Personensuche
X
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
1
Inferring Recovery Steps from Cyber Threat Intelligence Rep..:
, In:
?
NOMS 2024-2024 IEEE Network Operations and Management Symposium ,
2
ERAFL: Efficient Resource Allocation for Federated Learning..:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
4
Shimware: Toward Practical Security Retrofitting for Monoli..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
5
AoT - Attack on Things: A security analysis of IoT firmware..:
, In:
?
2023 IEEE Security and Privacy Workshops (SPW) ,
6
HoneyKube: Designing and Deploying a Microservices-based We..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
7
Divak: Non-invasive Characterization of Out-of-Bounds Write..:
, In:
?
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) ,
8
Columbus: Android App Testing Through Systematic Callback E..:
, In:
?
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) ,
10
Federated Lab (FedLab): An Open-source Distributed Platform..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
11
DEEPCASE: Semi-Supervised Contextual Analysis of Security E..:
, In:
?
Proceedings of the 38th Annual Computer Security Applications Conference ,
12
Stepping out of the MUD: Contextual threat information for ..:
, In:
?
Proceedings of the 2022 on Cloud Computing Security Workshop ,
13
Contextualizing System Calls in Containers for Anomaly-Base..:
, In:
?
Proceedings of the 2022 on Cloud Computing Security Workshop ,
14
Detecting Anomalous Misconfigurations in AWS Identity and A..:
, In:
?
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
15