Publikationen
[2025]
[2024]
[2023]
[2022]
[2021]
[2020]
[2019]
[2018]
[2017]
[2016]
[2015]
[2014]
[2013]
[2012]
[2011]
[2010]
[2009]
[2008]
[2007]
[2006]
[2005]
[2004]
2023
145.
Domaschka J,
Volpert S,
Maier K,
Eisenhart G,
Seybold D.
Using eBPF for Database Workload Tracing: An Explorative Study. In:
Companion of the 2023 ACM/SPEC International Conference on Performance Engineering.
2023.
p. 311—317.
2022
139.
Volpert S,
Eisenhart G,
Domaschka J.
Are Kubernetes CNI solutions ready for> 10 Gbit/s?.
2022;
132.
Wendzel S,
Caviglione L,
Checco A,
Mileva A,
Lalande J,
Mazurczyk W.
Proceedings of the Third International Workshop on Information Security Methodology and Replication Studies (IWSMR 2022).
ACM;
2022.
131.
Eisenhart G,
Volpert S,
Braitinger J,
Domaschka J.
Recognition of Similar NetFlow Data in Decentralised Monitoring Environments.
2022;
2021
126.
Wendzel S,
Caviglione L,
Mazurczyk W,
Mileva A,
Dittmann J,
Krätzer C,
Lamshöft K,
Vielhauer C,
Hartmann L,
Keller J,
Neubert T.
A Revised Taxonomy of Steganography Embedding Patterns. In:
Proc. 16th International Conference on Availability, Reliability and Security (ARES 2021).
ACM;
2021.
[DOI]
[Datei]
125.
Chourib M,
Wendzel S,
Mazurczyk W.
Adaptive Warden Strategy for Countering Network Covert Storage Channels. In:
46th IEEE Conference on Local Computer Networks (LCN 2021).
IEEE;
2021.
p. 148—153.
[Datei]