Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agent-Based Decision Support: A Case-Study on DSL Access Networks., , , , and . IAAI, AAAI, (2010)A Cooperative AIS Framework for Intrusion Detection., , , , and . ICC, page 1409-1416. IEEE, (2007)From simulation to emulation - an integrated approach for network security evaluation., , , , and . GI-Jahrestagung, volume P-192 of LNI, page 117. GI, (2011)Static Analysis of Executables for Collaborative Malware Detection on Android., , , , , , , and . ICC, page 1-5. IEEE, (2009)Collaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities and Countermeasures., , and . CollSec, USENIX Association, (2010)Optimization and early-warning in DSL access networks based on simulation., , , , and . SimuTools, page 68. ICST/ACM, (2010)Design and modeling of collaboration architecture for security., , and . CTS, page 330-341. IEEE Computer Society, (2009)Framework for evaluating collaborative intrusion detection systems., , , , and . GI-Jahrestagung, volume P-192 of LNI, page 116. GI, (2011)Agent-based network security simulation., , , , , and . AAMAS, page 1325-1326. IFAAMAS, (2011)Decentralized Detector Generation in Cooperative Intrusion Detection Systems., , , , , and . SSS, volume 4838 of Lecture Notes in Computer Science, page 37-51. Springer, (2007)