Search for persons
X
?
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies ,
1
WiP: Enhancing the Comprehension of XACML Policies:
, In:
?
Passive and Active Measurement; Lecture Notes in Computer Science ,
2
From Power to Water: Dissecting SCADA Networks Across Diffe..:
, In:
?
2023 IEEE International Conference on Big Data (BigData) ,
5
Automated Cyber Threat Intelligence Generation on Multi-Hos..:
, In:
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
6
A Framework for Privacy-Preserving White-Box Anomaly Detect..:
, In:
?
Secure IT Systems; Lecture Notes in Computer Science ,
7
Actionable Cyber Threat Intelligence for Automated Incident..:
, In:
?
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
8
Characterizing Building Automation System Attacks and Attac..:
, In:
?
2022 IEEE Security and Privacy Workshops (SPW) ,
9
You Can't Protect What You Don't Understand: Characterizing..:
, In:
?
ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology ,
10
A Matter of Life and Death: Analyzing the Security of Healt..:
, In:
?
2019 IEEE International Conference on Vehicular Electronics and Safety (ICVES) ,
11
A survey of network intrusion detection systems for control..:
, In:
?
2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE) ,
12
Evaluation Framework for Network Intrusion Detection System..:
, In:
?
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies ,
13
Using Provenance for Secure Data Fusion in Cooperative Syst..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
14