Author of the publication

Dlog: diagnosing router events with syslogs for anomaly detection.

, , and . The Journal of Supercomputing, 74 (2): 845-867 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. -Ing. Thomas Maier University of Stuttgart

Tactile information coding for touchless interaction with medical devices by means of hand gestures in the air, and . Healthcare and Medical Devices : Proceedings of the 14th International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences, 79, page 151-161. New York, AHFE Open Access, (2023)
Tactile information coding for touchless interaction with medical devices by means of hand gestures in the air, and . Healthcare and Medical Devices : Proceedings of the 14th International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences, 79, page 151-161. New York, AHFE Open Access, (2023)Optimisation Approach for the Convergence Process of Design and Technology in Automotive Development, , and . Interdisciplinary Practice in Industrial Design : Proceedings of the 14th International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences, 100, page 109-118. New York, AHFE Open Access, (2023)
 

Other publications of authors with the same name

A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems., , , , and . ITC, 44 (2): 195-206 (2015)An novel three-party authenticated key exchange protocol using one-time key., , , , and . J. Network and Computer Applications, 36 (1): 498-503 (2013)Security Analysis on Chinese Wireless LAN Standard and Its Solution., and . ICPP Workshops, page 436-443. IEEE Computer Society, (2005)Fast Parallel Computation of Tate Pairing., , , , and . INCoS, page 178-183. IEEE Computer Society, (2011)Data Owner Based Attribute Based Encryption., , and . INCoS, page 144-148. IEEE, (2015)EPSMD: An Efficient Privacy-Preserving Sensor Data Monitoring and Online Diagnosis System., , , , and . INFOCOM, page 819-827. IEEE, (2018)Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System., , , , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 123-139. Springer, (2019)Provably Secure Trusted Access Protocol for WLAN Mesh Networks., , and . EUC (2), page 43-48. IEEE Computer Society, (2008)978-0-7695-3492-3.Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks., , and . EUC (2), page 10-15. IEEE Computer Society, (2008)978-0-7695-3492-3.Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails., , , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 134-150. Springer, (2019)