den Hartog, Jerry
109  Ergebnisse:
Personensuche X
?
1

WiP: Enhancing the Comprehension of XACML Policies:

, In: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies,
 
?
2

Cyber Resilience for the Internet of Things: Implementation..:

Alvarenga, Eduardo ; Brands, Jan R. ; Doliwa, Peter...
IEEE Transactions on Emerging Topics in Computing.  12 (2024)  2 - p. 583-600 , 2024
 
?
3

From Power to Water: Dissecting SCADA Networks Across Diffe..:

, In: Passive and Active Measurement; Lecture Notes in Computer Science,
 
?
4

A Framework for Privacy-Preserving White-Box Anomaly Detect..:

, In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies,
 
?
5

Automated Cyber Threat Intelligence Generation on Multi-Hos..:

, In: 2023 IEEE International Conference on Big Data (BigData),
 
?
6

Demonstration of new attacks on three healthcare network pr..:

Dupont, Guillaume ; dos Santos, Daniel ; Dashevskyi, Stanislav...
Journal of Computer Virology and Hacking Techniques.  20 (2023)  2 - p. 301-314 , 2023
 
?
7

Characterizing Building Automation System Attacks and Attac..:

, In: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW),
 
?
 
?
9

You Can't Protect What You Don't Understand: Characterizing..:

, In: 2022 IEEE Security and Privacy Workshops (SPW),
Qin, Xi ; Rosso, Martin ; Cardenas, Alvaro A.... - p. 243-250 , 2022
 
?
10

A Matter of Life and Death: Analyzing the Security of Healt..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
?
11

Role Inference + Anomaly Detection = Situational Awareness ..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
 
?
12

Evaluation Framework for Network Intrusion Detection System..:

, In: 2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE),
 
?
13

A survey of network intrusion detection systems for control..:

, In: 2019 IEEE International Conference on Vehicular Electronics and Safety (ICVES),
 
?
14

Using Provenance for Secure Data Fusion in Cooperative Syst..:

, In: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies,
 
1-15