Report date: Apr 30, 2024 Conflict count: 350192 Publisher: Walter de Gruyter GmbH Title count: 137 Conflict count: 1877 ========================================================== Created: 2021-05-09 01:20:09.0 ConfID: 6032696 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Limmer, 35 ,1,32,2012,On Network Monitoring for Intrusion Detection DOI: 10.1515/pik-2012-0006piko.2012.35.1.32(Journal) (6032696-N ) DOI: 10.1515/pik-2012-0006(Journal) ========================================================== Created: 2021-05-09 01:20:09.0 ConfID: 6032697 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Gassen, 35 ,1,3,2012,Current Botnet-Techniques and Countermeasures DOI: 10.1515/pik-2012-0002piko.2012.35.1.3(Journal) (6032697-N ) DOI: 10.1515/pik-2012-0002(Journal) ========================================================== Created: 2021-05-09 01:20:09.0 ConfID: 6032698 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Apel, 35 ,1,17,2012,Generalizing Behavioral Signatures for Detecting Unknown Malware Variants and Early Warning DOI: 10.1515/pik-2012-0004piko.2012.35.1.17(Journal) (6032698-N ) DOI: 10.1515/pik-2012-0004(Journal) ========================================================== Created: 2021-05-09 01:20:09.0 ConfID: 6032699 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Klein, 35 ,1,46,2012,Model-based Cyber Defense Situational Awareness DOI: 10.1515/pik-2012-0008piko.2012.35.1.46(Journal) (6032699-N ) DOI: 10.1515/pik-2012-0008(Journal) ========================================================== Created: 2021-05-09 01:20:09.0 ConfID: 6032700 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Vogel, 35 ,1,40,2012,Automated Generation of Precise Signatures DOI: 10.1515/pik-2012-0007piko.2012.35.1.40(Journal) (6032700-N ) DOI: 10.1515/pik-2012-0007(Journal) ========================================================== Created: 2021-05-09 01:20:09.0 ConfID: 6032701 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Potton, 35 ,1,63,2012,Alois Potton hat das Wort DOI: 10.1515/pik-2012-0011piko.2012.35.1.63(Journal) (6032701-N ) DOI: 10.1515/pik-2012-0011(Journal) ========================================================== Created: 2021-05-09 01:20:09.0 ConfID: 6032702 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Krueger, 35 ,1,54,2012,Intelligent Defense against Malicious JavaScript Code DOI: 10.1515/pik-2012-0009piko.2012.35.1.54(Journal) (6032702-N ) DOI: 10.1515/pik-2012-0009(Journal) ========================================================== Created: 2021-05-09 01:20:09.0 ConfID: 6032703 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Camtepe, 35 ,1,25,2012,A Framework for Automated Identification of Attack Scenarios on IT Infrastructures DOI: 10.1515/pik-2012-0005piko.2012.35.1.25(Journal) (6032703-N ) DOI: 10.1515/pik-2012-0005(Journal) ========================================================== Created: 2021-05-09 01:20:09.0 ConfID: 6032704 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Kührer, 35 ,1,11,2012,An Empirical Analysis of Malware Blacklists DOI: 10.1515/pik-2012-0003piko.2012.35.1.11(Journal) (6032704-N ) DOI: 10.1515/pik-2012-0003(Journal)