Personensuche
X
?
Proceedings of the 15th Workshop on Cyber Security Experimentation and Test ,
1
Dataflow-based Control Process Identification for ICS Datas..:
, In:
?
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing ,
2
Residual size is not enough for anomaly detection : impr..:
, In:
?
Cyber Security Experimentation and Test Workshop ,
4
Two ICS Security Datasets and Anomaly Detection Contest on ..:
, In:
?
Cyber Security Experimentation and Test Workshop ,
5
Probabilistic Attack Sequence Generation and Execution Base..:
, In:
?
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security ,
6
POSTER: Expanding a Programmable CPS Testbed for Network At..:
, In:
?
Communications in Computer and Information Science; HCI International 2020 - Posters ,
7
Co-occurrence Based Security Event Analysis and Visualizati..:
, In:
?
Communications in Computer and Information Science; HCI International 2019 - Posters ,
8
Layered Information Structure for Hierarchical Security Man..:
, In:
?
IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIII ,
9
Data-Driven Field Mapping of Security Logs for Integrated M..:
, In:
?
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security ,
10
Vendor-Independent Monitoring on Programmable Logic Control..:
, In:
?
Proceedings of the first international workshop on Intelligent visual interfaces for text analysis ,
11
User analysis and visualization from a semantic blog system:
, In:
?
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing ,
13
"Do you know existing accuracy metrics overrate time-series..:
, In:
?
2023 IEEE International Conference on Consumer Electronics (ICCE) ,
14
Robust Bluetooth Call Streaming with Frame-Overlapped Trans..:
, In:
?
ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) ,
15