Chair of Computer Networks and Computer Communications
Publication database

Publication database

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Search

Author:  
All :: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, V, W, X, Z 
  
 
Preferences: 
References per page: Show keywords Show abstracts

2018

Contributions to books:

default
Bernhard Doll, Ramona Kuehn and Hermann De Meer
Beispielhafte Testszenarien: Access Management
In Helmut Krcmar, Claudia Eckert, Alexander Rossnagel, Ali Sunyaev and Manuel Wiesche, editor,
page 233--238.
Publisher: Springer Fachmedien Wiesbaden, Wiesbaden
2018
ISBN: 978-3-658-19579-3
default
Bernhard Doll, Ramona Kuehn and Hermann De Meer
Beispielhafte Testszenarien: Verfuegbarkeit und Kontrollfaehigkeit
In Helmut Krcmar, Claudia Eckert, Alexander Rossnagel, Ali Sunyaev and Manuel Wiesche, editor,
page 249--260.
Publisher: Springer Fachmedien Wiesbaden, Wiesbaden
2018
ISBN: 978-3-658-19579-3
default
Johanna M. Hofmann, Sebastian Lins, Michael Lang, Christian Banse, Bernhard Doll, Ramona Kuehn, Britta Laatzen, Hermann De Meer, Christine Neubauer, Alexander Rossnagel, Philipp Stephanow, Ali Sunyaev, Andreas Weiss, Manuel Wiesche and Helmut Krcmar
Handlungsempfehlungen
In Helmut Krcmar, Claudia Eckert, Alexander Rossnagel, Ali Sunyaev and Manuel Wiesche, editor,
page 379--390.
Publisher: Springer Fachmedien Wiesbaden, Wiesbaden
2018
ISBN: 978-3-658-19579-3

Conference and workshop papers:

default
Robert Basmadjian, Yashar Ghiassi-Farrokhfal and Arun Vishwanath
Hidden Storage in Data Centers: Gaining Flexibility Through Cooling Systems
Proceedings of the 19th International GI/ITG Conference on Measurement, Modelling and Evaluation of Computing Systems of MMB 2018
Publisher: Springer,
2018

2017

Journal articles:

default
Noelle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishaeupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann De Meer and Hans P. Reiser
Classifying Malware Attacks in IaaS Cloud Environments
Journal of Cloud Computing, Cloud Forensics and Security, 6(1):26
2017
ISSN: 2192-113X
default
Stefan Rass, Ali Alshawish, Mohamed Amine Abid, Stefan Schauer, Quanyan Zhu and Hermann De Meer
Physical Intrusion Games-Optimizing Surveillance by Simulation and Game Theory
IEEE Access, 5:8394-8407
2017
ISSN: 2169-3536

Book chapters:

default
Robert Basmadjian, Florian Niedermeier and Hermann De Meer
Demand-side Flexibility and Supply-side Management: The Use Case of Data Centers and Energy Utilities
In Jorge Marx Gomez, Manuel Mora, Mahesh S. Raisinghani, Wolfgang Nebel and Rory O'Connor, editor,
Engineering and Management of Data Centers
Publisher: Springer International Publishing, Oxford
2017

Conference and workshop papers:

default
Ali Alshawish, Stefan Rass and Hermann De Meer
A Game-theoretical Decision-making Framework for Physical Surveillance Games
Workshop on Novel Approaches in Risk and Security Management for Critical Infrastructures , page 58.
2017
pdf
Andreas Fischer, Ramona Kuehn, Waseem Mandarawi and Hermann De Meer
Modeling Security Requirements for VNE algorithms
Valuetools 2016, 10th EAI International Conference on Performance Evaluation Methodologies and Tools of VALUETOOLS'16 , page 149--154.
Publisher: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium
2017
ISBN: 978-1-63190-141-6
default
Ali Alshawish, Mohamed Amine Abid, Stefan Rass and Hermann De Meer
Playing a Multi-objective Spot-checking Game in Public Transportation Systems
Proc. of 4th Workshop on Security in highly connected IT systems (SHICS)
2017
Page:  
Previous | 1, 2, 3, 4, 5, 6, ... , 37 | Next
Export as:
BibTeX, XML