About
17
Publications
15,098
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
82
Citations
Introduction
Currently working as Head of IT-Infrastructure at the datacenter at Fulda University of Applied Sciences. I do research in Computer Communications (Networks), IT Security and Reliability.
Current institution
Additional affiliations
October 2011 - September 2014
October 2014 - February 2015
March 2014 - June 2014
Publications
Publications (17)
Nicht zuletzt durch Trends wie Smart Home und Industrie 4.0 hat die Zahl der Endgeräte im Bereich Internet of Things (IoT) in den vergangenen Jahren stark zugenommen. Häufig werden diese Endgeräte als kostengünstige kleine eingebettete Systeme in großen Stückzahlen ausgerollt und über viele Jahre verwendet. Sie stellen nicht nur bedingt durch ihre...
Virtual infrastructures and cloud services became more and more important over the past years. The abstraction from physical hardware offered by virtualization supports an increased energy efficiency, for example, due to higher utilization of underlying hardware through consolidation. Also, the abstraction enables the ability to geographically move...
Over the last years, education paradigms developed from the traditional classroom learning to novel approaches like e-learning and blended learning. Especially blended learning, which combines the traditional approach with e-learning independent of time and place, is an important concept to increase the quality of study programmes. For the creation...
In den letzten Jahren wurden verschiedene Frameworks zur Implementierung virtueller Computernetzwerkumgebungen entwickelt. Typischerweise können diese in Simulations-und Emula-tionsansätze kategorisiert werden. Letztere zeichnen sich dabei häufig durch eine im Vergleich zu Simulationsansätzen höhere Praxisnähe und einen realitätsnahen Funktionsumfa...
Over the last years, a rapidly growing number of IoT devices is found on the market, especially in the area of the so-called smart home. These devices, which are deployed in vast numbers, are frequently in use over many years. They pose a risk to the users privacy and to the internet as a whole if not provided regularly with security patches. Hence...
Virtual infrastructures and cloud services became more and more important over the past years. The abstraction from physical hardware offered by virtualization supports an increased energy efficiency, for example, due to higher utilization of underlying hardware through consolidation, or the ability to geographically move cloud services based on lo...
To build laboratory setups for courses and research projects in higher education dealing with computer networks, virtualized network environments have been continuously gaining momentum over the last years. Depending on the desired practical or theoretical orientation, they can be implemented using different hardware or software solutions. A high p...
Today’s data centers need a huge amount of energy for their operation. Private cloud infrastructures using virtualization technologies are the prevailing paradigm in modern data centers and their energy consumption and the corresponding ongoing operational costs are not negligible. Solutions that raise the energy efficiency allow reductions in thes...
Enterprise cloud infrastructures and virtualization technologies constitute a growing proportion in today’s data
centers. For these data centers the ongoing operational costs are not negligible, especially for electricity and cooling. Solutions that raise the energy efficiency allow to reduce these operational costs and to optimize the utilization...
Due to the availability of virtualization technologies and related cloud infrastructures, the amount and also
the complexity of logging data of systems and services grow steadily. Automated correlation and aggregation techniques are required to support a contemporary processing and interpretation of relevant logging data. In the past, this was achi...
During the widening of information technology, the need to a framework that efficiently constructs connection vectors from online data flow for evaluating intrusion detection models has become fundamental. Moreover, known datasets in intrusion detection are either outdated or offline aggregated. Therefore, these datasets are not adequate for perfor...
During the widening of information technology, the need to a framework that efficiently constructs connection vectors from online data flow for evaluating intrusion detection models has become fundamental. Moreover, known datasets in intrusion detection are either outdated or offline aggregated. Therefore, these datasets are not adequate for perfor...
Due to the availability of virtualization technologies and related cloud infrastructures, the amount and also the complexity of logging data of systems and services grow steadily. Automated correlation and aggregation techniques are required to support a contemporary processing and interpretation of relevant logging data. In the past, this was achi...