommunikationstechnologien, volume P-203 of LNI, page 119-128. GI, (2012)Fast and Scalable Layer Four Switching., , , and . SIGCOMM, page 191-202. ACM, (1998)