Author of the publication

Empirical Study on the State of Practice of Information Security Management in Local Government.

, , and . KES-HCIS, volume 310 of Smart Innovation, Systems and Technologies, page 13-25. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Challenges of Cyber and Information Security Management in Federal Structures - The Example of German Public Administration., , and . BIR Workshops, volume 2443 of CEUR Workshop Proceedings, page 1-13. CEUR-WS.org, (2019)Information security management in German local government., , and . FedCSIS (Communication Papers), volume 32 of Annals of Computer Science and Information Systems, page 183-189. (2022)Influence of Communication Graph Structures on Pheromone-Based Approaches in the Context of a Partitioning Task Problem.. COIN@AAMAS&IJCAI&MALLOW, volume 6069 of Lecture Notes in Computer Science, page 257-272. Springer, (2009)Empirical Study on the State of Practice of Information Security Management in Local Government., , and . KES-HCIS, volume 310 of Smart Innovation, Systems and Technologies, page 13-25. Springer, (2022)A Hybrid Approach to Detect DDoS Attacks Using KOAD and the Mahalanobis Distance., , , and . NCA, page 1-5. IEEE, (2018)An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined., , , and . ICNC, page 658-662. IEEE, (2019)Ontology-based Cybersecurity and Resilience Framework., , , and . ICISSP, page 458-466. SCITEPRESS, (2021)A Framework For Intelligent DDoS Attack Detection and Response using SIEM and Ontology., , , and . ICC Workshops, page 1-6. IEEE, (2021)Integrated Security Management of Public and Private Sector for Critical Infrastructures - Problem Investigation., , , and . BIS (Workshops), volume 444 of Lecture Notes in Business Information Processing, page 291-303. Springer, (2021)Detection of DDoS Attacks and Flash Events Using Shannon Entropy, KOAD and Mahalanobis Distance., , , and . ICIN, page 222-229. IEEE, (2019)