Author of the publication

Keep Your Distance: Determining Sampling and Distance Thresholds in Machine Learning Monitoring.

, , , , , and . IMBSA, volume 13525 of Lecture Notes in Computer Science, page 219-234. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments., , , and . CECC, page 3:1-3:6. ACM, (2018)A Workflow-Based Methodological Framework for Hybrid Human-AI Enabled Scientometrics., , , , and . IEEE BigData, page 2876-2883. IEEE, (2020)Towards the Concept of Trust Assurance Case., , , , , and . TrustCom, page 1581-1586. IEEE, (2022)NFDI4DS Transfer and Application., , , , , , , , , and 3 other author(s). GI-Jahrestagung, volume P-337 of LNI, page 925-929. Gesellschaft für Informatik, Bonn, (2023)Universelle Echtzeit-Ethernet Architektur zur Integration in rekonfigurierbare Automatisierungssysteme., , , , , , , , and . GI-Jahrestagung, volume P-246 of LNI, page 1533-1544. GI, (2015)Flexible, Any-Time Fault Tree Analysis with Component Logic Models., and . ISSRE, page 51-60. IEEE Computer Society, (2010)Engineering of Runtime Safety Monitors for Cyber-Physical Systems with Digital Dependability Identities., , , , , , , and . SAFECOMP, volume 12234 of Lecture Notes in Computer Science, page 3-17. Springer, (2020)Component engineering for adaptive ad-hoc systems., and . SEAMS, page 49-56. ACM, (2008)Designing, building and evaluating a social news curation environment using the action design research methodology., , and . Clust. Comput., 20 (2): 1731-1748 (2017)Evaluating Deception and Moving Target Defense with Network Attack Simulation., , , , and . MTD@CCS, page 45-53. ACM, (2022)