Author of the publication

Open Access und das Urheberrecht – Eine komplizierte Beziehung? Tagungsbericht zu dem gleichnamigen Symposion des Instituts für Urheber- und Medienrecht am 10.2.2023 in München

. Zeitschrift für Urheber- und Medienrecht (ZUM), 67 (6): 425-427 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring and Detecting Fast-Flux Service Networks., , , and . NDSS, The Internet Society, (2008)Simulation of Built-in PHP Features for Precise Static Code Analysis., and . NDSS, The Internet Society, (2014)Virtual Honeypots - From Botnet Tracking to Intrusion Detection., and . Addison-Wesley, (2008)Tracking DDoS Attacks: Insights into the Business of Disrupting the Web., and . LEET, USENIX Association, (2012)Automatic analysis of malware behavior using machine learning., , , and . Journal of Computer Security, 19 (4): 639-668 (2011)Large-Scale Analysis of Infrastructure-Leaking DNS Servers., , and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 353-373. Springer, (2019)A Pointillist Approach for Comparing Honeypots., and . DIMVA, volume 3548 of Lecture Notes in Computer Science, page 51-68. Springer, (2005)SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks., and . RAID, volume 9404 of Lecture Notes in Computer Science, page 339-356. Springer, (2015)Abusing Social Networks for Automated User Profiling., , , , , and . RAID, volume 6307 of Lecture Notes in Computer Science, page 422-441. Springer, (2010)A Small Leak will Sink a Great Ship: An Empirical Study of DLP Solutions., and . ISSE, page 354-364. Vieweg+Teubner, (2010)