Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aspect-Based Attack Detection in Large-Scale Networks., , , and . RAID, volume 6307 of Lecture Notes in Computer Science, page 488-489. Springer, (2010)A performance benchmark for NetFlow data analysis on distributed stream processing systems., , , and . NOMS, page 919-924. IEEE, (2016)Enhancing Network Security: Host Trustworthiness Estimation., and . AIMS, volume 8508 of Lecture Notes in Computer Science, page 63-68. Springer, (2014)HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting., , , and . EURASIP J. Information Security, (2016)Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement., , and . EUNICE, volume 8115 of Lecture Notes in Computer Science, page 136-147. Springer, (2013)Passive operating system fingerprinting revisited: Evaluation and current challenges., , , , and . Comput. Networks, (June 2023)Applications of educational data mining and learning analytics on data from cybersecurity training., , , and . Educ. Inf. Technol., 27 (9): 12179-12212 (2022)Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach., , , , and . ACM Trans. Manag. Inf. Syst., 11 (4): 19:1-19:16 (2020)Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises., , , , , , , and . CoRR, (2021)Reinforcing Cybersecurity Hands-on Training With Adaptive Learning., , , and . CoRR, (2022)