References of "Hilker, Michael 40000298"
     in
Bookmark and Share    
See detailNetwork security through artificial immunity with SANA
Hilker, Michael UL

Doctoral thesis (2008)

Detailed reference viewed: 155 (94 UL)
Peer Reviewed
See detailService Oriented Architecture in Network Security - a novel Organisation in Security Systems
Hilker, Michael UL; Schommer, Christoph UL

in Abstract book of 3rd International Workshop on Theory of Computer Viruses (TCV 2008) (2008)

Detailed reference viewed: 36 (3 UL)
Peer Reviewed
See detailSymbolic Computing with Incremental Mind-maps to Manage and Mine Data Streams - Some Applications
Brucks, Claudine UL; Hilker, Michael UL; Schommer, Christoph UL et al

in Abstract book of 4th International Workshop on Neural-Symbolic Learning and Reasoning (NeSy'08). ECAI 2008. (2008)

Detailed reference viewed: 35 (5 UL)
Peer Reviewed
See detailSANA - Network Protection through artificial Immunity
Hilker, Michael UL; Schommer, Christoph UL

in Abstract book of 2nd International Workshop on Theory of Computer Viruses (TCV 2007) (2007)

Detailed reference viewed: 59 (6 UL)
Peer Reviewed
See detailSemi-automated Content Zoning of Spam Emails
Brucks, Claudine UL; Hilker, Michael UL; Schommer, Christoph UL et al

in Proceedings "WebIst" (2007)

Detailed reference viewed: 56 (3 UL)
Peer Reviewed
See detailSemi-automated Content Zoning of Spam Emails
Brucks, Claudine UL; Hilker, Michael UL; Schommer, Christoph UL et al

in Lecture Notes on Business Information Processing. Web Information Systems and Technologies (2007)

Detailed reference viewed: 54 (2 UL)
Peer Reviewed
See detailSANA - Security Analysis in Internet Traffic through Artificial Immune Systems
Hilker, Michael UL; Schommer, Christoph UL

in Technical Documentary Report. United States. Air Force. Systems Command. Electronic Systems Division (2006)

Detailed reference viewed: 42 (2 UL)
Peer Reviewed
See detailAGNOSCO - Identification of Infected Nodes with artificial Ant Colonies
Hilker, Michael UL; Schommer, Christoph UL

in Abstract book of 6th International Conference on Recent Advances in Soft Computing (RASC 2006) (2006)

Detailed reference viewed: 21 (2 UL)
Peer Reviewed
See detailDescription of bad-signatures for Network Intrusion Detection
Hilker, Michael UL; Schommer, Christoph UL

in Proceedings of the 4th. Australasian Information Security Workshop (AISW-NetSec 2006) (2006)

Detailed reference viewed: 15 (1 UL)