Christopher Neal
62  Ergebnisse:
Personensuche X
?
1

Automated Attacker Behaviour Classification Using Threat In..:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
 
?
2

Optimal Automated Generation of Playbooks:

, In: Data and Applications Security and Privacy XXXVIII; Lecture Notes in Computer Science,
 
?
3

Unsupervised Clustering of Honeypot Attacks by Deep HTTP Pa..:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
 
?
4

Real-Time Defensive Strategy Selection via Deep Reinforceme..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
5

Evading Deep Reinforcement Learning-based Network Intrusion..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
6

Attacker Attribution via Characteristics Inference Using Ho..:

, In: Network and System Security; Lecture Notes in Computer Science,
 
?
7

Analyzing the Resiliency of Microgrid Control Algorithms Ag..:

, In: 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE),
 
?
8

A linked data platform for mining software repositories:

, In: Proceedings of the 9th IEEE Working Conference on Mining Software Repositories,
 
?
10

Contributors:

, In: Advances in Structural Adhesive Bonding,
 
?
11

Axiomatic design of smart local energy systems:

, In: 2021 12th International Renewable Engineering Conference (IREC),
 
?
12

Buffets : An Efficient and Composable Storage Idiom for ..:

, In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems,
 
?
13

ExTensor : An Accelerator for Sparse Tensor Algebra:

, In: Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture,
 
?
14

Contributors:

, In: Morrey's the Elbow and its Disorders,
 
?
 
1-15