Author of the publication

A Concept for Intelligent Collaborative Network Intrusion Detection

, , , , , , and . ARCS 2017; 30th International Conference on Architecture of Computing Systems; Proceedings of, page 1--8. VDE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Concept for Intelligent Collaborative Network Intrusion Detection, , , , , , and . ARCS 2017; 30th International Conference on Architecture of Computing Systems; Proceedings of, page 1--8. VDE, (2017)Analysing Contextualized Attention Metadata for Self-regulated Learning - A Supporting Framework for Self-Monitoring and Self-Reflection., , and . CSEDU (1), page 341-346. INSTICC Press, (2010)An In-Database Rough Set Toolkit., and . LWA, volume 1458 of CEUR Workshop Proceedings, page 146-157. CEUR-WS.org, (2015)A new Attack Composition for Network Security., , , and . DFN-Forum Kommunikationstechnologien, volume P-271 of LNI, page 11-20. GI, (2017)Analyzing Contextualized Attention Metadata with Rough Set Methodologies to Support Self-regulated Learning., , and . ICALT, page 125-129. IEEE Computer Society, (2010)In-Database Feature Selection Using Rough Set Theory., and . IPMU (2), volume 611 of Communications in Computer and Information Science, page 393-407. Springer, (2016)Feature selection for flow-based intrusion detection using Rough Set Theory., and . ICNSC, page 617-624. IEEE, (2017)A hierarchical clustering approach to support the data verification process in master data management., and . ICIQ, MIT Information Quality Program, (2011)A hybrid flow-based intrusion detection system incorporating uncertainty.. University of Kassel, Germany, (2022)