Author of the publication

An Analysis of the Structure and Dynamics of Large-Scale Q/A Communities.

, and . ADBIS, volume 6909 of Lecture Notes in Computer Science, page 285-301. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trustworthy interaction balancing in mixed service-oriented systems., , and . SAC, page 799-806. ACM, (2010)Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems., , , and . Elektrotech. Informationstechnik, 135 (3): 278-285 (2018)Deep Learning for Anomaly Detection in Log Data: A Survey., , , and . CoRR, (2022)A Tailored Model for Cyber Security Education Utilizing a Cyber Range., , , and . ICISSP, page 365-377. SCITEPRESS, (2022)Acquiring Cyber Threat Intelligence through Security Information Correlation., , , , , and . CYBCONF, page 1-7. IEEE, (2017)AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models., , , and . ICISSP, page 386-397. SciTePress, (2018)Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data., , , , , and . ARES, page 31:1-31:6. ACM, (2017)A Framework for Cyber Threat Intelligence Extraction from Raw Log Data., , , , and . IEEE BigData, page 3200-3209. IEEE, (2019)Intrusion Detection in Distributed Systems using Fingerprinting and Massive Event Correlation., and . GI-Jahrestagung, volume P-220 of LNI, page 2240-2254. GI, (2013)Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools., , , and . MIST@CCS, page 109-112. ACM, (2016)