Axel Tanner

Orcid: 0000-0002-3549-7462

According to our database1, Axel Tanner authored at least 14 papers between 2004 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Event Detection on Microposts: A Comparison of Four Approaches.
IEEE Trans. Knowl. Data Eng., 2021

2019
Anomalies in the Sky: Experiments with traffic densities and airport runway use.
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019

Managing Security Objects and -Processes Using an Extended BPM Approach and -System.
Proceedings of the 23rd IEEE International Enterprise Distributed Object Computing Conference, 2019

2016
From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

2015
Gaining an Edge in Cyberspace with Advanced Situational Awareness.
IEEE Secur. Priv., 2015

Examining the Contribution of Critical Visualisation to Information Security.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

Tool-based risk assessment of cloud infrastructures as socio-technical systems.
Proceedings of the Cloud Security Ecosystem, 2015

2011
Semi-automated data center hotspot diagnosis.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
Using linked data for systems management.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

A search engine for systems management.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

2008
Policy-Based Automation to Improve Solution Engineering in IT Services.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

2007
Architecting Dependable and Secure Systems Using Virtualization.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

2005
Data mining and machine learning - Towards reducing false positives in intrusion detection.
Inf. Secur. Tech. Rep., 2005

2004
Simplifying Correlation Rule Creation for Effective Systems Monitoring.
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004


  Loading...