From post

Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning.

, , , , , и . EternalS@ECAI, том 379 из Communications in Computer and Information Science, стр. 103-116. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling Authorization in an SOA based Application Scenario., , и . IASTED Conf. on Software Engineering, стр. 79-84. IASTED/ACTA Press, (2006)A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together., , и . ICEIS (3), стр. 128-135. (2005)Security im Produkt-Lifecycle -- Lästige Pflicht oder Chance?, , и . Informatik-Spektrum, 39 (5): 353--361 (октября 2016)Meeting EHR Security Requirements: SeAAS Approach., , , , и . EFMI-STC, том 155 из Studies in Health Technology and Informatics, стр. 85-91. IOS Press, (2010)Model-based regression testing by OCL., , , , и . Int. J. Softw. Tools Technol. Transf., 19 (1): 115-131 (2017)Living Models - Ten Principles for Change-Driven Software Engineering., , , , , и . Int. J. Softw. Informatics, 5 (1-2): 267-290 (2011)ChronoSphere: a graph-based EMF model repository for IT landscape models., , , , , и . Softw. Syst. Model., 18 (6): 3487-3526 (2019)Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice., , , и . WISCS@CCS, стр. 65-70. ACM, (2016)A technical architecture for enforcing usage control requirements in service-oriented architectures., , , , , , и . SWS, стр. 18-25. ACM, (2007)Evolution of Security Requirements Tests for Service-Centric Systems., , и . ESSoS, том 6542 из Lecture Notes in Computer Science, стр. 181-194. Springer, (2011)