Personensuche
X
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Digital Forensics and Cyber Crime ,
1
Unraveling Network-Based Pivoting Maneuvers: Empirical Insi..:
, In:
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
2
The Road Towards Autonomous Cybersecurity Agents: Remedies ..:
, In:
?
Advances in Information Security; Autonomous Intelligent Cyber Defense Agent (AICA) ,
3
Learning About the Adversary:
, In:
?
2023 IEEE Conference on Communications and Network Security (CNS) ,
4
Are Existing Out-Of-Distribution Techniques Suitable for Ne..:
, In:
?
GLOBECOM 2022 - 2022 IEEE Global Communications Conference ,
5
Non-cooperative Learning for Robust Spectrum Sharing in Con..:
, In:
?
Proceedings of the 18th ACM International Conference on Computing Frontiers ,
6
Near real-time intrusion alert aggregation using concept-ba..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
7
Enabling Visual Analytics via Alert-driven Attack Graphs:
, In:
?
Proceedings of the 16th International Conference on Availability, Reliability and Security ,
9
On the Evaluation of Sequential Machine Learning for Networ..:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
12
SoK : contemporary issues and challenges to enable cyber..:
, In:
?
2019 IEEE Conference on Communications and Network Security (CNS) ,
14
CAPTURE: Cyberattack Forecasting Using Non-Stationary Featu..:
, In:
?
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) ,
15