title = {{IT-Sicherheitsanalyse durch NAC-Systeme mit SIEM-Funktionalität}},
  author = {Detken, Kai-Oliver and Kleiner, Carsten and Rohde, Marius and Steiner, Marion},
  year = {2017},
  booktitle = {D.A.CH Security 2017: Bestandsaufnahme, Konzepte, Anwendungen und Perspektiven},
  editor = {Schartner, Peter and Baumann, Andrea},
  publisher = {syssec-Verlag},
  organization = {syssec},
  address = {Frechen},
  month = {September 5th and September 6th},
  note = {\url{http://www.syssec.at/dachsecurity2017/}},
  isbn = {978-3-00-057290-6}
  author = {Hellmann, B. and Ahlers, V. and Rodosek, G. D.},
  booktitle = {2017 9th {IEEE} {International} {Conference} on {Intelligent} {Data} {Acquisition} and {Advanced} {Computing} {Systems}: {Technology} and {Applications} ({IDAACS})},
  title = {Integrating visual analysis of network security and management of detection system configurations},
  year = {2017},
  pages = {1020-1025},
  keywords = {computer network security;data visualisation;detection system configurations;intrusion detection systems;visual analysis framework;false alarms;network security;computer networks;false positive;Visualization;Databases;Intrusion detection;Monitoring;Data models;Communication networks;Network Security;Intrusion Detection Systems;Security Visualization;Policy Evaluation;Configuration Management},
  doi = {10.1109/IDAACS.2017.8095240},
  month = sep
  title = {Modeling and learning incident prioritization},
  volume = {1},
  doi = {10.1109/IDAACS.2017.8095112},
  booktitle = {2017 9th {IEEE} {International} {Conference} on {Intelligent} {Data} {Acquisition} and {Advanced} {Computing} {Systems}: {Technology} and {Applications} ({IDAACS})},
  author = {Renners, L. and Heine, F. and Rodosek, G. D.},
  month = sep,
  year = {2017},
  keywords = {security of data, learning (artificial intelligence), machine learning, Data models, Measurement, intrusion detection systems, incident prioritization, Adaptation models, Numerical models, decision process, generic rule model, Incident Prioritization, Intrusion detection, Machine Learning, Model Trees, Network Security, supervised learning},
  pages = {398--403}
  address = {New York, NY, USA},
  series = {{BDCAT} '17},
  title = {{PopUp}-{Cubing}: {An} {Algorithm} to {Efficiently} {Use} {Iceberg} {Cubes} in {Data} {Streams}},
  isbn = {978-1-4503-5549-0},
  shorttitle = {{PopUp}-{Cubing}},
  url = {http://doi.acm.org/10.1145/3148055.3148061},
  doi = {10.1145/3148055.3148061},
  urldate = {2018-03-19},
  booktitle = {Proceedings of the {Fourth} {IEEE}/{ACM} {International} {Conference} on {Big} {Data} {Computing}, {Applications} and {Technologies}},
  publisher = {ACM},
  author = {Heine, Felix and Rohde, Marius},
  year = {2017},
  keywords = {data stream, data cube, iceberg cube, olap},
  pages = {11--20}
  author = {Heine, Felix},
  editor = {Kirikova, M{\={a}}r{\={\i}}te
	and N{\o}rv{\aa}g, Kjetil
	and Papadopoulos, George A.
	and Gamper, Johann
	and Wrembel, Robert
	and Darmont, J{\'e}r{\^o}me
	and Rizzi, Stefano},
  title = {Outlier Detection in Data Streams Using OLAP Cubes},
  booktitle = {New Trends in Databases and Information Systems},
  year = {2017},
  publisher = {Springer International Publishing},
  address = {Cham},
  pages = {29--36},
  isbn = {978-3-319-67162-8}