Author of the publication

Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.

, , and . CANS, volume 3810 of Lecture Notes in Computer Science, page 261-273. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open Access Networks., , and . INTERWORKING, volume 247 of IFIP Conference Proceedings, page 91-107. Kluwer, (2002)Multisensor Real-Time Risk Assessment Using Continuous-Time Hidden Markov Models., and . CIS, volume 4456 of Lecture Notes in Computer Science, page 694-703. Springer, (2006)Identifying Malware Using Cross-Evidence Correlation., , and . IFIP Int. Conf. Digital Forensics, volume 361 of IFIP Advances in Information and Communication Technology, page 169-182. Springer, (2011)Legal Considerations on Gray Zone Operations - From a Norwegian Perspective., , and . NordSec, volume 14324 of Lecture Notes in Computer Science, page 162-181. Springer, (2023)A Network Based IMSI Catcher Detection., , , and . ICITCS, page 1-6. IEEE Computer Society, (2016)A big data analytics approach to combat telecommunication vulnerabilities., , , and . Clust. Comput., 20 (3): 2363-2374 (2017)Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems., , , , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 388-397. Springer, (2005)Better Protection of SS7 Networks with Machine Learning., , , and . ICITCS, page 1-7. IEEE Computer Society, (2016)Practical use of Approximate Hash Based Matching in digital investigations., , and . Digit. Investig., 11 (Supplement 1): S18-S26 (2014)Digital Forensic Reconstruction and the Virtual Security Testbed ViSe., , , and . DIMVA, volume 4064 of Lecture Notes in Computer Science, page 144-163. Springer, (2006)