Search for persons
X
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
1
Automated Attacker Behaviour Classification Using Threat In..:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
3
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Pa..:
, In:
?
Data and Applications Security and Privacy XXXVIII; Lecture Notes in Computer Science ,
5
Optimal Automated Generation of Playbooks:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
6
Real-Time Defensive Strategy Selection via Deep Reinforceme..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
10