Search for persons
X
?
2022 IEEE Security and Privacy Workshops (SPW) ,
2
You Can't Protect What You Don't Understand: Characterizing..:
, In:
?
ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology ,
3
A Matter of Life and Death: Analyzing the Security of Healt..:
, In:
?
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy ,
4
Network Monitoring of Industrial Control Systems : The L..:
, In:
?
2019 IEEE International Conference on Vehicular Electronics and Safety (ICVES) ,
5
A survey of network intrusion detection systems for control..:
, In:
?
2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE) ,
6
Evaluation Framework for Network Intrusion Detection System..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
7
Role Inference + Anomaly Detection = Situational Awareness ..:
, In:
?
Proceedings of the 33rd Annual ACM Symposium on Applied Computing ,
8
Behavior analysis in the medical sector : theory and pra..:
, In:
?
Critical Information Infrastructures Security; Lecture Notes in Computer Science ,
9
Leveraging Semantics for Actionable Intrusion Detection in ..:
, In:
?
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy ,
10
From System Specification to Anomaly Detection (and back):
, In:
?
Proceedings of the 33rd Annual Computer Security Applications Conference ,
11
ECFI : Asynchronous Control Flow Integrity for Programma..:
, In:
?
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense ,
12
Towards Realistic Threat Modeling : Attack Commodificati..:
, In:
?
2016 IEEE Security and Privacy Workshops (SPW) ,
13
A Hybrid Framework for Data Loss Prevention and Detection:
, In:
?
Proceedings of the 31st Annual ACM Symposium on Applied Computing ,
14