logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 25(11): 1396-1416
https://doi.org/10.3217/jucs-025-11-1396 (28 Nov 2019)
Other versions:
XML
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CiteCite
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 25(11): 1396-1416
doi: 10.3217/jucs-025-11-1396
Received: 15 Feb 2019 | Approved: 26 Jul 2019 | Published: 28 Nov 2019
This article is part of:
JUCS - Journal of Universal Computer Science 25(11): Cyberattack Detection and Response
Authors
   
   
   
Steffen Wendzel - Corresponding author
https://www.wendzel.de
Articles by this author in:  CrossRef  |  Google Scholar
Florian Link
Worms University of Applied Sciences, Worms, Germany
Articles by this author in:  CrossRef  |  Google Scholar
Daniela Eller
Worms University of Applied Sciences, Worms, Germany
Articles by this author in:  CrossRef  |  Google Scholar
Wojciech Mazurczyk
Warsaw University of Technology, Warsaw, Poland
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK