From post

Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing.

, , , и . ISoLA Workshops, том 336 из Communications in Computer and Information Science, стр. 162-180. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Industrial evaluation of the impact of quality-driven release planning., , , и . ESEM, стр. 62:1-62:8. ACM, (2014)Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing., , , и . ISoLA Workshops, том 336 из Communications in Computer and Information Science, стр. 162-180. Springer, (2011)Integrating software quality models into risk-based testing., и . Software Quality Journal, 26 (2): 809-847 (2018)Data Science Challenges to Improve Quality Assurance of Internet of Things Applications., и . ISoLA (2), том 9953 из Lecture Notes in Computer Science, стр. 707-726. (2016)Testing Security Requirements with Non-experts: Approaches and Empirical Investigations., , и . QRS, стр. 254-261. IEEE, (2016)Towards a Model Based Security Testing Approach of Cloud Computing Environments., , и . SERE (Companion), стр. 47-56. IEEE, (2012)Improving the Requirement Engineering Process with Speed-Reviews: An Industrial Case Study., , , , и . SWQD, том 200 из Lecture Notes in Business Information Processing, стр. 3-19. Springer, (2015)Using Defect Taxonomies to Improve the Maturity of the System Test Process: Results from an Industrial Case Study., и . SWQD, том 133 из Lecture Notes in Business Information Processing, стр. 125-146. Springer, (2013)Towards Understanding the Skill Gap in Cybersecurity., , , , , и . ITiCSE (1), стр. 477-483. ACM, (2022)Enhancing Model Driven Security through Pattern Refinement Techniques., , , и . FMCO, том 7542 из Lecture Notes in Computer Science, стр. 169-183. Springer, (2011)