Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating digital twin security simulations in the security operations center., , and . ARES, page 18:1-18:9. ACM, (2020)Introducing DINGfest: An architecture for next generation SIEM systems., , , , , , and . Sicherheit, volume P-281 of LNI, page 257-260. Gesellschaft für Informatik e.V., (2018)Human-as-a-security-sensor for harvesting threat intelligence., , and . Cybersecurity, 2 (1): 23 (2019)Train as you Fight: Evaluating Authentic Cybersecurity Training in Cyber Ranges., , and . CHI, page 622:1-622:19. ACM, (2023)Formalizing and Integrating User Knowledge into Security Analytics., , and . SN Comput. Sci., 3 (5): 347 (2022)Bridging Knowledge Gaps in Security Analytics., , and . ICISSP, page 98-108. SCITEPRESS, (2021)Improving cybersecurity skill development through visual programming., , , , and . Inf. Comput. Secur., 31 (3): 316-330 (2023)Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information., , and . Inf. Comput. Secur., 29 (2): 332-349 (2021)Visual Programming in Cyber Range Training to Improve Skill Development., , , , and . HAISA, volume 658 of IFIP Advances in Information and Communication Technology, page 3-13. Springer, (2022)Towards GDPR-compliant data processing in modern SIEM systems., , , , , , , , , and 1 other author(s). Comput. Secur., (2021)