Report date: Nov 6,2024 Conflict count: 361874 Publisher: Walter de Gruyter GmbH Title count: 138 Conflict count: 1895 ========================================================== Created: 2021-05-09 01:20:09 ConfID: 6032704 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Kührer,35,1,11,2012,An Empirical Analysis of Malware Blacklists DOI: 10.1515/pik-2012-0003piko.2012.35.1.11(Journal) (6032704-N) DOI: 10.1515/pik-2012-0003(Journal) ========================================================== Created: 2021-05-09 01:20:09 ConfID: 6032700 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Vogel,35,1,40,2012,Automated Generation of Precise Signatures DOI: 10.1515/pik-2012-0007piko.2012.35.1.40(Journal) (6032700-N) DOI: 10.1515/pik-2012-0007(Journal) ========================================================== Created: 2021-05-09 01:20:09 ConfID: 6032701 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Potton,35,1,63,2012,Alois Potton hat das Wort DOI: 10.1515/pik-2012-0011piko.2012.35.1.63(Journal) (6032701-N) DOI: 10.1515/pik-2012-0011(Journal) ========================================================== Created: 2021-05-09 01:20:09 ConfID: 6032702 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Krueger,35,1,54,2012,Intelligent Defense against Malicious JavaScript Code DOI: 10.1515/pik-2012-0009piko.2012.35.1.54(Journal) (6032702-N) DOI: 10.1515/pik-2012-0009(Journal) ========================================================== Created: 2021-05-09 01:20:09 ConfID: 6032703 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Camtepe,35,1,25,2012,A Framework for Automated Identification of Attack Scenarios on IT Infrastructures DOI: 10.1515/pik-2012-0005piko.2012.35.1.25(Journal) (6032703-N) DOI: 10.1515/pik-2012-0005(Journal) ========================================================== Created: 2021-05-09 01:20:09 ConfID: 6032696 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Limmer,35,1,32,2012,On Network Monitoring for Intrusion Detection DOI: 10.1515/pik-2012-0006piko.2012.35.1.32(Journal) (6032696-N) DOI: 10.1515/pik-2012-0006(Journal) ========================================================== Created: 2021-05-09 01:20:09 ConfID: 6032697 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Gassen,35,1,3,2012,Current Botnet-Techniques and Countermeasures DOI: 10.1515/pik-2012-0002piko.2012.35.1.3(Journal) (6032697-N) DOI: 10.1515/pik-2012-0002(Journal) ========================================================== Created: 2021-05-09 01:20:09 ConfID: 6032698 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Apel,35,1,17,2012,Generalizing Behavioral Signatures for Detecting Unknown Malware Variants and Early Warning DOI: 10.1515/pik-2012-0004piko.2012.35.1.17(Journal) (6032698-N) DOI: 10.1515/pik-2012-0004(Journal) ========================================================== Created: 2021-05-09 01:20:09 ConfID: 6032699 CauseID: 1498013037 OtherID: 1350583990 JT: PIK - Praxis der Informationsverarbeitung und Kommunikation MD: Klein,35,1,46,2012,Model-based Cyber Defense Situational Awareness DOI: 10.1515/pik-2012-0008piko.2012.35.1.46(Journal) (6032699-N) DOI: 10.1515/pik-2012-0008(Journal)