Personensuche
X
?
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
3
PROV5GC: Hardening 5G Core Network Security with Attack Det..:
, In:
?
2023 IEEE International Conference on Data Mining Workshops (ICDMW) ,
4
Debugging Malware Classification Models Based on Event Logs..:
, In:
?
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) ,
7
CFGExplainer: Explaining Graph Neural Network-Based Malware..:
, In:
?
Proceedings of the 15th Workshop on Cyber Security Experimentation and Test ,
8
VET5G: A Virtual End-to-End Testbed for 5G Network Security..:
, In:
?
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy ,
9
Real-Time Evasion Attacks against Deep Learning-Based Anoma..:
, In:
?
Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy ,
11
Deceiving Portable Executable Malware Classifiers into Targ..:
, In:
?
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
12
Paging storm attacks against 4G/LTE networks from regional ..:
, In:
?
2019 IEEE International Conference on Big Data (Big Data) ,
14
RAMP: Real-Time Anomaly Detection in Scientific Workflows:
, In:
?
2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC) ,
15