On the endogenesis of Twitter's Spritzer and Gardenhose sample streams D Kergl, R Roedler, S Seeber Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM …, 2014 | 46 | 2014 |
Towards a trust computing architecture for RPL in cyber physical systems S Seeber, A Sehgal, B Stelte, GD Rodosek, J Schönwälder Proceedings of the 9th International Conference on Network and Service …, 2013 | 43 | 2013 |
Towards an SDN-Enabled IDS Environment S Seeber, L Stiemert, G Dreo Rodosek 3th International Conference on Communications and Network Security (CNS), 2015 | 25 | 2015 |
Improving network security through SDN in cloud scenarios S Seeber, GD Rodosek 10th International Conference on Network and Service Management (CNSM) and …, 2014 | 21 | 2014 |
Towards evaluating type of service related Quality-of-Experience on mobile networks C Tsiaras, A Sehgal, S Seeber, D Dönni, B Stiller, J Schönwälder, ... 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC), 1-8, 2014 | 19 | 2014 |
Cyber taxi: A taxonomy of interactive cyber training and education systems M Knüpfer, T Bierwirth, L Stiemert, M Schopp, S Seeber, D Pöhn, ... Model-driven Simulation and Training Environments for Cybersecurity: Second …, 2020 | 16 | 2020 |
Towards an adaptive and effective IDS using OpenFlow S Seeber, GD Rodosek Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6 …, 2015 | 15 | 2015 |
Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails. S Pham, M Schopp, L Stiemert, S Seeber, D Pöhn, W Hommel ICISSP, 384-390, 2021 | 2 | 2021 |
Analysis and evaluation of OpenFlow message usage for security applications S Seeber, GD Rodosek, G Hurel, R Badonnel Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 …, 2016 | 2 | 2016 |
Combining SABSA and Vis4Sec to the Process Framework IdMSecMan to Continuously Improve Identity Management Security in Heterogeneous ICT Infrastructures D Pöhn, S Seeber, W Hommel Applied Sciences 13 (4), 2349, 2023 | 1 | 2023 |
Towards Improving Identity and Access Management with the IdMSecMan Process Framework D Pöhn, S Seeber, T Hanauer, JA Ziegler, D Schmitz Proceedings of the 16th International Conference on Availability …, 2021 | 1 | 2021 |
Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) Management and Security in the Age of Hyperconnectivity R Badonnel, R Koch, M Drasar, A Pras, V Eiseler, L Stiemert, S Seeber, ... Journal of network and systems management 26, 1101-1109, 2018 | 1 | 2018 |
D6. 4—Fourth Year Report on Automated Configuration and Repair A Mayzaud, D Tuncer, A Sperotto, G Dreo, M Charalambides, R Mijumbi, ... Communications, 2016 | | 2016 |
D1. 4—Fourth Year Report on Joint Software and Labs B Stiller, F De Turck, J Serrat, A Lareida, T Bocek, A Sperotto, S Seeber, ... Symposium on, pages 270, 278, 2015 | | 2015 |
D6. 3—Third Year Report on Automated Configuration and Repair A Mayzaud, A Sehgal, G Hurel, G Dreo, C Tsiaras, A Sperotto, D Dönni, ... Symposium on, pages 910, 913, 2015 | | 2015 |
D5. 1—Initial deliverable on network and service monitoring A Sperotto, R Hofstede, R Schmidt, A Mayzaud, A Sehgal, B Stelte, ... Computer Networks (LCN 2013), 2013 | | 2013 |
D5. 2—Second year deliverable on network and service monitoring A Mayzaud, A Sehgal, A Lahmadi, C Tsiaras, D Dönni, D Tuncer, ... network 1, 2, 2013 | | 2013 |
FLAMINGO NoE Project Management of the Future Internet S Seeber The Future Internet: Future Internet Assembly 2013: Validated Results and …, 2013 | | 2013 |
Vorgehensweise der Migration von IPv4 nach IPv6 in einem Unternehmen der IT Branche unter Berücksichtigung von Microsoft und SAP Anwendungen im städtischen Campus Netz und der … S Seeber University of Applied Sciences,Mittweida, 2011 | | 2011 |
Vergleich von Softwareverteilungssystemen S Seeber University of Applied Sciences,Mittweida, 2009 | | 2009 |