Author of the publication

Interface for Navigation and Database - Querying via WWW.

, , , and . ISI, volume 34 of Schriften zur Informationswissenschaft, page 273-282. Hochschulverband für Informationswissenschaft, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

6TiSCH centralized scheduling: When SDN meet IoT., , and . CSCN, page 42-47. IEEE, (2015)Bandwidth overhead in WiFi mesh networks for providing fair Internet access., and . PM2HW2N, page 40-47. ACM, (2006)DNSSM: A large scale passive DNS security monitoring framework., , , , , , and . NOMS, page 988-993. IEEE, (2012)The Smart Data Server: A New Kind of Middle-Tier., , , and . IMSA, page 361-365. IASTED/ACTA Press, (1999)Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems., , , , , , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 61-80. Springer, (2009)Mining NetFlow Records for Critical Network Activities., , , and . AIMS, volume 6155 of Lecture Notes in Computer Science, page 135-146. Springer, (2010)Large Scale DNS Analysis., and . AIMS, volume 7279 of Lecture Notes in Computer Science, page 151-154. Springer, (2012)Symbolic Execution of Satellite Control Procedures in Graph-Transformation-Based EMF Ecosystems., , and . MoDeVVa@MoDELS, volume 1069 of CEUR Workshop Proceedings, page 61-66. CEUR-WS.org, (2013)Advanced Studies on Link Proposals and Knowledge Retrieval of Hypertexts with CBR., , , , and . EC-Web, volume 1875 of Lecture Notes in Computer Science, page 369-378. Springer, (2000)Machine Learning for Reliable Network Attack Detection in SCADA Systems., , , and . TrustCom/BigDataSE, page 633-638. IEEE, (2018)