Personensuche
X
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
3
Detecting Masquerading Traitors from Process Visualization ..:
, In:
?
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
4
Applying Process Discovery to Cybersecurity Training: An Ex..:
, In:
?
Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1 ,
6
Process Mining Analysis of Puzzle-Based Cybersecurity Train..:
, In:
?
2020 IEEE Symposium on Visualization for Cyber Security (VizSec) ,
9
Exploratory Analysis of File System Metadata for Rapid Inve..:
, In:
?
2019 IEEE Symposium on Visualization for Cyber Security (VizSec) ,
10
Visual Feedback for Players of Multi-Level Capture the Flag..:
, In:
?
Proceedings of the 49th ACM Technical Symposium on Computer Science Education ,
11
Timely Feedback in Unstructured Cybersecurity Exercises:
, In:
?
Lecture Notes in Computer Science; Security of Networks and Services in an All-Connected World ,
12
Visual Analytics for Network Security and Critical Infrastr..:
, In:
?
Proceedings of the 15th ACM SIGSOFT symposium on Component Based Software Engineering ,
13
Reliability analysis in component-based development via pro..:
, In:
?
Proceedings of the 21st Spring Conference on Computer Graphics ,
14