Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SCOOT: An Object-Oriented Toolkit for Multimedia Collaboration., , , , and . ACM Multimedia, page 41-49. ACM Press, (1994)BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation., , , , and . USENIX Security Symposium, USENIX Association, (2007)Extending WWW For Synchronous Collaboration, , and . Proceedings, 2th World Wide Web Conference: Mosaic and the Web, NCSA, (1994)CECED: A System for Informal Multimedia Collaboration., , , and . ACM Multimedia, page 437-445. ACM Press, (1993)Securing the Software Defined Network Control Layer., , , , and . NDSS, The Internet Society, (2015)Process history capture in a concurrent engineering collaboration environment., , , , , and . WETICE, page 120-127. IEEE, (1993)A Security-Mode for Carrier-Grade SDN Controllers., , , , , , , and . ACSAC, page 461-473. ACM, (2017)A Mission-Impact-Based Approach to INFOSEC Alarm Correlation., , and . RAID, volume 2516 of Lecture Notes in Computer Science, page 95-114. Springer, (2002)Scalable visualization of propagating internet phenomena., and . VizSEC, page 124-127. ACM, (2004)Effective Monitoring of a Survivable Distributed Networked Information System., , , , and . ARES, page 1306-1312. IEEE Computer Society, (2008)