default search action
Thomas Gamer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2010
- [b1]Thomas Gamer:
Dezentrale, anomalie-basierte Erkennung verteilter Angriffe im Internet. Karlsruhe Institute of Technology, 2010, ISBN 978-3-86644-491-1, pp. 1-250
Journal Articles
- 2021
- [j8]Martin W. Hoffmann, Somayeh Malakuti, Sten Grüner, Sören Finster, Jörg Gebhardt, Ruomu Tan, Thorsten Schindler, Thomas Gamer:
Developing Industrial CPS: A Multi-Disciplinary Challenge. Sensors 21(6): 1991 (2021) - 2019
- [j7]Johannes Schmitt, Thomas Gamer, Marie Platenius-Mohr, Somayeh Malakuti, Sören Finster:
Authorization in asset administration shells using OPC UA. Autom. 67(5): 429-442 (2019) - 2016
- [j6]Heiko Koziolek, Thomas Goldschmidt, Thijmen de Gooijer, Dominik Domis, Stephan Sehestedt, Thomas Gamer, Markus Aleksy:
Assessing software product line potential: an exploratory industrial case study. Empir. Softw. Eng. 21(2): 411-448 (2016) - 2015
- [j5]Michael Wahler, Thomas Gamer, Atul Kumar, Manuel Oriol:
FASA: A software architecture and runtime framework for flexible distributed automation systems. J. Syst. Archit. 61(2): 82-111 (2015) - 2012
- [j4]Thomas Gamer:
Collaborative anomaly-based detection of large-scale internet attacks. Comput. Networks 56(1): 169-185 (2012) - 2011
- [j3]Thomas Gamer, Lars Völker, Martina Zitterbart:
Differentiated security in wireless mesh networks. Secur. Commun. Networks 4(3): 257-266 (2011) - [j2]Thomas Gamer, Christoph P. Mayer:
Simulative evaluation of distributed attack detection in large-scale realistic environments. Simul. 87(7): 630-647 (2011) - 2008
- [j1]Thomas Gamer, Christoph P. Mayer, Marcus Schöller:
PktAnon - A Generic Framework for Profile-based Traffic Anonymization. Prax. Inf.verarb. Kommun. 31(2): 76-81 (2008)
Conference and Workshop Papers
- 2019
- [c18]Thomas Gamer, Benjamin Klöpper, Mario Hoernicke:
The way toward autonomy in industry - taxonomy, process framework, enablers, and implications. IECON 2019: 565-570 - 2018
- [c17]Somayeh Malakuti, Johannes Schmitt, Thomas Gamer:
From Heterogeneity to Uniformity in Building Automation Systems via Semantic-based Engineering. ETFA 2018: 115-122 - 2014
- [c16]Thomas Gamer, Manuel Oriol, Michael Wahler:
Increasing efficiency of M-out-of-N redundancy. ETFA 2014: 1-8 - [c15]Stefan Stattelmann, Stephan Sehestedt, Thomas Gamer:
Optimized incremental state replication for automation controllers. ETFA 2014: 1-8 - [c14]Dominik Domis, Stephan Sehestedt, Thomas Gamer, Markus Aleksy, Heiko Koziolek:
Customizing domain analysis for assessing the reuse potential of industrial software systems: experience report. SPLC 2014: 310-319 - [c13]Stefan Stattelmann, Manuel Oriol, Thomas Gamer:
Execution Time Analysis for Industrial Control Applications. FESCA 2014: 16-31 - 2013
- [c12]Manuel Oriol, Thomas Gamer, Thijmen de Gooijer, Michael Wahler, Ettore Ferranti:
Fault-tolerant fault tolerance for component-based automation systems. ISARCS 2013: 49-58 - 2011
- [c11]Ingmar Baumgart, Thomas Gamer, Christian Hübsch, Christoph P. Mayer:
Realistic underlays for overlay simulation. SimuTools 2011: 402-405 - 2009
- [c10]Thomas Gamer:
Anomaly-Based Identification of Large-Scale Attacks. GLOBECOM 2009: 1-6 - [c9]Thomas Gamer, Christoph P. Mayer:
Large-scale evaluation of distributed attack detection. SimuTools 2009: 68 - 2008
- [c8]Thomas Gamer:
Distributed detection of large-scale attacks in the internet. CoNEXT 2008: 38 - [c7]Thomas Gamer, Lars Völker, Martina Zitterbart:
Differentiated security in wireless mesh networks. Q2SWinet 2008: 111-112 - [c6]Thomas Gamer, Christoph P. Mayer, Martina Zitterbart:
Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection. SECURWARE 2008: 34-40 - [c5]Thomas Gamer, Michael Scharf:
Realistic simulation environments for IP-based networks. SimuTools 2008: 83 - 2007
- [c4]Thomas Gamer, Michael Scharf, Marcus Schöller:
Collaborative Anomaly-Based Attack Detection. IWSOS 2007: 280-287 - [c3]Thomas Gamer:
A System for in-Network Anomaly Detection. KiVS 2007: 275-282 - 2006
- [c2]Thomas Gamer, Marcus Schöller, Roland Bless:
An Extensible and Flexible System for Network Anomaly Detection. Autonomic Networking 2006: 97-108 - 2005
- [c1]Marcus Schöller, Thomas Gamer, Roland Bless, Martina Zitterbart:
An Extension to Packet Filtering of Programmable Networks. IWAN 2005: 121-131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint