Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy-Based Automation to Improve Solution Engineering in IT Services., , and . IEEE SCC, page 605-612. IEEE Computer Society, (2007)Simplifying Correlation Rule Creation for Effective Systems Monitoring., , , , , and . DSOM, volume 3278 of Lecture Notes in Computer Science, page 266-268. Springer, (2004)Event Detection on Microposts: A Comparison of Four Approaches., , , , , , and . IEEE Trans. Knowl. Data Eng., 33 (4): 1467-1478 (2021)Architecting Dependable and Secure Systems Using Virtualization., , , and . WADS, volume 5135 of Lecture Notes in Computer Science, page 124-149. Springer, (2007)Semi-automated data center hotspot diagnosis., , , , , , , and . CNSM, page 1-7. IEEE, (2011)From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation., , , and . GraMSec@CSF, volume 9987 of Lecture Notes in Computer Science, page 102-118. Springer, (2016)A search engine for systems management., and . NOMS, page 697-710. IEEE, (2010)Anomalies in the Sky: Experiments with traffic densities and airport runway use., and . OpenSky, volume 67 of EPiC Series in Computing, page 51-62. EasyChair, (2019)Examining the Contribution of Critical Visualisation to Information Security., , , and . NSPW, page 59-72. ACM, (2015)Using linked data for systems management., and . NOMS, page 926-929. IEEE, (2010)