Personensuche
X
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
1
Automated Attacker Behaviour Classification Using Threat In..:
, In:
?
Data and Applications Security and Privacy XXXVIII; Lecture Notes in Computer Science ,
2
Optimal Automated Generation of Playbooks:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
3
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Pa..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
4
Real-Time Defensive Strategy Selection via Deep Reinforceme..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
5
Evading Deep Reinforcement Learning-based Network Intrusion..:
, In:
?
Network and System Security; Lecture Notes in Computer Science ,
6
Attacker Attribution via Characteristics Inference Using Ho..:
, In:
?
2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) ,
7
Analyzing the Resiliency of Microgrid Control Algorithms Ag..:
, In:
?
Proceedings of the 9th IEEE Working Conference on Mining Software Repositories ,
8
A linked data platform for mining software repositories:
, In:
?
2021 12th International Renewable Engineering Conference (IREC) ,
11
Axiomatic design of smart local energy systems:
, In:
?
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems ,
12
Buffets : An Efficient and Composable Storage Idiom for ..:
, In:
?
Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture ,
13
ExTensor : An Accelerator for Sparse Tensor Algebra:
, In:
?
Handbook of Life Course Health Development ,
15