Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparative study of cyberattacks., , and . Commun. ACM, 55 (3): 66-73 (2012)Internet intrusions: global characteristics and prevalence., , and . SIGMETRICS, page 138-147. ACM, (2003)The Effects of Greed and Fear in Symmetric and Asymmetric Volunteer's Dilemma., , and . CogSci, cognitivesciencesociety.org, (2018)Promoting Reconciliation Through the Satisfaction of the Emotional Needs of Victimized and Perpetrating Group Members: The Needs-Based Model of Reconciliation, , , , and . Pers Soc Psychol Bull, 35 (8): 1021-1030 (2009)Gaussian process learning for cyber-attack early warning., , and . Stat. Anal. Data Min., 3 (1): 56-68 (2010)A New Service for Increasing the Effectiveness of Network Address Blacklists., , and . SRUTI, USENIX Association, (2007)Gaussian Process Learning for Cyber-Attack Early Warning., , and . SDM, page 255-264. SIAM, (2008)Highly Predictive Blacklisting., , and . login Usenix Mag., (2008)The Work Design Questionnaire - Introduction and validation of German version, , and . (2010)Emission Spectroscopy-Based Sensor System to Correlate the In-Cylinder Combustion Temperature of a Diesel Engine to NOx Emissions., , , , and . Sensors, 24 (8): 2459 (April 2024)