Search for persons
X
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Digital Forensics and Cyber Crime ,
1
Unraveling Network-Based Pivoting Maneuvers: Empirical Insi..:
, In:
?
Proceedings of the 19th International Conference on Availability, Reliability and Security ,
3
Don't, Stop, Drop, Pause: Forensics of CONtainer CheckPOINT..:
, In:
?
Proceedings of the 17th Cyber Security Experimentation and Test Workshop ,
5
Accelerating Ransomware Defenses with Computational Storage..:
, In:
?
Complex Computational Ecosystems; Lecture Notes in Computer Science ,
9
On the Provision of Network-Wide Cyber Situational Awarenes..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
10
Federated Learning Approach for Distributed Ransomware Anal..:
, In:
?
2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) ,
11
Helium-based IoT Devices: Threat Analysis and Internet-scal..:
, In:
?
ICC 2023 - IEEE International Conference on Communications ,
12
P4CCI: P4-Based Online TCP Congestion Control Algorithm Ide..:
, In:
?
ICC 2023 - IEEE International Conference on Communications ,
13
RPM: Ransomware Prevention and Mitigation Using Operating S..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
15