Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NERD: Neural Network for Edict of Risky Data Streams., , , , and . CyberC, page 428-435. IEEE, (2019)Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems., , , , and . ICISSP, page 552-559. SciTePress, (2023)Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis., , , and . IEEE Syst. J., 10 (4): 1338-1349 (2016)Dragoon: Advanced Modelling of IP Geolocation by use of Latency Measurements., , , and . CoRR, (2020)Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen., , and . DFN-Forum Kommunikationstechnologien, volume P-231 of LNI, page 131-140. GI, (2014)Towards an SDN-enabled IDS environment., , and . CNS, page 751-752. IEEE, (2015)Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems., , , , , , and . CoRR, (2021)Modelling of IP Geolocation by use of Latency Measurements., , , and . CoRR, (2020)On the evaluation of military simulations: towards a taxonomy of assessment criteria., , , , , and . MilCIS, page 1-7. IEEE, (2015)On the Evaluation of Military Simulations: Towards A Taxonomy of Assessment Criteria., , , , , and . CoRR, (2020)