From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Other publications of authors with the same name

Keine Cyber-Sicherheit ohne Datenschutz., , and . Datenschutz und Datensicherheit, 39 (11): 723-729 (2015)Information Management and Sharing for National Cyber Situational Awareness., , and . ISSE, page 217-227. Springer, (2012)An Analysis of the Structure and Dynamics of Large-Scale Q/A Communities., and . ADBIS, volume 6909 of Lecture Notes in Computer Science, page 285-301. Springer, (2011)Managing social overlay networks in semantic open enterprise systems., , and . WIMS, page 50. ACM, (2011)Discovering and Managing Social Compositions in Collaborative Enterprise Crowdsourcing Systems., , and . Int. J. Cooperative Inf. Syst., 21 (4): 297-342 (2012)Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations., , , and . ERCIM News, 2022 (129): 0 (2022)Computational Social Network Management in Crowdsourcing Environments., , and . ICECCS, page 273-282. IEEE Computer Society, (2011)Correlating cyber incident information to establish situational awareness in Critical Infrastructures., , , , , and . PST, page 78-81. IEEE, (2016)Supporting Network Formation through Mining under Privacy Constraints., , and . SAINT, page 105-108. IEEE Computer Society, (2010)A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation., , , , , and . SAT-CPS@CODASPY, page 77-86. ACM, (2022)