An SDN-based Approach to Protect Communication Between Virtual Machines | 0 | 0.34 | 2019 |
An SDN-Based Approach to Ward Off LAN Attacks | 1 | 0.40 | 2018 |
Attack and Fault Detection in Process Control Communication Using Unsupervised Machine Learning | 0 | 0.34 | 2018 |
Identifying Malicious Traffic In Software-Defined Wireless Local Area Networks | 0 | 0.34 | 2018 |
Security Challenges and Opportunities of Software-Defined Networking. | 10 | 0.55 | 2017 |
Moversight: a group communication protocol for mobile scenarios | 0 | 0.34 | 2016 |
Firewalls for the Web 2.0 | 0 | 0.34 | 2016 |
Distributed Cluster-Topology Maintenance for Mobile Collaborative Applications | 0 | 0.34 | 2016 |
Network Attack Detection and Defense (Dagstuhl Seminar 16361). | 0 | 0.34 | 2016 |
Cleaning up Web 2.0's Security Mess-at Least Partly. | 3 | 0.44 | 2016 |
RADIator - An approach for controllable wireless networks | 1 | 0.37 | 2016 |
Parallelization Of Network Intrusion Detection Systems Under Attack Conditions | 2 | 0.39 | 2014 |
Puzzle - an efficient, compression independent video encryption algorithm | 3 | 0.42 | 2014 |
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292). | 1 | 0.43 | 2014 |
uBeeMe - A Platform for Mobile Collaborative Applications. | 0 | 0.34 | 2013 |
uBeeMe — A platform to enable mobile collaborative applications | 2 | 0.37 | 2013 |
Enhancing group communication systems with mobility support | 1 | 0.34 | 2013 |
Moversight: An approach to support mobility in collaborative applications | 3 | 0.40 | 2013 |
Towards the protection of industrial control systems: conclusions of a vulnerability analysis of profinet IO | 3 | 0.41 | 2013 |
Moversight: A group communication protocol for mobile collaborative applications | 1 | 0.37 | 2013 |
Towards learning normality for anomaly detection in industrial control networks | 10 | 0.73 | 2013 |
Network Attack Detection and Defense. | 0 | 0.34 | 2012 |
Towards a seamless mobility solution for the real world: Handover decision. | 3 | 0.43 | 2012 |
An Adaptive Handover Decision Algorithm for Heterogenous Wireless Networks. | 1 | 0.37 | 2012 |
Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061). | 0 | 0.34 | 2012 |
On the formalization of UML activities for component-based protocol design specifications | 1 | 0.37 | 2012 |
Using model checking to identify errors in intrusion detection signatures | 3 | 0.44 | 2011 |
uBeeMe - Eine Plattform zur Unterstützung mobiler kollaborativer Anwendungen. | 0 | 0.34 | 2011 |
Efficient distributed signature analysis | 1 | 0.36 | 2011 |
Modeling a distributed intrusion detection system using collaborative building blocks | 1 | 0.34 | 2011 |
Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development | 2 | 0.41 | 2010 |
Iterative präzisionsbewertende Signaturgenerierung | 0 | 0.34 | 2010 |
Security considerations on pervasive real-time collaboration | 2 | 0.37 | 2009 |
Identifying Modeling Errors in Signatures by Model Checking | 2 | 0.41 | 2009 |
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008 | 8 | 2.68 | 2008 |
Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort | 0 | 0.34 | 2008 |
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense | 1 | 0.39 | 2008 |
What Does Grid Computing Cost? | 27 | 2.16 | 2008 |
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense | 0 | 0.34 | 2008 |
08102 Outcome Working Group -- Situational Awareness | 0 | 0.34 | 2008 |
Effiziente Medienstromverteilung in geschlossenen Peer-to-Peer-Videokonferenzsystemen | 0 | 0.34 | 2005 |
Ein Ansatz für eine effiziente Schlüsselverteilung für kleine geschlossene Peer-Gruppen | 0 | 0.34 | 2005 |
Peer-to-Peer Intrusion Detection Systeme für den Schutz sensibler IT-Infrastrukturen | 1 | 0.36 | 2005 |
Secure and efficient key distribution for collaborative applications | 3 | 0.53 | 2005 |
Verteilte Mehrteilnehmer-Videokonferenzen im Internet | 0 | 0.34 | 2004 |
High-Efficient Intrusion Detection Infrastructure | 1 | 0.49 | 2003 |
BRAVIS - Ein Konzept für geschlossene Mehrteilnehmer-Videokonferenzen über IP | 0 | 0.34 | 2003 |
Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29 - October 2, 2003, Proceedings | 27 | 1.60 | 2003 |
Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the IFIP 14th International Conference on Testing Communicating Systems - TestCom 2002, Berlin, Germany, March 19-22, 2002 | 30 | 4.49 | 2002 |
GCP | 0 | 0.34 | 2002 |