Author of the publication

Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection.

, , and . SECURWARE, page 34-40. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach for Urban Sensing with Quality-Aware Situation Detection and Efficient Communication., , and . ECEASST, (2011)The Ariba Framework for Application Development using Service Overlays., , and . Praxis der Informationsverarbeitung und Kommunikation, 33 (1): 7-11 (2010)Routing in hybrid Delay Tolerant Networks., and . Computer Communications, (2014)Simulative evaluation of distributed attack detection in large-scale realistic environments., and . Simulation, 87 (7): 630-647 (2011)Offloading infrastructure using Delay Tolerant Networks and assurance of delivery., and . Wireless Days, page 1-7. IEEE, (2011)Report on WREN 2009 -- workshop: research on enterprise networking., , , , and . Computer Communication Review, 40 (1): 44-49 (2010)User-Perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups., , and . MMB/DFT, volume 5987 of Lecture Notes in Computer Science, page 62-77. Springer, (2010)Realistic underlays for overlay simulation., , , and . SimuTools, page 402-405. ICST/ACM, (2011)On Runtime Adaptation of Application-Layer Multicast Protocol Parameters., , and . EUNICE, volume 6164 of Lecture Notes in Computer Science, page 226-235. Springer, (2010)Large-scale evaluation of distributed attack detection., and . SimuTools, page 68. ICST/ACM, (2009)