Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating security evaluations into virtual commissioning., , , and . CASE, page 1193-1200. IEEE, (2020)A fuzzy decision tool to evaluate the sustainable performance of suppliers in an agrifood value chain., , , and . Comput. Ind. Eng., (2019)Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net.. DFN-Arbeitstagung über Kommunikationsnetze, volume P-55 of LNI, page 433-449. GI, (2004)iTOP: Automating Counterfeit Object-Oriented Programming Attacks., , , , , and . RAID, page 162-176. ACM, (2021)A reputation system for electronic negotiations., , , , and . Comput. Stand. Interfaces, 30 (6): 351-360 (2008)hybrid-Flacon: Hybrid Pattern Malware Detection and Categorization with Network Traffic andProgram Code., , and . CoRR, (2021)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , and 4 other author(s). CoRR, (2021)IT-Sicherheit. Oldenbourg, München u.a., 2., überarb. und erw. Aufl. edition, (2003)Knitwear Customisation as Repeated Redesign., and . MCPC, page 90:1-90:9. Technical University Munich, (2003)Konzept für ein deutschlandweites Krankheitsnetz am Beispiel von mitoREGISTER., , , , , , , and . GI Jahrestagung (2), volume P-176 of LNI, page 746-751. GI, (2010)