Personensuche
X
?
2024 IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics (SAMI) ,
1
Improving CTF Event Organization: A Case Study on Utilizing..:
, In:
?
2024 IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics (SAMI) ,
2
Concept for real time attacker profiling with honeypots, by..:
, In:
?
2023 IEEE 21st Jubilee International Symposium on Intelligent Systems and Informatics (SISY) ,
3
Machine Learning Methods for Cybersecurity: Review and Bibl..:
, In:
?
2023 IEEE 21st Jubilee International Symposium on Intelligent Systems and Informatics (SISY) ,
4
Neural Network-Based Log Analysis Methods for 5G Network:
, In:
?
2022 IEEE 1st International Conference on Cognitive Mobility (CogMob) ,
5
Use Cases of Attack Graph in Threat Analysis And Risk Asses..:
, In:
?
2022 IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems (ICCC) ,
6
Security threats based on critical database system privileg..:
, In:
?
2022 IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems (ICCC) ,
7
Measuring Honeypots based on CTF game:
, In:
?
2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES) ,
8
Use cases of attack graph for SOC optimization purpose:
, In:
?
2022 IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems (ICCC) ,
9
Overview of Attack Graph Generation For Automotive Systems:
, In:
?
2022 IEEE 20th Jubilee International Symposium on Intelligent Systems and Informatics (SISY) ,
10
Attack Graph Implementation in Graph Database:
, In:
?
2022 IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems (ICCC) ,
11
5G registration tracking based on logdata:
, In:
?
2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES) ,
12