Search results for: Claudia Eckert
IEEE Transactions on Engineering Management > 2017 > 64 > 2 > 179 - 192
Procedia CIRP > 2017 > 60 > C > 267-272
Lecture Notes in Computer Science > Autonomic and Trusted Computing > Autonomic Models and Architectures > 191-202
Lecture Notes in Computer Science > Security in Pervasive Computing > Invited Talk (Abstract) > 163-163
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Public Key Encryption > 20-36
Lecture Notes in Computer Science > Artificial Immune Systems > ImmunoInformatics Conceptual Papers > 122-135
Lecture Notes in Computer Science > Grammatical Inference: Theoretical Results and Applications > Short Papers > 262-266
Lecture Notes in Computer Science > Genetic and Evolutionary Computation – GECCO 2004 > Artificial Immune Systems > 299-307
Lecture Notes in Computer Science > Security and Privacy in Ad-hoc and Sensor Networks > Detection of Compromise, and Revocation > 203-217
Lecture Notes in Computer Science > Advances in Information and Computer Security > Malware Detection > 96-112
Lecture Notes in Computer Science > Artificial Immune Systems > Pattern Recognition Type of Application > 215-228