Author of the publication

Towards Adaptive Anomaly Detection and Root Cause Analysis by Automated Extraction of Knowledge from Risk Analyses.

, , , , , , , , and . SSN@ISWC, volume 2213 of CEUR Workshop Proceedings, page 17-31. CEUR-WS.org, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An IPv6 Data Plane for Service Aware Access Networks., , , , , and . International Conference on Internet Computing, page 279-286. CSREA Press, (2005)On the use of Java Server Side Technologies for the Design of Dynamically Redeployable MMOGs., , , , , and . International Conference on Internet Computing, page 430-436. CSREA Press, (2006)On the Use of NSGrid for Accurate Grid Schedule Evaluation., , , , , and . PDPTA, page 200-206. CSREA Press, (2004)OSGi Service Layer Enhancements., , , , , and . Software Engineering Research and Practice, page 323-328. CSREA Press, (2006)Design of the pCASE Platform for enabling Context Aware Services., , , , , , , , , and 2 other author(s). Integrated Network Management, page 872-875. IEEE, (2007)Secure and Dynamic Client Environment for Interactive eHomeCare., , , , , and . Software Engineering Research and Practice, page 478-483. CSREA Press, (2007)Modeling wireless shadow networks., and . MSWiM, page 195-202. ACM, (2004)LimeDS and the TraPIST Project: A Case Study., , , , , , and . KEOD, page 501-508. SciTePress, (2015)978-989-758-158-8.Predicting Train Occupancies based on Query Logs and External Data Sources., , , , , , , and . WWW (Companion Volume), page 1469-1474. ACM, (2017)On the design and implementation of a hierarchical, generic and scalable open architecture for the network management layer., , and . NOMS, page 745-758. IEEE, (2000)