Author of the publication

Replicable Security Monitoring: Visualizing Time-Variant Graphs of Network Metadata.

, , , , , , and . ED/GViP@Diagrams, volume 1244 of CEUR Workshop Proceedings, page 32-41. CEUR-WS.org, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A DRM Architecture for Securing User Privacy by Design., , and . WOSIS, page 188-195. INSTICC Press, (2007)Prototypische Integration automatisierter Programmbewertung in das LMS Moodle., , , , , , , , and . ABP, volume 1067 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)A Feedback-Based Evaluation Approach for the Continuous Adjustment of Incident Prioritization., , , and . ICDIS, page 176-183. IEEE, (2018)Automated Detection and Monitoring of Advanced Data Quality Rules., , and . DEXA (1), volume 11706 of Lecture Notes in Computer Science, page 238-247. Springer, (2019)Classification of Geographic Web Services for Building an Efficient Geographic Information System Offering Profitable Value Added Services., and . JDIM, 6 (5): 396-404 (2008)A SIEM Architecture for Multidimensional Anomaly Detection., , , and . IDAACS, page 136-142. IEEE, (2021)New Concepts in Database System Education: Experiences and Ideas (Abstract Only).. SIGCSE, page 698. ACM, (2015)No news in database education by all accounts: seriously? (abstract only).. SIGCSE, page 728-729. ACM, (2014)Evaluation automatisierter Programmbewertung bei der Vermittlung der Sprachen Java und SQL mit den Gradern äSQLg" und "Graja" aus studentischer Perspektive.., , , , , and . DeLFI, volume P-218 of LNI, page 233-238. GI, (2013)Lessons Learned in 10 years of Distributed Systems Capstones., and . SIGCSE, page 1265. ACM, (2019)