Profil

HILKER Michael

Main Referenced Co-authors
SCHOMMER, Christoph  (10)
BRUCKS, Claudine  (3)
WAGNER, Cynthia  (3)
Weires, Ralph (3)
Main Referenced Keywords
Data Mining (6); Artificial Immune Systems (5); Data Miinig (1); Text Classification (1);
Main Referenced Disciplines
Computer science (11)

Publications (total 11)

The most cited

2 citations (Scopus®)

Brucks, C., Hilker, M., Schommer, C., Wagner, C., & Weires, R. (2007). Semi-automated Content Zoning of Spam Emails. In Proceedings "WebIst" (pp. 35-44). https://hdl.handle.net/10993/10178

Hilker, M. (2008). Network security through artificial immunity with SANA [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/15558

Hilker, M., & Schommer, C. (2008). Service Oriented Architecture in Network Security - a novel Organisation in Security Systems. Abstract book of 3rd International Workshop on Theory of Computer Viruses (TCV 2008), 120-125.
Peer reviewed

Brucks, C., Hilker, M., Schommer, C., Wagner, C., & Weires, R. (2008). Symbolic Computing with Incremental Mind-maps to Manage and Mine Data Streams - Some Applications. Abstract book of 4th International Workshop on Neural-Symbolic Learning and Reasoning (NeSy'08). ECAI 2008, 120-125.
Peer reviewed

Brucks, C., Hilker, M., Schommer, C., Wagner, C., & Weires, R. (2007). Semi-automated Content Zoning of Spam Emails. In Proceedings "WebIst" (pp. 35-44).
Peer reviewed

Brucks, C., Hilker, M., Schommer, C., Wagner, C., & Weires, R. (2007). Semi-automated Content Zoning of Spam Emails. Lecture Notes on Business Information Processing. Web Information Systems and Technologies, 35-44.
Peer reviewed

Hilker, M., & Schommer, C. (2007). SANA - Network Protection through artificial Immunity. Abstract book of 2nd International Workshop on Theory of Computer Viruses (TCV 2007), 120-125.
Peer reviewed

Hilker, M., & Schommer, C. (2006). SANA - Security Analysis in Internet Traffic through Artificial Immune Systems. Technical Documentary Report. United States. Air Force. Systems Command. Electronic Systems Division.
Peer reviewed

Hilker, M., & Schommer, C. (2006). Description of bad-signatures for Network Intrusion Detection. Proceedings of the 4th. Australasian Information Security Workshop (AISW-NetSec 2006).
Peer reviewed

Hilker, M., & Schommer, C. (2006). AGNOSCO - Identification of Infected Nodes with artificial Ant Colonies.

Hilker, M., & Schommer, C. (2006). AGNOSCO - Identification of Infected Nodes with artificial Ant Colonies. Abstract book of 6th International Conference on Recent Advances in Soft Computing (RASC 2006), 120-125.
Peer reviewed

Hilker, M., & Schommer, C. (2005). A new queueing strategy for the Adversarial Queueing Theory. IPSI-2005, 120-125.
Peer reviewed

Contact ORBilu