Author of the publication

Replicable Security Monitoring: Visualizing Time-Variant Graphs of Network Metadata.

, , , , , , and . ED/GViP@Diagrams, volume 1244 of CEUR Workshop Proceedings, page 32-41. CEUR-WS.org, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System., , and . ICSI (2), volume 9141 of Lecture Notes in Computer Science, page 439-453. Springer, (2015)Integrating visual analysis of network security and management of detection system configurations., , and . IDAACS, page 1020-1025. IEEE, (2017)Interoperable Remote Attestation for VPN Environments - (Work in Progress)., , , , and . INTRUST, volume 6802 of Lecture Notes in Computer Science, page 302-315. Springer, (2010)Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources., , , , , , and . GraMSec@CSF, volume 9390 of Lecture Notes in Computer Science, page 18-34. Springer, (2015)SIEM approach for a higher level of IT security in enterprise networks., , , , and . IDAACS, page 322-327. IEEE, (2015)Towards Permission-Based Attestation for the Android Platform - (Short Paper)., , , , , , and . TRUST, volume 6740 of Lecture Notes in Computer Science, page 108-115. Springer, (2011)On Remote Attestation for Google Chrome OS., , , , and . NBiS, page 376-383. IEEE Computer Society, (2012)TCADS: Trustworthy, Context-Related Anomaly Detection for Smartphones., , , , and . NBiS, page 247-254. IEEE Computer Society, (2012)Replicable Security Monitoring: Visualizing Time-Variant Graphs of Network Metadata., , , , , , and . ED/GViP@Diagrams, volume 1244 of CEUR Workshop Proceedings, page 32-41. CEUR-WS.org, (2014)