Zseby, Tanja
120  results:
Search for persons X
?
1

dSalmon: High-Speed Anomaly Detection for Evolving Multivar..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Performance Evaluation Methodologies and Tools,
 
?
2

Evading Botnet Detection:

, In: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing,
Geiginger, Lisa-Marie ; Zseby, Tanja - p. 1331-1340 , 2024
 
?
3

SDOclust: Clustering with Sparse Data Observers:

, In: Similarity Search and Applications; Lecture Notes in Computer Science,
 
?
6

Markov Model of PLC Availability Considering Cyber-Attacks ..:

, In: Studies in Systems, Decision and Control; Reliability Engineering and Computational Intelligence for Complex Systems,
 
?
7

Communications for Energy Systems:

Kupzog, Friederich ; Fabini, Joachim ; Zseby, Tanja
e & i Elektrotechnik und Informationstechnik.  140 (2023)  5 - p. 417-418 , 2023
 
?
8

Better Safe Than Sorry: Risk Management Based on a Safety-A..:

Brenner, Bernhard ; Hollerer, Siegfried ; Bhosale, Pushparaj...
IEEE Open Journal of the Industrial Electronics Society.  4 (2023)  - p. 287-303 , 2023
 
?
9

Separating Flows in Encrypted Tunnel Traffic:

, In: 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA),
 
?
10

CCgen: Injecting Covert Channels into Network Traffic:

Iglesias, Félix ; Meghdouri, Fares ; Annessi, Robert..
Security and Communication Networks.  2022 (2022)  - p. 1-11 , 2022
 
?
11

Clustering refinement:

Iglesias, Félix ; Zseby, Tanja ; Zimek, Arthur
International Journal of Data Science and Analytics.  12 (2021)  4 - p. 333-353 , 2021
 
?
13

SecTULab: A Moodle-Integrated Secure Remote Access Architec..:

, In: Proceedings of the 16th International Conference on Availability, Reliability and Security,
 
?
14

Subverting Counter Mode Encryption for Hidden Communication..:

, In: Proceedings of the 16th International Conference on Availability, Reliability and Security,
 
?
15

Shedding Light in the Tunnel: Counting Flows in Encrypted N..:

, In: 2021 International Conference on Data Mining Workshops (ICDMW),
 
1-15