Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment., , and . Praxis der Informationsverarbeitung und Kommunikation, 27 (4): 186-187 (2004)The ETH Value Lab and Two Software Tools for Knowledge Creation in Teams., , and . IV, page 469-473. IEEE Computer Society, (2009)SHEDEL-A Simple Hierarchical Event Description Language for Specifying Attack Signatures., , and . SEC, volume 214 of IFIP Conference Proceedings, page 559-572. Kluwer, (2002)On Chase Termination Beyond Stratification., , and . PVLDB, 2 (1): 970-981 (2009)On Rewriting, Answering Queries in OBDA Systems for Big Data (Short Paper)., , , , , , and . OWLED, volume 1080 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)High-Efficient Intrusion Detection Infrastructure., , and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-44 of LNI, page 217-232. GI, (2003)Effiziente Analyseverfahren für Intrusion-Detection-Systeme., and . Sicherheit, volume P-62 of LNI, page 209-220. GI, (2005)Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet., , , , and . Sicherheit, volume P-228 of LNI, page 407-418. GI, (2014)Vereinfachung der Signaturentwicklung durch Wiederverwendung., , and . Sicherheit, volume P-77 of LNI, page 201-212. GI, (2006)Learning SQL for Database Intrusion Detection using Context-Sensitive Modelling., , and . LWA, TUD-CS-2009-0157/TUD-KE-2009-04, page KDML:17-21. FG Telekooperation/FG Knowledge Engineering, Technische Universität Darmstadt, Germany, (2009)