Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent monitoring with background knowledge., , , , and . IDAACS, page 165-170. IEEE, (2015)Unternehmensnetzwerke schützen und dennoch mobiles Potential nutzen - Mögliche Bedrohungen und Sicherheitsansätze.. Datenschutz und Datensicherheit, 36 (3): 169-174 (2012)Transformation between XML and CBOR for network load reduction., , and . IDAACS-SWS, page 106-111. IEEE, (2016)Quality-of-Service (QoS) in Heterogeneous Networks: CLIP, LANE and MPOA Performance Test.. NETWORKING, volume 1815 of Lecture Notes in Computer Science, page 883-894. Springer, (2000)Sicherheitskonzept zum Schutz der Gateway-Integrität in Smart Grids., , , and . Sicherheit, volume P-228 of LNI, page 137-148. GI, (2014)A SIEM Architecture for Multidimensional Anomaly Detection., , , and . IDAACS, page 136-142. IEEE, (2021)Mehrseitige, barrierefreie Sicherheit intelligenter Messsysteme., , and . Datenschutz und Datensicherheit, 38 (8): 536-544 (2014)SIEM approach for a higher level of IT security in enterprise networks., , , , and . IDAACS, page 322-327. IEEE, (2015)Design and implementation of virtual security appliances (VSA) for SME., , , and . IDAACS, page 30-35. IEEE, (2013)Service Discovery Integrated Network Platform., , and . INTERWORKING, volume 247 of IFIP Conference Proceedings, page 79-90. Kluwer, (2002)