Author of the publication

Enabling exercises, education and research with a comprehensive cyber range.

, , , , , , , , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (4): 37-61 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations., , , and . ERCIM News, 2022 (129): 0 (2022)A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation., , , , , and . SAT-CPS@CODASPY, page 77-86. ACM, (2022)Maintainable Log Datasets for Evaluation of Intrusion Detection Systems., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3466-3482 (July 2023)A logging maturity and decision model for the selection of intrusion detection cyber security solutions., , , and . Comput. Secur., (2024)Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data., , , , , and . ARES, page 31:1-31:6. ACM, (2017)synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems., , , , , , , , , and 3 other author(s). J. Inf. Secur. Appl., (2020)Enabling exercises, education and research with a comprehensive cyber range., , , , , , , , , and 2 other author(s). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (4): 37-61 (2021)Deep Learning for Anomaly Detection in Log Data: A Survey., , , and . CoRR, (2022)The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection., , and . IEEE Secur. Priv., 19 (5): 36-45 (2021)A Framework for Cyber Threat Intelligence Extraction from Raw Log Data., , , , and . IEEE BigData, page 3200-3209. IEEE, (2019)