Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aspect-Based Attack Detection in Large-Scale Networks., , , and . RAID, volume 6307 of Lecture Notes in Computer Science, page 488-489. Springer, (2010)Passive operating system fingerprinting revisited: Evaluation and current challenges., , , , and . Comput. Networks, (June 2023)A performance benchmark for NetFlow data analysis on distributed stream processing systems., , , and . NOMS, page 919-924. IEEE, (2016)Enhancing Network Security: Host Trustworthiness Estimation., and . AIMS, volume 8508 of Lecture Notes in Computer Science, page 63-68. Springer, (2014)Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement., , and . EUNICE, volume 8115 of Lecture Notes in Computer Science, page 136-147. Springer, (2013)HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting., , , and . EURASIP J. Information Security, (2016)Applications of educational data mining and learning analytics on data from cybersecurity training., , , and . Educ. Inf. Technol., 27 (9): 12179-12212 (2022)Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises., , , , , , , and . CoRR, (2021)Stream-Based IP Flow Analysis., and . IM, page 736-741. IEEE, (2021)Reinforcing Cybersecurity Hands-on Training With Adaptive Learning., , , and . CoRR, (2022)