Personensuche
X
?
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies ,
1
WiP: Enhancing the Comprehension of XACML Policies:
, In:
?
Passive and Active Measurement; Lecture Notes in Computer Science ,
3
From Power to Water: Dissecting SCADA Networks Across Diffe..:
, In:
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
4
A Framework for Privacy-Preserving White-Box Anomaly Detect..:
, In:
?
2023 IEEE International Conference on Big Data (BigData) ,
5
Automated Cyber Threat Intelligence Generation on Multi-Hos..:
, In:
?
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
7
Characterizing Building Automation System Attacks and Attac..:
, In:
?
Secure IT Systems; Lecture Notes in Computer Science ,
8
Actionable Cyber Threat Intelligence for Automated Incident..:
, In:
?
2022 IEEE Security and Privacy Workshops (SPW) ,
9
You Can't Protect What You Don't Understand: Characterizing..:
, In:
?
ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology ,
10
A Matter of Life and Death: Analyzing the Security of Healt..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
11
Role Inference + Anomaly Detection = Situational Awareness ..:
, In:
?
2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE) ,
12
Evaluation Framework for Network Intrusion Detection System..:
, In:
?
2019 IEEE International Conference on Vehicular Electronics and Safety (ICVES) ,
13
A survey of network intrusion detection systems for control..:
, In:
?
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies ,
14