Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Federated Learning: An Evaluation of Homomorphic Encrypted Network Traffic Prediction., , , and . CCNC, page 1-6. IEEE, (2023)Neural Network-Based Channel Prediction and Its Performance in Multi-Antenna Systems., and . VTC Fall, page 1-6. IEEE, (2018)Secure (S)Hell: Introducing an SSH Deception Proxy Framework., , , and . CyberSA, page 1-6. IEEE, (2021)Deterministic Planning for Flexible Intralogistics., , , and . ICAC, page 1-6. IEEE, (2021)CPU Resource Resilience in Wireless Mobile Communications: Design and Evaluation on COTS Virtual Distributed Platform., , , , and . BlackSeaCom, page 43-48. IEEE, (2022)Security in Process: Visually Supported Triage Analysis in Industrial Process Data., , , , and . CoRR, (2019)Security in Process: Detecting Attacks in Industrial Process Data., , , and . CECC, page 5:1-5:6. ACM, (2019)A Comparison of Wireless Channel Predictors: Artificial Intelligence Versus Kalman Filter., and . ICC, page 1-6. IEEE, (2019)Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests., , and . SoftCOM, page 1-6. IEEE, (2019)Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay., , and . CECC, page 3:1-3:4. ACM, (2019)