Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen., , and . DFN-Forum Kommunikationstechnologien, volume P-231 of LNI, page 131-140. GI, (2014)NERD: Neural Network for Edict of Risky Data Streams., , , , and . CyberC, page 428-435. IEEE, (2019)Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems., , , , and . ICISSP, page 552-559. SciTePress, (2023)Modelling of IP Geolocation by use of Latency Measurements., , , and . CoRR, (2020)Towards an SDN-enabled IDS environment., , and . CNS, page 751-752. IEEE, (2015)On the Path to High Precise IP Geolocation: A Self-Optimizing Model., , , and . CoRR, (2020)A Decentralized Framework for Geolocation-Based Pre-Incident Network Forensics., , , , , and . HPCC/CSS/ICESS, page 1210-1218. IEEE, (2015)Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems., , , , , , and . MSTEC, volume 12512 of Lecture Notes in Computer Science, page 3-21. Springer, (2020)On the evaluation of military simulations: towards a taxonomy of assessment criteria., , , , , and . MilCIS, page 1-7. IEEE, (2015)Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails., , , , , and . ICISSP, page 384-390. SCITEPRESS, (2021)