Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deciphering ADFGVX Messages from World War I Eastern Front, , , and . Cryptologia, (August 2016)A Concept for Intelligent Collaborative Network Intrusion Detection, , , , , , and . ARCS 2017; 30th International Conference on Architecture of Computing Systems; Proceedings of, page 1--8. VDE, (2017)Requirements of Peer-to-Peer-based Massively Multiplayer Online Gaming, , , , , and . CCGRID '07: Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid, page 773--782. Washington, DC, USA, IEEE Computer Society, (2007)A novel method for securing critical infrastructures by detecting hidden flows of data., , , and . CNS, page 648-654. IEEE, (2015)Informatik mit Recht., , , , and . GI-Jahrestagung, volume P-294 of LNI, page 293-294. GI, (2019)The Future of Socio-Technical Design for Ubiquitous Computing Systems, , and . Socio-technical Design of Ubiquitous Computing Systems, Springer, Berlin, (2014)"Löschen" im Internet. Ein neuer Ansatz für die technische Unterstützung des Rechts auf Löschen, , and . Datenschutz und Datensicherheit (DuD), 39 (1/2015): 31-36 (January 2015)Recht auf Vergessen im Internet - Diskrepanz zwischen rechtlicher Zielsetzung und technischer Realisierbarkeit?, , and . Datenschutz und Datensicherheit (DuD), 37 (4): 235-241 (April 2013)Simulating Cheated Results Acceptance Rates for Gossip-Based Volunteer Computing, , and . International Journal of Mobile Network Design and Innovation, 7 (1): 56--67 (2017)Model-Driven Development of Self-Organizing Control Applications. Chapter 2.1, in Organic Computing - A Paradigm Shift for Complex Systems, , , , , , , , , and . Birkäuser Verlag, (Jun 14, 2011)