default search action
Axel Tanner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j3]Akansha Bhardwaj, Albert Blarer, Philippe Cudré-Mauroux, Vincent Lenders, Boris Motik, Axel Tanner, Alberto Tonon:
Event Detection on Microposts: A Comparison of Four Approaches. IEEE Trans. Knowl. Data Eng. 33(4): 1467-1478 (2021) - 2015
- [j2]Vincent Lenders, Axel Tanner, Albert Blarer:
Gaining an Edge in Cyberspace with Advanced Situational Awareness. IEEE Secur. Priv. 13(2): 65-74 (2015) - 2005
- [j1]Tadeusz Pietraszek, Axel Tanner:
Data mining and machine learning - Towards reducing false positives in intrusion detection. Inf. Secur. Tech. Rep. 10(3): 169-183 (2005)
Conference and Workshop Papers
- 2019
- [c11]Jochen Küster, Niklaus Meyer, Hagen Völzer, Maria Dubovitskaya, Michael Osborne, Axel Tanner:
Managing Security Objects and -Processes Using an Extended BPM Approach and -System. EDOC 2019: 197-205 - [c10]Axel Tanner, Martin Strohmeier:
Anomalies in the Sky: Experiments with traffic densities and airport runway use. OpenSky 2019: 51-62 - 2016
- [c9]Eric Li, Jeroen Barendse, Frederic Brodbeck, Axel Tanner:
From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation. GraMSec@CSF 2016: 102-118 - 2015
- [c8]Peter Hall, Claude Heath, Lizzie Coles-Kemp, Axel Tanner:
Examining the Contribution of Critical Visualisation to Information Security. NSPW 2015: 59-72 - 2011
- [c7]Suzanne McIntosh, Jeffrey O. Kephart, Jonathan Lenchner, B. Yang, Metin Feridun, Michael Nidd, Axel Tanner, I. Barabasi:
Semi-automated data center hotspot diagnosis. CNSM 2011: 1-7 - 2010
- [c6]Metin Feridun, Axel Tanner:
A search engine for systems management. NOMS 2010: 697-710 - [c5]Metin Feridun, Axel Tanner:
Using linked data for systems management. NOMS 2010: 926-929 - 2008
- [c4]Ronnie Sarkar, Murthy V. Devarakonda, Axel Tanner:
Policy-Based Automation to Improve Solution Engineering in IT Services. IEEE SCC (2) 2008: 52-59 - 2007
- [c3]Ronnie Sarkar, Murthy V. Devarakonda, Axel Tanner:
Policy-Based Automation to Improve Solution Engineering in IT Services. IEEE SCC 2007: 605-612 - [c2]Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter, Axel Tanner:
Architecting Dependable and Secure Systems Using Virtualization. WADS 2007: 124-149 - 2004
- [c1]Carlos Araujo, Ana Biazetti, Anthony Bussani, John Dinger, Metin Feridun, Axel Tanner:
Simplifying Correlation Rule Creation for Effective Systems Monitoring. DSOM 2004: 266-268
Parts in Books or Collections
- 2015
- [p1]Michael Nidd, Marieta Georgieva Ivanova, Christian W. Probst, Axel Tanner:
Tool-based risk assessment of cloud infrastructures as socio-technical systems. The Cloud Security Ecosystem 2015: 495-517
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint