Author of the publication

Experiences on Designing an Integral Intrusion Detection System.

, and . DEXA Workshops, page 675-679. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prospects on Software-Agents-Based Applications in Embedded Systems.. WISES, page 77-83. Vienna University of Technology, (2003)Idea: Opcode-Sequence-Based Malware Detection., , , , , , and . ESSoS, volume 5965 of Lecture Notes in Computer Science, page 35-43. Springer, (2010)Enhanced Foundry Production Control., , , , and . DEXA (1), volume 6261 of Lecture Notes in Computer Science, page 213-220. Springer, (2010)Combinatorial Markets for Efficient Energy Management., and . IAT, page 626-632. IEEE Computer Society, (2005)Optimal combinatorial electricity markets., and . Web Intell. Agent Syst., 6 (2): 123-135 (2008)Evaluating Combined Load Forecasting in Large Power Systems and Smart Grids., , and . IEEE Trans. Ind. Informatics, 9 (3): 1570-1577 (2013)Smart buildings and the smart grid., , , and . IECON, page 113-117. IEEE, (2013)Efficient failure-free foundry production., , and . ETFA, page 237-240. IEEE, (2008)Network Planning of a VoIP-cable PBX - The Use of Data Profiling Techniques for an Efficient Network Planning., , and . DCNET/OPTICS, page 85-88. SciTePress, (2011)Automatic Behaviour-based Analysis and Classification System for Malware Detection., , , , and . ICEIS (2), page 395-399. SciTePress, (2010)