From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Request for a Surveillance Tower: Evasive Tactics in Cyber Defense Exercises., и . CyCon, стр. 239-252. IEEE, (2023)Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems., , , , , , , и . Adaptive Autonomous Secure Cyber Systems, Springer, (2020)Comparative Analysis of Pattern Mining Algorithms for Event Logs., , и . CSR, стр. 1-7. IEEE, (2023)Frankenstack: Real-time Cyberattack Detection and Feedback System for Technical Cyber Exercises., и . CSR, стр. 396-402. IEEE, (2021)LogCluster - A data clustering and pattern mining algorithm for event logs., и . CNSM, стр. 1-7. IEEE Computer Society, (2015)Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal., , , , и . CyCom, стр. 367-383. IEEE, (2022)Using Security Logs for Collecting and Reporting Technical Security Metrics., и . MILCOM, стр. 294-299. IEEE, (2014)Frankenstack: Toward real-time Red Team feedback., , , , и . MILCOM, стр. 400-405. IEEE, (2017)Event log analysis with the LogCluster tool., , и . MILCOM, стр. 982-987. IEEE, (2016)Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense., , , , , , , , , и 1 other автор(ы). CoRR, (2018)